[Openvas-commits] r12075 - in trunk/openvas-plugins: . scripts

scm-commit@wald.intevation.org scm-commit at wald.intevation.org
Wed Nov 9 17:20:14 CET 2011


Author: hdoreau
Date: 2011-11-09 17:18:42 +0100 (Wed, 09 Nov 2011)
New Revision: 12075

Modified:
   trunk/openvas-plugins/ChangeLog
   trunk/openvas-plugins/scripts/AnswerBook2_12746.nasl
   trunk/openvas-plugins/scripts/DDI_Unprotected_PCanywhere.nasl
   trunk/openvas-plugins/scripts/RHSA_2009_0010.nasl
   trunk/openvas-plugins/scripts/RHSA_2009_1233.nasl
   trunk/openvas-plugins/scripts/RHSA_2009_1465.nasl
   trunk/openvas-plugins/scripts/RHSA_2009_1673.nasl
   trunk/openvas-plugins/scripts/SiteX_35122.nasl
   trunk/openvas-plugins/scripts/account_db2as_db2as.nasl
   trunk/openvas-plugins/scripts/advanced_guestbook.nasl
   trunk/openvas-plugins/scripts/boastMachine_37940.nasl
   trunk/openvas-plugins/scripts/bugbear_b_1080.nasl
   trunk/openvas-plugins/scripts/cisco_vpn_client_detect.nasl
   trunk/openvas-plugins/scripts/citrix_xss.nasl
   trunk/openvas-plugins/scripts/citrusdb_cc_disclosure.nasl
   trunk/openvas-plugins/scripts/deb_071_1.nasl
   trunk/openvas-plugins/scripts/deb_097_1.nasl
   trunk/openvas-plugins/scripts/deb_1144_1.nasl
   trunk/openvas-plugins/scripts/deb_1185_1.nasl
   trunk/openvas-plugins/scripts/deb_1257_1.nasl
   trunk/openvas-plugins/scripts/deb_1342_1.nasl
   trunk/openvas-plugins/scripts/deb_1355_1.nasl
   trunk/openvas-plugins/scripts/deb_1383_1.nasl
   trunk/openvas-plugins/scripts/deb_1468_1.nasl
   trunk/openvas-plugins/scripts/deb_1502_1.nasl
   trunk/openvas-plugins/scripts/deb_1531_2.nasl
   trunk/openvas-plugins/scripts/deb_1533_1.nasl
   trunk/openvas-plugins/scripts/deb_1627_2.nasl
   trunk/openvas-plugins/scripts/deb_1694_2.nasl
   trunk/openvas-plugins/scripts/deb_1719_2.nasl
   trunk/openvas-plugins/scripts/deb_1859_1.nasl
   trunk/openvas-plugins/scripts/deb_1873_1.nasl
   trunk/openvas-plugins/scripts/deb_1929_1.nasl
   trunk/openvas-plugins/scripts/deb_1992_1.nasl
   trunk/openvas-plugins/scripts/deb_2028_1.nasl
   trunk/openvas-plugins/scripts/deb_2049_1.nasl
   trunk/openvas-plugins/scripts/deb_2101_1.nasl
   trunk/openvas-plugins/scripts/deb_2245_1.nasl
   trunk/openvas-plugins/scripts/deb_2270_1.nasl
   trunk/openvas-plugins/scripts/deb_425_1.nasl
   trunk/openvas-plugins/scripts/deb_574_1.nasl
   trunk/openvas-plugins/scripts/deb_657_1.nasl
   trunk/openvas-plugins/scripts/deb_662_2.nasl
   trunk/openvas-plugins/scripts/deb_676_1.nasl
   trunk/openvas-plugins/scripts/deb_704_1.nasl
   trunk/openvas-plugins/scripts/deb_804_1.nasl
   trunk/openvas-plugins/scripts/deb_861_1.nasl
   trunk/openvas-plugins/scripts/deb_863_1.nasl
   trunk/openvas-plugins/scripts/deb_878_1.nasl
   trunk/openvas-plugins/scripts/directory_manager.nasl
   trunk/openvas-plugins/scripts/domino_authentication_bypass.nasl
   trunk/openvas-plugins/scripts/dopewars_server_36606.nasl
   trunk/openvas-plugins/scripts/fcore_2008_11848.nasl
   trunk/openvas-plugins/scripts/fcore_2009_10539.nasl
   trunk/openvas-plugins/scripts/fcore_2009_1204.nasl
   trunk/openvas-plugins/scripts/fcore_2009_12481.nasl
   trunk/openvas-plugins/scripts/fcore_2009_2122.nasl
   trunk/openvas-plugins/scripts/fcore_2009_2149.nasl
   trunk/openvas-plugins/scripts/fcore_2009_3064.nasl
   trunk/openvas-plugins/scripts/fcore_2009_6279.nasl
   trunk/openvas-plugins/scripts/fcore_2009_7898.nasl
   trunk/openvas-plugins/scripts/fcore_2009_8114.nasl
   trunk/openvas-plugins/scripts/fcore_2009_8498.nasl
   trunk/openvas-plugins/scripts/fcore_2009_8770.nasl
   trunk/openvas-plugins/scripts/finger_akfingerd.nasl
   trunk/openvas-plugins/scripts/freebsd_amaya.nasl
   trunk/openvas-plugins/scripts/freebsd_ca_root_nss.nasl
   trunk/openvas-plugins/scripts/freebsd_dnrd.nasl
   trunk/openvas-plugins/scripts/freebsd_dokuwiki5.nasl
   trunk/openvas-plugins/scripts/freebsd_drupal510.nasl
   trunk/openvas-plugins/scripts/freebsd_faad2.nasl
   trunk/openvas-plugins/scripts/freebsd_gtar2.nasl
   trunk/openvas-plugins/scripts/freebsd_hlstats.nasl
   trunk/openvas-plugins/scripts/freebsd_imap-uw.nasl
   trunk/openvas-plugins/scripts/freebsd_krb57.nasl
   trunk/openvas-plugins/scripts/freebsd_libxml.nasl
   trunk/openvas-plugins/scripts/freebsd_mantis1.nasl
   trunk/openvas-plugins/scripts/freebsd_mgetty+sendfax.nasl
   trunk/openvas-plugins/scripts/freebsd_mod_jk-ap2.nasl
   trunk/openvas-plugins/scripts/freebsd_mysql-server4.nasl
   trunk/openvas-plugins/scripts/freebsd_net-snmp1.nasl
   trunk/openvas-plugins/scripts/freebsd_openssl2.nasl
   trunk/openvas-plugins/scripts/freebsd_opera3.nasl
   trunk/openvas-plugins/scripts/freebsd_p5-Mail-SpamAssassin2.nasl
   trunk/openvas-plugins/scripts/freebsd_phpMyAdmin16.nasl
   trunk/openvas-plugins/scripts/freebsd_picasm.nasl
   trunk/openvas-plugins/scripts/freebsd_pidgin0.nasl
   trunk/openvas-plugins/scripts/freebsd_postgresql-contrib.nasl
   trunk/openvas-plugins/scripts/freebsd_sudo5.nasl
   trunk/openvas-plugins/scripts/freebsd_typo32.nasl
   trunk/openvas-plugins/scripts/freebsd_vtiger.nasl
   trunk/openvas-plugins/scripts/freebsdsa_compress.nasl
   trunk/openvas-plugins/scripts/freebsdsa_mbuf.nasl
   trunk/openvas-plugins/scripts/fspd_directory_traversal.nasl
   trunk/openvas-plugins/scripts/gb_CESA-2008_0002_tog-pegasus_centos4_x86_64.nasl
   trunk/openvas-plugins/scripts/gb_CESA-2008_0105_thunderbird_centos5_x86_64.nasl
   trunk/openvas-plugins/scripts/gb_CESA-2008_0161_cups_centos5_x86_64.nasl
   trunk/openvas-plugins/scripts/gb_CESA-2008_0515_evolution28_centos4_i386.nasl
   trunk/openvas-plugins/scripts/gb_CESA-2008_0546-01_php_centos2_i386.nasl
   trunk/openvas-plugins/scripts/gb_CESA-2008_0896_irb_centos3_i386.nasl
   trunk/openvas-plugins/scripts/gb_CESA-2009_1522_kernel_centos4_i386.nasl
   trunk/openvas-plugins/scripts/gb_CESA-2009_1646_libtool_centos3_i386.nasl
   trunk/openvas-plugins/scripts/gb_CESA-2010_0343_krb5-devel_centos5_i386.nasl
   trunk/openvas-plugins/scripts/gb_CESA-2010_0398_kernel_centos5_i386.nasl
   trunk/openvas-plugins/scripts/gb_CESA-2010_0606_kernel_centos4_i386.nasl
   trunk/openvas-plugins/scripts/gb_CESA-2010_0680_seamonkey_centos3_i386.nasl
   trunk/openvas-plugins/scripts/gb_CESA-2011_0375_seamonkey_centos4_i386.nasl
   trunk/openvas-plugins/scripts/gb_CESA-2011_0394_luci_centos5_i386.nasl
   trunk/openvas-plugins/scripts/gb_CESA-2011_0491_python_centos4_i386.nasl
   trunk/openvas-plugins/scripts/gb_CESA-2011_1065_kernel_centos5_i386.nasl
   trunk/openvas-plugins/scripts/gb_CESA-2011_1160_dhclient_centos4_i386.nasl
   trunk/openvas-plugins/scripts/gb_RHSA-2007_1129-01_autofs5.nasl
   trunk/openvas-plugins/scripts/gb_RHSA-2008_0175-01_openoffice.org.nasl
   trunk/openvas-plugins/scripts/gb_RHSA-2008_0528-01_ucd-snmp.nasl
   trunk/openvas-plugins/scripts/gb_RHSA-2010_0113-01_seamonkey.nasl
   trunk/openvas-plugins/scripts/gb_RHSA-2010_0768-01_java-1.6.0-openjdk.nasl
   trunk/openvas-plugins/scripts/gb_RHSA-2011_1073-01_bash.nasl
   trunk/openvas-plugins/scripts/gb_RealVNC_39895.nasl
   trunk/openvas-plugins/scripts/gb_adobe_prdts_code_exec_vuln_lin.nasl
   trunk/openvas-plugins/scripts/gb_adobe_shockwave_player_bof_vuln_jan10.nasl
   trunk/openvas-plugins/scripts/gb_apache_tomcat_mod_jk_info_disc_vuln.nasl
   trunk/openvas-plugins/scripts/gb_apple_safari_object_tag_dos_vuln.nasl
   trunk/openvas-plugins/scripts/gb_bugzilla_44618.nasl
   trunk/openvas-plugins/scripts/gb_coldcalendar_eventid_sql_inj_vuln.nasl
   trunk/openvas-plugins/scripts/gb_community_server_49022.nasl
   trunk/openvas-plugins/scripts/gb_elecard_mpeg_player_bof_vuln.nasl
   trunk/openvas-plugins/scripts/gb_emc_networker_detect.nasl
   trunk/openvas-plugins/scripts/gb_fedora_2007_2652_tempest_fc7.nasl
   trunk/openvas-plugins/scripts/gb_fedora_2007_422_libXfont_fc5.nasl
   trunk/openvas-plugins/scripts/gb_fedora_2007_740_cups_fc6.nasl
   trunk/openvas-plugins/scripts/gb_fedora_2008_0462_libxml2_fc8.nasl
   trunk/openvas-plugins/scripts/gb_fedora_2008_11511_yelp_fc10.nasl
   trunk/openvas-plugins/scripts/gb_fedora_2008_1287_deluge_fc8.nasl
   trunk/openvas-plugins/scripts/gb_fedora_2008_2464_dovecot_fc8.nasl
   trunk/openvas-plugins/scripts/gb_fedora_2008_2678_namazu_fc7.nasl
   trunk/openvas-plugins/scripts/gb_fedora_2008_2987_PolicyKit_fc8.nasl
   trunk/openvas-plugins/scripts/gb_fedora_2008_9597_lynx_fc8.nasl
   trunk/openvas-plugins/scripts/gb_fedora_2008_9633_optipng_fc9.nasl
   trunk/openvas-plugins/scripts/gb_fedora_2010_10400_python-paste_fc11.nasl
   trunk/openvas-plugins/scripts/gb_fedora_2010_11428_php_fc12.nasl
   trunk/openvas-plugins/scripts/gb_fedora_2010_14501_phpMyAdmin_fc14.nasl
   trunk/openvas-plugins/scripts/gb_fedora_2010_14832_kernel_fc14.nasl
   trunk/openvas-plugins/scripts/gb_fedora_2010_16782_moodle_fc13.nasl
   trunk/openvas-plugins/scripts/gb_fedora_2010_18425_krb5_fc13.nasl
   trunk/openvas-plugins/scripts/gb_fedora_2010_1863_maildrop_fc12.nasl
   trunk/openvas-plugins/scripts/gb_fedora_2010_1941_openoffice.org_fc11.nasl
   trunk/openvas-plugins/scripts/gb_fedora_2010_4339_gnu-smalltalk_fc12.nasl
   trunk/openvas-plugins/scripts/gb_fedora_2010_5515_gnome-python2-extras_fc11.nasl
   trunk/openvas-plugins/scripts/gb_fedora_2010_5526_thunderbird_fc11.nasl
   trunk/openvas-plugins/scripts/gb_fedora_2010_5539_thunderbird_fc12.nasl
   trunk/openvas-plugins/scripts/gb_fedora_2010_7640_boa_fc12.nasl
   trunk/openvas-plugins/scripts/gb_fedora_2011_11106_firefox_fc15.nasl
   trunk/openvas-plugins/scripts/gb_fedora_2011_13465_xulrunner_fc15.nasl
   trunk/openvas-plugins/scripts/gb_fedora_2011_6205_thunderbird_fc13.nasl
   trunk/openvas-plugins/scripts/gb_fedora_2011_7555_unbound_fc14.nasl
   trunk/openvas-plugins/scripts/gb_fedora_2011_7818_jabberd_fc13.nasl
   trunk/openvas-plugins/scripts/gb_fedora_2011_8036_pam_ssh_fc13.nasl
   trunk/openvas-plugins/scripts/gb_fedora_2011_8627_perl-Gtk2-MozEmbed_fc15.nasl
   trunk/openvas-plugins/scripts/gb_firefox_mult_vuln_mar09_lin.nasl
   trunk/openvas-plugins/scripts/gb_google_chrome_ftp_clnt_xss_vuln.nasl
   trunk/openvas-plugins/scripts/gb_google_chrome_mult_vuln_jan11_lin.nasl
   trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX00141.nasl
   trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX02073.nasl
   trunk/openvas-plugins/scripts/gb_ibm_openadmin_tool_detect.nasl
   trunk/openvas-plugins/scripts/gb_mandriva_MDKA_2007_119.nasl
   trunk/openvas-plugins/scripts/gb_mandriva_MDKA_2007_136.nasl
   trunk/openvas-plugins/scripts/gb_mandriva_MDKSA_2007_020.nasl
   trunk/openvas-plugins/scripts/gb_mandriva_MDKSA_2007_032.nasl
   trunk/openvas-plugins/scripts/gb_mandriva_MDKSA_2007_175.nasl
   trunk/openvas-plugins/scripts/gb_mandriva_MDKSA_2007_181.nasl
   trunk/openvas-plugins/scripts/gb_mandriva_MDKSA_2007_185.nasl
   trunk/openvas-plugins/scripts/gb_mandriva_MDKSA_2007_209.nasl
   trunk/openvas-plugins/scripts/gb_mandriva_MDVA_2008_012.nasl
   trunk/openvas-plugins/scripts/gb_mandriva_MDVA_2008_037.nasl
   trunk/openvas-plugins/scripts/gb_mandriva_MDVA_2008_112.nasl
   trunk/openvas-plugins/scripts/gb_mandriva_MDVA_2008_118.nasl
   trunk/openvas-plugins/scripts/gb_mandriva_MDVA_2010_048.nasl
   trunk/openvas-plugins/scripts/gb_mandriva_MDVA_2010_059.nasl
   trunk/openvas-plugins/scripts/gb_mandriva_MDVSA_2008_080.nasl
   trunk/openvas-plugins/scripts/gb_mandriva_MDVSA_2008_105.nasl
   trunk/openvas-plugins/scripts/gb_mandriva_MDVSA_2008_167.nasl
   trunk/openvas-plugins/scripts/gb_mandriva_MDVSA_2008_206.nasl
   trunk/openvas-plugins/scripts/gb_mandriva_MDVSA_2009_241_1.nasl
   trunk/openvas-plugins/scripts/gb_mandriva_MDVSA_2010_010.nasl
   trunk/openvas-plugins/scripts/gb_mandriva_MDVSA_2010_123.nasl
   trunk/openvas-plugins/scripts/gb_mandriva_MDVSA_2010_128.nasl
   trunk/openvas-plugins/scripts/gb_mandriva_MDVSA_2011_017.nasl
   trunk/openvas-plugins/scripts/gb_mandriva_MDVSA_2011_063.nasl
   trunk/openvas-plugins/scripts/gb_mediawiki_clickjacking_vuln.nasl
   trunk/openvas-plugins/scripts/gb_mozilla_prdts_load_subscript_sec_bypass_vuln_win.nasl
   trunk/openvas-plugins/scripts/gb_mozilla_prdts_mult_vuln_win_sep10.nasl
   trunk/openvas-plugins/scripts/gb_ms11-035_remote.nasl
   trunk/openvas-plugins/scripts/gb_ms_ie_bof_vuln_jul09.nasl
   trunk/openvas-plugins/scripts/gb_ms_smtp_dns_spoofing_vulnerability.nasl
   trunk/openvas-plugins/scripts/gb_ms_win_media_player_int_overflow_vuln.nasl
   trunk/openvas-plugins/scripts/gb_nuralstorm_webmail_41559.nasl
   trunk/openvas-plugins/scripts/gb_open_urgence_vaccin_detect.nasl
   trunk/openvas-plugins/scripts/gb_openttd_mult_use_after_free_dos_vuln.nasl
   trunk/openvas-plugins/scripts/gb_openx_auth_bypass_vuln.nasl
   trunk/openvas-plugins/scripts/gb_opera_mult_vuln_oct10_win.nasl
   trunk/openvas-plugins/scripts/gb_oscommerce_malware.nasl
   trunk/openvas-plugins/scripts/gb_peazip_detect_win.nasl
   trunk/openvas-plugins/scripts/gb_php_script_directory_sql_inj_vuln.nasl
   trunk/openvas-plugins/scripts/gb_php_sql_inj_vuln.nasl
   trunk/openvas-plugins/scripts/gb_phpmyadmin_42591.nasl
   trunk/openvas-plugins/scripts/gb_pligg_mult_sql_inj_vuln.nasl
   trunk/openvas-plugins/scripts/gb_s40_cms_xss_vuln.nasl
   trunk/openvas-plugins/scripts/gb_sahana_45730.nasl
   trunk/openvas-plugins/scripts/gb_solaris_110458_02.nasl
   trunk/openvas-plugins/scripts/gb_solaris_115754_02.nasl
   trunk/openvas-plugins/scripts/gb_solaris_116479_02.nasl
   trunk/openvas-plugins/scripts/gb_solaris_117471_04.nasl
   trunk/openvas-plugins/scripts/gb_solaris_119254_66.nasl
   trunk/openvas-plugins/scripts/gb_solaris_120740_05.nasl
   trunk/openvas-plugins/scripts/gb_solaris_122911_16.nasl
   trunk/openvas-plugins/scripts/gb_solaris_138577_01.nasl
   trunk/openvas-plugins/scripts/gb_sun_java_sys_web_serv_heap_bof_vuln_lin.nasl
   trunk/openvas-plugins/scripts/gb_thunderbird_detect_win.nasl
   trunk/openvas-plugins/scripts/gb_ubuntu_USN_1037_1.nasl
   trunk/openvas-plugins/scripts/gb_ubuntu_USN_1042_1.nasl
   trunk/openvas-plugins/scripts/gb_ubuntu_USN_495_1.nasl
   trunk/openvas-plugins/scripts/gb_ubuntu_USN_543_1.nasl
   trunk/openvas-plugins/scripts/gb_ubuntu_USN_914_1.nasl
   trunk/openvas-plugins/scripts/gb_ubuntu_USN_943_1.nasl
   trunk/openvas-plugins/scripts/gb_vlc_media_player_bookmark_bof_vuln_win.nasl
   trunk/openvas-plugins/scripts/gb_winftp_serv_bof_vuln.nasl
   trunk/openvas-plugins/scripts/gb_wireshark_bytes_repr_len_dos_vuln_win.nasl
   trunk/openvas-plugins/scripts/gb_zen_time_tracking_mult_sql_inj_vuln.nasl
   trunk/openvas-plugins/scripts/glsa_200405_20.nasl
   trunk/openvas-plugins/scripts/glsa_200407_11.nasl
   trunk/openvas-plugins/scripts/glsa_200407_21.nasl
   trunk/openvas-plugins/scripts/glsa_200409_33.nasl
   trunk/openvas-plugins/scripts/glsa_200502_28.nasl
   trunk/openvas-plugins/scripts/glsa_200507_13.nasl
   trunk/openvas-plugins/scripts/glsa_200507_26.nasl
   trunk/openvas-plugins/scripts/glsa_200510_09.nasl
   trunk/openvas-plugins/scripts/glsa_200603_01.nasl
   trunk/openvas-plugins/scripts/glsa_200604_02.nasl
   trunk/openvas-plugins/scripts/glsa_200606_02.nasl
   trunk/openvas-plugins/scripts/glsa_200705_17.nasl
   trunk/openvas-plugins/scripts/glsa_200712_17.nasl
   trunk/openvas-plugins/scripts/glsa_200801_17.nasl
   trunk/openvas-plugins/scripts/glsa_200804_03.nasl
   trunk/openvas-plugins/scripts/glsa_200805_12.nasl
   trunk/openvas-plugins/scripts/glsa_200807_14.nasl
   trunk/openvas-plugins/scripts/glsa_200809_02.nasl
   trunk/openvas-plugins/scripts/glsa_200809_17.nasl
   trunk/openvas-plugins/scripts/glsa_200810_03.nasl
   trunk/openvas-plugins/scripts/glsa_200812_23.nasl
   trunk/openvas-plugins/scripts/glsa_200904_06.nasl
   trunk/openvas-plugins/scripts/glsa_201003_01.nasl
   trunk/openvas-plugins/scripts/healthd_detect.nasl
   trunk/openvas-plugins/scripts/kerio_firewall_admin_port.nasl
   trunk/openvas-plugins/scripts/lotus_domino_xss.nasl
   trunk/openvas-plugins/scripts/mdksa_2009_012.nasl
   trunk/openvas-plugins/scripts/mdksa_2009_039.nasl
   trunk/openvas-plugins/scripts/mdksa_2009_106_1.nasl
   trunk/openvas-plugins/scripts/mdksa_2009_120.nasl
   trunk/openvas-plugins/scripts/mdksa_2009_127.nasl
   trunk/openvas-plugins/scripts/mdksa_2009_141.nasl
   trunk/openvas-plugins/scripts/mdksa_2009_178.nasl
   trunk/openvas-plugins/scripts/mdksa_2009_192.nasl
   trunk/openvas-plugins/scripts/mdksa_2009_195.nasl
   trunk/openvas-plugins/scripts/mdksa_2009_311.nasl
   trunk/openvas-plugins/scripts/mediahouse_statistics_web_server.nasl
   trunk/openvas-plugins/scripts/opera_favicon_address_bar_spoofing.nasl
   trunk/openvas-plugins/scripts/ovcesa2009_0012.nasl
   trunk/openvas-plugins/scripts/ovcesa2009_0275.nasl
   trunk/openvas-plugins/scripts/record_route.nasl
   trunk/openvas-plugins/scripts/secpod_apache_apr-utils_xml_dos_vuln.nasl
   trunk/openvas-plugins/scripts/secpod_apache_mod_proxy_ftp_xss_vuln_900107.nasl
   trunk/openvas-plugins/scripts/secpod_campsite_detect.nasl
   trunk/openvas-plugins/scripts/secpod_clamav_dos_vuln_win.nasl
   trunk/openvas-plugins/scripts/secpod_cybozu_office_auth_bypass_vuln_lin.nasl
   trunk/openvas-plugins/scripts/secpod_firefox_javascript_sec_bypass_vuln_win.nasl
   trunk/openvas-plugins/scripts/secpod_freeradius_detect.nasl
   trunk/openvas-plugins/scripts/secpod_freeway_php_info_disc_vuln.nasl
   trunk/openvas-plugins/scripts/secpod_google_chrome_use_after_free_vuln_lin.nasl
   trunk/openvas-plugins/scripts/secpod_mailenable_imap_dos_vuln_900104.nasl
   trunk/openvas-plugins/scripts/secpod_ms11-055.nasl
   trunk/openvas-plugins/scripts/secpod_ms11-072.nasl
   trunk/openvas-plugins/scripts/secpod_ms_dns_mem_corr_vuln.nasl
   trunk/openvas-plugins/scripts/secpod_noticeware_mail_server_dos_vuln.nasl
   trunk/openvas-plugins/scripts/secpod_sun_java_dir_server_detect_lin.nasl
   trunk/openvas-plugins/scripts/secpod_tightvnc_detect_lin.nasl
   trunk/openvas-plugins/scripts/sles10_dhcp.nasl
   trunk/openvas-plugins/scripts/sles10_libexif5.nasl
   trunk/openvas-plugins/scripts/sles10_postfix0.nasl
   trunk/openvas-plugins/scripts/sles9p5014116.nasl
   trunk/openvas-plugins/scripts/sles9p5014323.nasl
   trunk/openvas-plugins/scripts/sles9p5017607.nasl
   trunk/openvas-plugins/scripts/sles9p5018750.nasl
   trunk/openvas-plugins/scripts/sles9p5021688.nasl
   trunk/openvas-plugins/scripts/sles9p5039520.nasl
   trunk/openvas-plugins/scripts/sles9p5050540.nasl
   trunk/openvas-plugins/scripts/smb_mssql7.nasl
   trunk/openvas-plugins/scripts/snitz_forums_2000_37637.nasl
   trunk/openvas-plugins/scripts/tiger_dms_34775.nasl
   trunk/openvas-plugins/scripts/ubuntu_734_1.nasl
   trunk/openvas-plugins/scripts/ubuntu_755_1.nasl
   trunk/openvas-plugins/scripts/www_infinite_request_DoS.nasl
Log:
* scripts/sles9p5014323.nasl,
scripts/secpod_ms11-072.nasl,
scripts/glsa_200810_03.nasl,
scripts/gb_fedora_2011_6205_thunderbird_fc13.nasl,
scripts/secpod_freeradius_detect.nasl,
scripts/fcore_2009_3064.nasl,
scripts/gb_ibm_openadmin_tool_detect.nasl,
scripts/fcore_2009_8114.nasl,
scripts/gb_mandriva_MDVSA_2010_123.nasl,
scripts/glsa_200904_06.nasl,
scripts/gb_mandriva_MDKA_2007_119.nasl,
scripts/deb_2101_1.nasl,
scripts/gb_RHSA-2011_1073-01_bash.nasl,
scripts/mdksa_2009_195.nasl,
scripts/kerio_firewall_admin_port.nasl,
scripts/glsa_200804_03.nasl,
scripts/deb_425_1.nasl,
scripts/www_infinite_request_DoS.nasl,
scripts/deb_878_1.nasl,
scripts/deb_071_1.nasl,
scripts/mdksa_2009_039.nasl,
scripts/DDI_Unprotected_PCanywhere.nasl,
scripts/sles10_postfix0.nasl,
scripts/deb_1144_1.nasl,
scripts/glsa_200809_02.nasl,
scripts/gb_fedora_2008_11511_yelp_fc10.nasl,
scripts/mdksa_2009_178.nasl,
scripts/gb_solaris_138577_01.nasl,
scripts/glsa_200705_17.nasl,
scripts/fcore_2009_8770.nasl,
scripts/gb_oscommerce_malware.nasl,
scripts/gb_fedora_2010_7640_boa_fc12.nasl,
scripts/glsa_200510_09.nasl,
scripts/freebsdsa_compress.nasl,
scripts/gb_CESA-2010_0680_seamonkey_centos3_i386.nasl,
scripts/gb_solaris_120740_05.nasl,
scripts/gb_apple_safari_object_tag_dos_vuln.nasl,
scripts/gb_zen_time_tracking_mult_sql_inj_vuln.nasl,
scripts/gb_RHSA-2008_0528-01_ucd-snmp.nasl,
scripts/freebsd_imap-uw.nasl,
scripts/fcore_2009_7898.nasl,
scripts/gb_RHSA-2010_0113-01_seamonkey.nasl,
scripts/deb_2245_1.nasl,
scripts/deb_1992_1.nasl,
scripts/gb_google_chrome_mult_vuln_jan11_lin.nasl,
scripts/gb_ubuntu_USN_914_1.nasl,
scripts/gb_winftp_serv_bof_vuln.nasl,
scripts/secpod_tightvnc_detect_lin.nasl,
scripts/citrix_xss.nasl,
scripts/secpod_campsite_detect.nasl,
scripts/fspd_directory_traversal.nasl,
scripts/gb_CESA-2009_1646_libtool_centos3_i386.nasl,
scripts/gb_mandriva_MDKSA_2007_185.nasl,
scripts/freebsd_sudo5.nasl,
scripts/deb_097_1.nasl,
scripts/gb_ubuntu_USN_495_1.nasl,
scripts/ubuntu_734_1.nasl,
scripts/gb_fedora_2008_1287_deluge_fc8.nasl,
scripts/freebsd_amaya.nasl,
scripts/deb_1533_1.nasl,
scripts/freebsd_typo32.nasl,
scripts/gb_CESA-2010_0343_krb5-devel_centos5_i386.nasl,
scripts/mdksa_2009_127.nasl,
scripts/gb_adobe_shockwave_player_bof_vuln_jan10.nasl,
scripts/deb_1468_1.nasl,
scripts/gb_CESA-2008_0546-01_php_centos2_i386.nasl,
scripts/gb_fedora_2011_11106_firefox_fc15.nasl,
scripts/freebsd_drupal510.nasl,
scripts/deb_1627_2.nasl,
scripts/gb_fedora_2008_9633_optipng_fc9.nasl,
scripts/gb_mandriva_MDVSA_2010_010.nasl,
scripts/gb_fedora_2011_7555_unbound_fc14.nasl,
scripts/dopewars_server_36606.nasl,
scripts/gb_opera_mult_vuln_oct10_win.nasl,
scripts/gb_fedora_2008_9597_lynx_fc8.nasl,
scripts/gb_mandriva_MDVA_2008_037.nasl,
scripts/freebsd_phpMyAdmin16.nasl,
scripts/gb_fedora_2010_1863_maildrop_fc12.nasl,
scripts/freebsd_opera3.nasl,
scripts/deb_676_1.nasl,
scripts/gb_fedora_2008_0462_libxml2_fc8.nasl,
scripts/gb_CESA-2008_0896_irb_centos3_i386.nasl,
scripts/glsa_200507_26.nasl,
scripts/gb_emc_networker_detect.nasl,
scripts/freebsd_dokuwiki5.nasl,
scripts/gb_thunderbird_detect_win.nasl,
scripts/fcore_2009_2122.nasl,
scripts/secpod_freeway_php_info_disc_vuln.nasl,
scripts/gb_ms_win_media_player_int_overflow_vuln.nasl,
scripts/gb_CESA-2008_0002_tog-pegasus_centos4_x86_64.nasl,
scripts/gb_bugzilla_44618.nasl,
scripts/mdksa_2009_120.nasl,
scripts/account_db2as_db2as.nasl,
scripts/gb_fedora_2010_18425_krb5_fc13.nasl,
scripts/lotus_domino_xss.nasl,
scripts/gb_CESA-2011_1065_kernel_centos5_i386.nasl,
scripts/deb_1873_1.nasl,
scripts/gb_hp_ux_HPSBUX00141.nasl,
scripts/glsa_200801_17.nasl,
scripts/gb_vlc_media_player_bookmark_bof_vuln_win.nasl,
scripts/deb_662_2.nasl,
scripts/gb_fedora_2010_14501_phpMyAdmin_fc14.nasl,
scripts/glsa_200807_14.nasl,
scripts/gb_mandriva_MDVSA_2008_105.nasl,
scripts/deb_863_1.nasl,
scripts/gb_solaris_122911_16.nasl,
scripts/deb_1859_1.nasl,
scripts/freebsd_gtar2.nasl,
scripts/gb_fedora_2008_2464_dovecot_fc8.nasl,
scripts/gb_fedora_2010_14832_kernel_fc14.nasl,
scripts/sles10_dhcp.nasl,
scripts/deb_574_1.nasl,
scripts/gb_fedora_2011_7818_jabberd_fc13.nasl,
scripts/gb_solaris_110458_02.nasl,
scripts/freebsd_mantis1.nasl,
scripts/gb_fedora_2010_5515_gnome-python2-extras_fc11.nasl,
scripts/gb_solaris_119254_66.nasl,
scripts/secpod_noticeware_mail_server_dos_vuln.nasl,
scripts/gb_CESA-2008_0105_thunderbird_centos5_x86_64.nasl,
scripts/gb_hp_ux_HPSBUX02073.nasl,
scripts/gb_ms_ie_bof_vuln_jul09.nasl,
scripts/gb_fedora_2007_422_libXfont_fc5.nasl,
scripts/freebsd_net-snmp1.nasl,
scripts/deb_1185_1.nasl,
scripts/freebsd_faad2.nasl,
scripts/record_route.nasl,
scripts/glsa_200405_20.nasl,
scripts/mdksa_2009_141.nasl,
scripts/gb_php_script_directory_sql_inj_vuln.nasl,
scripts/gb_fedora_2007_2652_tempest_fc7.nasl,
scripts/fcore_2009_1204.nasl,
scripts/gb_open_urgence_vaccin_detect.nasl,
scripts/gb_mandriva_MDVA_2010_048.nasl,
scripts/gb_CESA-2010_0398_kernel_centos5_i386.nasl,
scripts/gb_RealVNC_39895.nasl,
scripts/fcore_2009_2149.nasl,
scripts/gb_fedora_2011_13465_xulrunner_fc15.nasl,
scripts/gb_mandriva_MDKSA_2007_175.nasl,
scripts/sles9p5018750.nasl,
scripts/gb_mandriva_MDVSA_2009_241_1.nasl,
scripts/gb_RHSA-2007_1129-01_autofs5.nasl,
scripts/freebsd_postgresql-contrib.nasl,
scripts/directory_manager.nasl,
scripts/RHSA_2009_1233.nasl,
scripts/secpod_google_chrome_use_after_free_vuln_lin.nasl,
scripts/secpod_clamav_dos_vuln_win.nasl,
scripts/sles9p5014116.nasl,
scripts/gb_RHSA-2010_0768-01_java-1.6.0-openjdk.nasl,
scripts/gb_CESA-2008_0515_evolution28_centos4_i386.nasl,
scripts/gb_fedora_2007_740_cups_fc6.nasl,
scripts/gb_fedora_2010_10400_python-paste_fc11.nasl,
scripts/gb_peazip_detect_win.nasl,
scripts/gb_sahana_45730.nasl,
scripts/gb_ms11-035_remote.nasl,
scripts/secpod_apache_apr-utils_xml_dos_vuln.nasl,
scripts/glsa_200507_13.nasl,
scripts/deb_2028_1.nasl,
scripts/gb_google_chrome_ftp_clnt_xss_vuln.nasl,
scripts/mdksa_2009_012.nasl,
scripts/gb_CESA-2011_0491_python_centos4_i386.nasl,
scripts/secpod_ms_dns_mem_corr_vuln.nasl,
scripts/secpod_mailenable_imap_dos_vuln_900104.nasl,
scripts/secpod_firefox_javascript_sec_bypass_vuln_win.nasl,
scripts/mdksa_2009_192.nasl,
scripts/glsa_200604_02.nasl,
scripts/cisco_vpn_client_detect.nasl,
scripts/gb_mozilla_prdts_mult_vuln_win_sep10.nasl,
scripts/SiteX_35122.nasl,
scripts/gb_s40_cms_xss_vuln.nasl,
scripts/fcore_2009_8498.nasl,
scripts/deb_804_1.nasl,
scripts/gb_CESA-2008_0161_cups_centos5_x86_64.nasl,
scripts/gb_CESA-2011_0394_luci_centos5_i386.nasl,
scripts/gb_mandriva_MDVSA_2008_080.nasl,
scripts/domino_authentication_bypass.nasl,
scripts/freebsd_hlstats.nasl,
scripts/deb_2270_1.nasl,
scripts/gb_ubuntu_USN_1042_1.nasl,
scripts/boastMachine_37940.nasl,
scripts/deb_1257_1.nasl,
scripts/gb_mandriva_MDVSA_2008_167.nasl,
scripts/snitz_forums_2000_37637.nasl,
scripts/freebsd_mod_jk-ap2.nasl,
scripts/glsa_200812_23.nasl,
scripts/glsa_200805_12.nasl,
scripts/freebsd_picasm.nasl,
scripts/sles9p5050540.nasl,
scripts/gb_fedora_2010_16782_moodle_fc13.nasl,
scripts/gb_nuralstorm_webmail_41559.nasl,
scripts/gb_sun_java_sys_web_serv_heap_bof_vuln_lin.nasl,
scripts/mdksa_2009_311.nasl,
scripts/gb_mandriva_MDVA_2010_059.nasl,
scripts/freebsd_p5-Mail-SpamAssassin2.nasl,
scripts/RHSA_2009_1465.nasl,
scripts/healthd_detect.nasl,
scripts/gb_wireshark_bytes_repr_len_dos_vuln_win.nasl,
scripts/gb_mandriva_MDKA_2007_136.nasl,
scripts/deb_657_1.nasl,
scripts/gb_apache_tomcat_mod_jk_info_disc_vuln.nasl,
scripts/gb_ubuntu_USN_943_1.nasl,
scripts/gb_mandriva_MDVSA_2011_063.nasl,
scripts/secpod_sun_java_dir_server_detect_lin.nasl,
scripts/secpod_apache_mod_proxy_ftp_xss_vuln_900107.nasl,
scripts/deb_861_1.nasl,
scripts/gb_mandriva_MDKSA_2007_020.nasl,
scripts/fcore_2009_6279.nasl,
scripts/glsa_200606_02.nasl,
scripts/opera_favicon_address_bar_spoofing.nasl,
scripts/gb_CESA-2011_0375_seamonkey_centos4_i386.nasl,
scripts/gb_CESA-2010_0606_kernel_centos4_i386.nasl,
scripts/freebsdsa_mbuf.nasl,
scripts/sles9p5017607.nasl,
scripts/freebsd_vtiger.nasl,
scripts/gb_fedora_2010_1941_openoffice.org_fc11.nasl,
scripts/secpod_cybozu_office_auth_bypass_vuln_lin.nasl,
scripts/gb_fedora_2008_2987_PolicyKit_fc8.nasl,
scripts/freebsd_mgetty+sendfax.nasl,
scripts/glsa_200502_28.nasl,
scripts/glsa_201003_01.nasl,
scripts/sles10_libexif5.nasl,
scripts/gb_openttd_mult_use_after_free_dos_vuln.nasl,
scripts/fcore_2009_12481.nasl,
scripts/secpod_ms11-055.nasl,
scripts/deb_1355_1.nasl,
scripts/smb_mssql7.nasl,
scripts/freebsd_pidgin0.nasl,
scripts/mediahouse_statistics_web_server.nasl,
scripts/deb_1342_1.nasl,
scripts/glsa_200712_17.nasl,
scripts/gb_fedora_2010_4339_gnu-smalltalk_fc12.nasl,
scripts/gb_mandriva_MDVA_2008_118.nasl,
scripts/gb_ubuntu_USN_1037_1.nasl,
scripts/gb_solaris_115754_02.nasl,
scripts/AnswerBook2_12746.nasl,
scripts/deb_1929_1.nasl,
scripts/gb_fedora_2011_8627_perl-Gtk2-MozEmbed_fc15.nasl,
scripts/gb_community_server_49022.nasl,
scripts/freebsd_krb57.nasl,
scripts/bugbear_b_1080.nasl,
scripts/mdksa_2009_106_1.nasl,
scripts/freebsd_openssl2.nasl,
scripts/freebsd_ca_root_nss.nasl,
scripts/glsa_200809_17.nasl,
scripts/glsa_200603_01.nasl,
scripts/sles9p5021688.nasl,
scripts/RHSA_2009_1673.nasl,
scripts/gb_fedora_2008_2678_namazu_fc7.nasl,
scripts/gb_mozilla_prdts_load_subscript_sec_bypass_vuln_win.nasl,
scripts/deb_1383_1.nasl,
scripts/gb_phpmyadmin_42591.nasl,
scripts/gb_ubuntu_USN_543_1.nasl,
scripts/deb_704_1.nasl,
scripts/gb_mandriva_MDVSA_2011_017.nasl,
scripts/citrusdb_cc_disclosure.nasl,
scripts/glsa_200409_33.nasl,
scripts/gb_mandriva_MDVA_2008_112.nasl,
scripts/gb_mandriva_MDVA_2008_012.nasl,
scripts/gb_ms_smtp_dns_spoofing_vulnerability.nasl,
scripts/gb_CESA-2011_1160_dhclient_centos4_i386.nasl,
scripts/gb_pligg_mult_sql_inj_vuln.nasl,
scripts/deb_1694_2.nasl,
scripts/finger_akfingerd.nasl,
scripts/freebsd_libxml.nasl,
scripts/gb_mandriva_MDKSA_2007_181.nasl,
scripts/gb_solaris_117471_04.nasl,
scripts/tiger_dms_34775.nasl,
scripts/gb_elecard_mpeg_player_bof_vuln.nasl,
scripts/fcore_2009_10539.nasl,
scripts/fcore_2008_11848.nasl,
scripts/gb_openx_auth_bypass_vuln.nasl,
scripts/gb_mandriva_MDKSA_2007_209.nasl,
scripts/sles9p5039520.nasl,
scripts/gb_solaris_116479_02.nasl,
scripts/gb_CESA-2009_1522_kernel_centos4_i386.nasl,
scripts/deb_1531_2.nasl,
scripts/advanced_guestbook.nasl,
scripts/deb_1719_2.nasl,
scripts/gb_fedora_2010_5526_thunderbird_fc11.nasl,
scripts/gb_fedora_2010_11428_php_fc12.nasl,
scripts/freebsd_dnrd.nasl,
scripts/gb_RHSA-2008_0175-01_openoffice.org.nasl,
scripts/gb_fedora_2010_5539_thunderbird_fc12.nasl,
scripts/ovcesa2009_0275.nasl,
scripts/gb_mandriva_MDVSA_2010_128.nasl,
scripts/gb_firefox_mult_vuln_mar09_lin.nasl,
scripts/deb_1502_1.nasl,
scripts/freebsd_mysql-server4.nasl,
scripts/glsa_200407_21.nasl,
scripts/gb_mandriva_MDVSA_2008_206.nasl,
scripts/ubuntu_755_1.nasl,
scripts/gb_mandriva_MDKSA_2007_032.nasl,
scripts/glsa_200407_11.nasl,
scripts/gb_adobe_prdts_code_exec_vuln_lin.nasl,
scripts/gb_fedora_2011_8036_pam_ssh_fc13.nasl,
scripts/gb_php_sql_inj_vuln.nasl,
scripts/deb_2049_1.nasl,
scripts/gb_coldcalendar_eventid_sql_inj_vuln.nasl,
scripts/RHSA_2009_0010.nasl,
scripts/gb_mediawiki_clickjacking_vuln.nasl,
scripts/ovcesa2009_0012.nasl:
Updated script metadata (changes for CR56).



Modified: trunk/openvas-plugins/ChangeLog
===================================================================
--- trunk/openvas-plugins/ChangeLog	2011-11-09 16:10:49 UTC (rev 12074)
+++ trunk/openvas-plugins/ChangeLog	2011-11-09 16:18:42 UTC (rev 12075)
@@ -1,5 +1,309 @@
 2011-11-09  Henri Doreau <henri.doreau at greenbone.net>
 
+	* scripts/sles9p5014323.nasl,
+	scripts/secpod_ms11-072.nasl,
+	scripts/glsa_200810_03.nasl,
+	scripts/gb_fedora_2011_6205_thunderbird_fc13.nasl,
+	scripts/secpod_freeradius_detect.nasl,
+	scripts/fcore_2009_3064.nasl,
+	scripts/gb_ibm_openadmin_tool_detect.nasl,
+	scripts/fcore_2009_8114.nasl,
+	scripts/gb_mandriva_MDVSA_2010_123.nasl,
+	scripts/glsa_200904_06.nasl,
+	scripts/gb_mandriva_MDKA_2007_119.nasl,
+	scripts/deb_2101_1.nasl,
+	scripts/gb_RHSA-2011_1073-01_bash.nasl,
+	scripts/mdksa_2009_195.nasl,
+	scripts/kerio_firewall_admin_port.nasl,
+	scripts/glsa_200804_03.nasl,
+	scripts/deb_425_1.nasl,
+	scripts/www_infinite_request_DoS.nasl,
+	scripts/deb_878_1.nasl,
+	scripts/deb_071_1.nasl,
+	scripts/mdksa_2009_039.nasl,
+	scripts/DDI_Unprotected_PCanywhere.nasl,
+	scripts/sles10_postfix0.nasl,
+	scripts/deb_1144_1.nasl,
+	scripts/glsa_200809_02.nasl,
+	scripts/gb_fedora_2008_11511_yelp_fc10.nasl,
+	scripts/mdksa_2009_178.nasl,
+	scripts/gb_solaris_138577_01.nasl,
+	scripts/glsa_200705_17.nasl,
+	scripts/fcore_2009_8770.nasl,
+	scripts/gb_oscommerce_malware.nasl,
+	scripts/gb_fedora_2010_7640_boa_fc12.nasl,
+	scripts/glsa_200510_09.nasl,
+	scripts/freebsdsa_compress.nasl,
+	scripts/gb_CESA-2010_0680_seamonkey_centos3_i386.nasl,
+	scripts/gb_solaris_120740_05.nasl,
+	scripts/gb_apple_safari_object_tag_dos_vuln.nasl,
+	scripts/gb_zen_time_tracking_mult_sql_inj_vuln.nasl,
+	scripts/gb_RHSA-2008_0528-01_ucd-snmp.nasl,
+	scripts/freebsd_imap-uw.nasl,
+	scripts/fcore_2009_7898.nasl,
+	scripts/gb_RHSA-2010_0113-01_seamonkey.nasl,
+	scripts/deb_2245_1.nasl,
+	scripts/deb_1992_1.nasl,
+	scripts/gb_google_chrome_mult_vuln_jan11_lin.nasl,
+	scripts/gb_ubuntu_USN_914_1.nasl,
+	scripts/gb_winftp_serv_bof_vuln.nasl,
+	scripts/secpod_tightvnc_detect_lin.nasl,
+	scripts/citrix_xss.nasl,
+	scripts/secpod_campsite_detect.nasl,
+	scripts/fspd_directory_traversal.nasl,
+	scripts/gb_CESA-2009_1646_libtool_centos3_i386.nasl,
+	scripts/gb_mandriva_MDKSA_2007_185.nasl,
+	scripts/freebsd_sudo5.nasl,
+	scripts/deb_097_1.nasl,
+	scripts/gb_ubuntu_USN_495_1.nasl,
+	scripts/ubuntu_734_1.nasl,
+	scripts/gb_fedora_2008_1287_deluge_fc8.nasl,
+	scripts/freebsd_amaya.nasl,
+	scripts/deb_1533_1.nasl,
+	scripts/freebsd_typo32.nasl,
+	scripts/gb_CESA-2010_0343_krb5-devel_centos5_i386.nasl,
+	scripts/mdksa_2009_127.nasl,
+	scripts/gb_adobe_shockwave_player_bof_vuln_jan10.nasl,
+	scripts/deb_1468_1.nasl,
+	scripts/gb_CESA-2008_0546-01_php_centos2_i386.nasl,
+	scripts/gb_fedora_2011_11106_firefox_fc15.nasl,
+	scripts/freebsd_drupal510.nasl,
+	scripts/deb_1627_2.nasl,
+	scripts/gb_fedora_2008_9633_optipng_fc9.nasl,
+	scripts/gb_mandriva_MDVSA_2010_010.nasl,
+	scripts/gb_fedora_2011_7555_unbound_fc14.nasl,
+	scripts/dopewars_server_36606.nasl,
+	scripts/gb_opera_mult_vuln_oct10_win.nasl,
+	scripts/gb_fedora_2008_9597_lynx_fc8.nasl,
+	scripts/gb_mandriva_MDVA_2008_037.nasl,
+	scripts/freebsd_phpMyAdmin16.nasl,
+	scripts/gb_fedora_2010_1863_maildrop_fc12.nasl,
+	scripts/freebsd_opera3.nasl,
+	scripts/deb_676_1.nasl,
+	scripts/gb_fedora_2008_0462_libxml2_fc8.nasl,
+	scripts/gb_CESA-2008_0896_irb_centos3_i386.nasl,
+	scripts/glsa_200507_26.nasl,
+	scripts/gb_emc_networker_detect.nasl,
+	scripts/freebsd_dokuwiki5.nasl,
+	scripts/gb_thunderbird_detect_win.nasl,
+	scripts/fcore_2009_2122.nasl,
+	scripts/secpod_freeway_php_info_disc_vuln.nasl,
+	scripts/gb_ms_win_media_player_int_overflow_vuln.nasl,
+	scripts/gb_CESA-2008_0002_tog-pegasus_centos4_x86_64.nasl,
+	scripts/gb_bugzilla_44618.nasl,
+	scripts/mdksa_2009_120.nasl,
+	scripts/account_db2as_db2as.nasl,
+	scripts/gb_fedora_2010_18425_krb5_fc13.nasl,
+	scripts/lotus_domino_xss.nasl,
+	scripts/gb_CESA-2011_1065_kernel_centos5_i386.nasl,
+	scripts/deb_1873_1.nasl,
+	scripts/gb_hp_ux_HPSBUX00141.nasl,
+	scripts/glsa_200801_17.nasl,
+	scripts/gb_vlc_media_player_bookmark_bof_vuln_win.nasl,
+	scripts/deb_662_2.nasl,
+	scripts/gb_fedora_2010_14501_phpMyAdmin_fc14.nasl,
+	scripts/glsa_200807_14.nasl,
+	scripts/gb_mandriva_MDVSA_2008_105.nasl,
+	scripts/deb_863_1.nasl,
+	scripts/gb_solaris_122911_16.nasl,
+	scripts/deb_1859_1.nasl,
+	scripts/freebsd_gtar2.nasl,
+	scripts/gb_fedora_2008_2464_dovecot_fc8.nasl,
+	scripts/gb_fedora_2010_14832_kernel_fc14.nasl,
+	scripts/sles10_dhcp.nasl,
+	scripts/deb_574_1.nasl,
+	scripts/gb_fedora_2011_7818_jabberd_fc13.nasl,
+	scripts/gb_solaris_110458_02.nasl,
+	scripts/freebsd_mantis1.nasl,
+	scripts/gb_fedora_2010_5515_gnome-python2-extras_fc11.nasl,
+	scripts/gb_solaris_119254_66.nasl,
+	scripts/secpod_noticeware_mail_server_dos_vuln.nasl,
+	scripts/gb_CESA-2008_0105_thunderbird_centos5_x86_64.nasl,
+	scripts/gb_hp_ux_HPSBUX02073.nasl,
+	scripts/gb_ms_ie_bof_vuln_jul09.nasl,
+	scripts/gb_fedora_2007_422_libXfont_fc5.nasl,
+	scripts/freebsd_net-snmp1.nasl,
+	scripts/deb_1185_1.nasl,
+	scripts/freebsd_faad2.nasl,
+	scripts/record_route.nasl,
+	scripts/glsa_200405_20.nasl,
+	scripts/mdksa_2009_141.nasl,
+	scripts/gb_php_script_directory_sql_inj_vuln.nasl,
+	scripts/gb_fedora_2007_2652_tempest_fc7.nasl,
+	scripts/fcore_2009_1204.nasl,
+	scripts/gb_open_urgence_vaccin_detect.nasl,
+	scripts/gb_mandriva_MDVA_2010_048.nasl,
+	scripts/gb_CESA-2010_0398_kernel_centos5_i386.nasl,
+	scripts/gb_RealVNC_39895.nasl,
+	scripts/fcore_2009_2149.nasl,
+	scripts/gb_fedora_2011_13465_xulrunner_fc15.nasl,
+	scripts/gb_mandriva_MDKSA_2007_175.nasl,
+	scripts/sles9p5018750.nasl,
+	scripts/gb_mandriva_MDVSA_2009_241_1.nasl,
+	scripts/gb_RHSA-2007_1129-01_autofs5.nasl,
+	scripts/freebsd_postgresql-contrib.nasl,
+	scripts/directory_manager.nasl,
+	scripts/RHSA_2009_1233.nasl,
+	scripts/secpod_google_chrome_use_after_free_vuln_lin.nasl,
+	scripts/secpod_clamav_dos_vuln_win.nasl,
+	scripts/sles9p5014116.nasl,
+	scripts/gb_RHSA-2010_0768-01_java-1.6.0-openjdk.nasl,
+	scripts/gb_CESA-2008_0515_evolution28_centos4_i386.nasl,
+	scripts/gb_fedora_2007_740_cups_fc6.nasl,
+	scripts/gb_fedora_2010_10400_python-paste_fc11.nasl,
+	scripts/gb_peazip_detect_win.nasl,
+	scripts/gb_sahana_45730.nasl,
+	scripts/gb_ms11-035_remote.nasl,
+	scripts/secpod_apache_apr-utils_xml_dos_vuln.nasl,
+	scripts/glsa_200507_13.nasl,
+	scripts/deb_2028_1.nasl,
+	scripts/gb_google_chrome_ftp_clnt_xss_vuln.nasl,
+	scripts/mdksa_2009_012.nasl,
+	scripts/gb_CESA-2011_0491_python_centos4_i386.nasl,
+	scripts/secpod_ms_dns_mem_corr_vuln.nasl,
+	scripts/secpod_mailenable_imap_dos_vuln_900104.nasl,
+	scripts/secpod_firefox_javascript_sec_bypass_vuln_win.nasl,
+	scripts/mdksa_2009_192.nasl,
+	scripts/glsa_200604_02.nasl,
+	scripts/cisco_vpn_client_detect.nasl,
+	scripts/gb_mozilla_prdts_mult_vuln_win_sep10.nasl,
+	scripts/SiteX_35122.nasl,
+	scripts/gb_s40_cms_xss_vuln.nasl,
+	scripts/fcore_2009_8498.nasl,
+	scripts/deb_804_1.nasl,
+	scripts/gb_CESA-2008_0161_cups_centos5_x86_64.nasl,
+	scripts/gb_CESA-2011_0394_luci_centos5_i386.nasl,
+	scripts/gb_mandriva_MDVSA_2008_080.nasl,
+	scripts/domino_authentication_bypass.nasl,
+	scripts/freebsd_hlstats.nasl,
+	scripts/deb_2270_1.nasl,
+	scripts/gb_ubuntu_USN_1042_1.nasl,
+	scripts/boastMachine_37940.nasl,
+	scripts/deb_1257_1.nasl,
+	scripts/gb_mandriva_MDVSA_2008_167.nasl,
+	scripts/snitz_forums_2000_37637.nasl,
+	scripts/freebsd_mod_jk-ap2.nasl,
+	scripts/glsa_200812_23.nasl,
+	scripts/glsa_200805_12.nasl,
+	scripts/freebsd_picasm.nasl,
+	scripts/sles9p5050540.nasl,
+	scripts/gb_fedora_2010_16782_moodle_fc13.nasl,
+	scripts/gb_nuralstorm_webmail_41559.nasl,
+	scripts/gb_sun_java_sys_web_serv_heap_bof_vuln_lin.nasl,
+	scripts/mdksa_2009_311.nasl,
+	scripts/gb_mandriva_MDVA_2010_059.nasl,
+	scripts/freebsd_p5-Mail-SpamAssassin2.nasl,
+	scripts/RHSA_2009_1465.nasl,
+	scripts/healthd_detect.nasl,
+	scripts/gb_wireshark_bytes_repr_len_dos_vuln_win.nasl,
+	scripts/gb_mandriva_MDKA_2007_136.nasl,
+	scripts/deb_657_1.nasl,
+	scripts/gb_apache_tomcat_mod_jk_info_disc_vuln.nasl,
+	scripts/gb_ubuntu_USN_943_1.nasl,
+	scripts/gb_mandriva_MDVSA_2011_063.nasl,
+	scripts/secpod_sun_java_dir_server_detect_lin.nasl,
+	scripts/secpod_apache_mod_proxy_ftp_xss_vuln_900107.nasl,
+	scripts/deb_861_1.nasl,
+	scripts/gb_mandriva_MDKSA_2007_020.nasl,
+	scripts/fcore_2009_6279.nasl,
+	scripts/glsa_200606_02.nasl,
+	scripts/opera_favicon_address_bar_spoofing.nasl,
+	scripts/gb_CESA-2011_0375_seamonkey_centos4_i386.nasl,
+	scripts/gb_CESA-2010_0606_kernel_centos4_i386.nasl,
+	scripts/freebsdsa_mbuf.nasl,
+	scripts/sles9p5017607.nasl,
+	scripts/freebsd_vtiger.nasl,
+	scripts/gb_fedora_2010_1941_openoffice.org_fc11.nasl,
+	scripts/secpod_cybozu_office_auth_bypass_vuln_lin.nasl,
+	scripts/gb_fedora_2008_2987_PolicyKit_fc8.nasl,
+	scripts/freebsd_mgetty+sendfax.nasl,
+	scripts/glsa_200502_28.nasl,
+	scripts/glsa_201003_01.nasl,
+	scripts/sles10_libexif5.nasl,
+	scripts/gb_openttd_mult_use_after_free_dos_vuln.nasl,
+	scripts/fcore_2009_12481.nasl,
+	scripts/secpod_ms11-055.nasl,
+	scripts/deb_1355_1.nasl,
+	scripts/smb_mssql7.nasl,
+	scripts/freebsd_pidgin0.nasl,
+	scripts/mediahouse_statistics_web_server.nasl,
+	scripts/deb_1342_1.nasl,
+	scripts/glsa_200712_17.nasl,
+	scripts/gb_fedora_2010_4339_gnu-smalltalk_fc12.nasl,
+	scripts/gb_mandriva_MDVA_2008_118.nasl,
+	scripts/gb_ubuntu_USN_1037_1.nasl,
+	scripts/gb_solaris_115754_02.nasl,
+	scripts/AnswerBook2_12746.nasl,
+	scripts/deb_1929_1.nasl,
+	scripts/gb_fedora_2011_8627_perl-Gtk2-MozEmbed_fc15.nasl,
+	scripts/gb_community_server_49022.nasl,
+	scripts/freebsd_krb57.nasl,
+	scripts/bugbear_b_1080.nasl,
+	scripts/mdksa_2009_106_1.nasl,
+	scripts/freebsd_openssl2.nasl,
+	scripts/freebsd_ca_root_nss.nasl,
+	scripts/glsa_200809_17.nasl,
+	scripts/glsa_200603_01.nasl,
+	scripts/sles9p5021688.nasl,
+	scripts/RHSA_2009_1673.nasl,
+	scripts/gb_fedora_2008_2678_namazu_fc7.nasl,
+	scripts/gb_mozilla_prdts_load_subscript_sec_bypass_vuln_win.nasl,
+	scripts/deb_1383_1.nasl,
+	scripts/gb_phpmyadmin_42591.nasl,
+	scripts/gb_ubuntu_USN_543_1.nasl,
+	scripts/deb_704_1.nasl,
+	scripts/gb_mandriva_MDVSA_2011_017.nasl,
+	scripts/citrusdb_cc_disclosure.nasl,
+	scripts/glsa_200409_33.nasl,
+	scripts/gb_mandriva_MDVA_2008_112.nasl,
+	scripts/gb_mandriva_MDVA_2008_012.nasl,
+	scripts/gb_ms_smtp_dns_spoofing_vulnerability.nasl,
+	scripts/gb_CESA-2011_1160_dhclient_centos4_i386.nasl,
+	scripts/gb_pligg_mult_sql_inj_vuln.nasl,
+	scripts/deb_1694_2.nasl,
+	scripts/finger_akfingerd.nasl,
+	scripts/freebsd_libxml.nasl,
+	scripts/gb_mandriva_MDKSA_2007_181.nasl,
+	scripts/gb_solaris_117471_04.nasl,
+	scripts/tiger_dms_34775.nasl,
+	scripts/gb_elecard_mpeg_player_bof_vuln.nasl,
+	scripts/fcore_2009_10539.nasl,
+	scripts/fcore_2008_11848.nasl,
+	scripts/gb_openx_auth_bypass_vuln.nasl,
+	scripts/gb_mandriva_MDKSA_2007_209.nasl,
+	scripts/sles9p5039520.nasl,
+	scripts/gb_solaris_116479_02.nasl,
+	scripts/gb_CESA-2009_1522_kernel_centos4_i386.nasl,
+	scripts/deb_1531_2.nasl,
+	scripts/advanced_guestbook.nasl,
+	scripts/deb_1719_2.nasl,
+	scripts/gb_fedora_2010_5526_thunderbird_fc11.nasl,
+	scripts/gb_fedora_2010_11428_php_fc12.nasl,
+	scripts/freebsd_dnrd.nasl,
+	scripts/gb_RHSA-2008_0175-01_openoffice.org.nasl,
+	scripts/gb_fedora_2010_5539_thunderbird_fc12.nasl,
+	scripts/ovcesa2009_0275.nasl,
+	scripts/gb_mandriva_MDVSA_2010_128.nasl,
+	scripts/gb_firefox_mult_vuln_mar09_lin.nasl,
+	scripts/deb_1502_1.nasl,
+	scripts/freebsd_mysql-server4.nasl,
+	scripts/glsa_200407_21.nasl,
+	scripts/gb_mandriva_MDVSA_2008_206.nasl,
+	scripts/ubuntu_755_1.nasl,
+	scripts/gb_mandriva_MDKSA_2007_032.nasl,
+	scripts/glsa_200407_11.nasl,
+	scripts/gb_adobe_prdts_code_exec_vuln_lin.nasl,
+	scripts/gb_fedora_2011_8036_pam_ssh_fc13.nasl,
+	scripts/gb_php_sql_inj_vuln.nasl,
+	scripts/deb_2049_1.nasl,
+	scripts/gb_coldcalendar_eventid_sql_inj_vuln.nasl,
+	scripts/RHSA_2009_0010.nasl,
+	scripts/gb_mediawiki_clickjacking_vuln.nasl,
+	scripts/ovcesa2009_0012.nasl:
+	Updated script metadata (changes for CR56).
+
+2011-11-09  Henri Doreau <henri.doreau at greenbone.net>
+
 	* scripts/sles9p5018245.nasl,
 	scripts/deb_1523_1.nasl,
 	scripts/gb_winamp_gen_msn_bof_vuln.nasl,

Modified: trunk/openvas-plugins/scripts/AnswerBook2_12746.nasl
===================================================================
--- trunk/openvas-plugins/scripts/AnswerBook2_12746.nasl	2011-11-09 16:10:49 UTC (rev 12074)
+++ trunk/openvas-plugins/scripts/AnswerBook2_12746.nasl	2011-11-09 16:18:42 UTC (rev 12075)
@@ -28,6 +28,8 @@
 {
  script_id(100388);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2009-12-10 18:09:58 +0100 (Thu, 10 Dec 2009)");
  script_bugtraq_id(12746);
  script_cve_id("CVE-2005-0548","CVE-2005-0549");
  script_tag(name:"cvss_base", value:"4.3");
@@ -68,10 +70,8 @@
 http://wwws.sun.com/software//ab2/
 http://sunsolve.sun.com/search/document.do?assetkey=1-26-57737-1&searchclause=%22category:security%22%20%22availability,%20security%22
 http://www.securityfocus.com/archive/1/394429
-http://sunsolve.sun.com/search/document.do?assetkey=1-66-200305-1
+http://sunsolve.sun.com/search/document.do?assetkey=1-66-200305-1";
 
-Risk factor : Medium";
-
  script_description(desc);
  script_summary("Determine if AnswerBook2 is prone to multiple xss vulnerabilities");
  script_category(ACT_ATTACK);

Modified: trunk/openvas-plugins/scripts/DDI_Unprotected_PCanywhere.nasl
===================================================================
--- trunk/openvas-plugins/scripts/DDI_Unprotected_PCanywhere.nasl	2011-11-09 16:10:49 UTC (rev 12074)
+++ trunk/openvas-plugins/scripts/DDI_Unprotected_PCanywhere.nasl	2011-11-09 16:18:42 UTC (rev 12075)
@@ -26,6 +26,8 @@
 {
  script_id(10798);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2005-11-03 14:08:04 +0100 (Thu, 03 Nov 2005)");
  script_tag(name:"cvss_base", value:"4.6");
  script_tag(name:"risk_factor", value:"Medium");
  script_cve_id("CVE-1999-0508");
@@ -45,11 +47,9 @@
 2. Right click on the Host object you are using and select Properties.
 3. Select the Caller Access tab. 
 4. Switch the authentication type to Windows or PC Anywhere.
-5. If you are using PC Anywhere authentication, set a strong password.
+5. If you are using PC Anywhere authentication, set a strong password.";
 
-Risk factor: Medium";
 
-
  script_description(desc);
  
  summary = "Unprotected PC Anywhere Service";

Modified: trunk/openvas-plugins/scripts/RHSA_2009_0010.nasl
===================================================================
--- trunk/openvas-plugins/scripts/RHSA_2009_0010.nasl	2011-11-09 16:10:49 UTC (rev 12074)
+++ trunk/openvas-plugins/scripts/RHSA_2009_0010.nasl	2011-11-09 16:18:42 UTC (rev 12075)
@@ -29,6 +29,8 @@
 {
  script_id(63134);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2009-01-13 22:38:32 +0100 (Tue, 13 Jan 2009)");
  script_cve_id("CVE-2008-2379", "CVE-2008-3663");
  script_tag(name:"cvss_base", value:"5.0");
  script_tag(name:"risk_factor", value:"Medium");
@@ -70,10 +72,8 @@
 http://rhn.redhat.com/errata/RHSA-2009-0010.html
 http://www.redhat.com/security/updates/classification/#moderate
 http://www.squirrelmail.org/security/issue/2008-09-28
-http://www.squirrelmail.org/security/issue/2008-12-04
+http://www.squirrelmail.org/security/issue/2008-12-04";
 
-Risk factor : Medium";
-
  script_description(desc);
 
  summary = "Redhat Security Advisory RHSA-2009:0010";

Modified: trunk/openvas-plugins/scripts/RHSA_2009_1233.nasl
===================================================================
--- trunk/openvas-plugins/scripts/RHSA_2009_1233.nasl	2011-11-09 16:10:49 UTC (rev 12074)
+++ trunk/openvas-plugins/scripts/RHSA_2009_1233.nasl	2011-11-09 16:18:42 UTC (rev 12075)
@@ -29,6 +29,8 @@
 {
  script_id(64671);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2009-09-02 04:58:39 +0200 (Wed, 02 Sep 2009)");
  script_cve_id("CVE-2009-2692", "CVE-2009-2698");
  script_tag(name:"cvss_base", value:"7.2");
  script_tag(name:"risk_factor", value:"High");
@@ -65,10 +67,8 @@
 Hat Update Agent with the following command: up2date
 
 http://rhn.redhat.com/errata/RHSA-2009-1233.html
-http://www.redhat.com/security/updates/classification/#important
+http://www.redhat.com/security/updates/classification/#important";
 
-Risk factor : High";
-
  script_description(desc);
 
  script_summary("Redhat Security Advisory RHSA-2009:1233");

Modified: trunk/openvas-plugins/scripts/RHSA_2009_1465.nasl
===================================================================
--- trunk/openvas-plugins/scripts/RHSA_2009_1465.nasl	2011-11-09 16:10:49 UTC (rev 12074)
+++ trunk/openvas-plugins/scripts/RHSA_2009_1465.nasl	2011-11-09 16:18:42 UTC (rev 12075)
@@ -29,6 +29,8 @@
 {
  script_id(64990);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2009-10-06 02:49:40 +0200 (Tue, 06 Oct 2009)");
  script_cve_id("CVE-2009-3290");
  script_tag(name:"cvss_base", value:"7.2");
  script_tag(name:"risk_factor", value:"High");
@@ -56,10 +58,8 @@
 Hat Update Agent with the following command: up2date
 
 http://rhn.redhat.com/errata/RHSA-2009-1465.html
-http://www.redhat.com/security/updates/classification/#important
+http://www.redhat.com/security/updates/classification/#important";
 
-Risk factor : High";
-
  script_description(desc);
 
  script_summary("Redhat Security Advisory RHSA-2009:1465");

Modified: trunk/openvas-plugins/scripts/RHSA_2009_1673.nasl
===================================================================
--- trunk/openvas-plugins/scripts/RHSA_2009_1673.nasl	2011-11-09 16:10:49 UTC (rev 12074)
+++ trunk/openvas-plugins/scripts/RHSA_2009_1673.nasl	2011-11-09 16:18:42 UTC (rev 12075)
@@ -29,6 +29,8 @@
 {
  script_id(66536);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2009-12-30 21:58:43 +0100 (Wed, 30 Dec 2009)");
  script_cve_id("CVE-2009-3979", "CVE-2009-3983", "CVE-2009-3984");
  script_tag(name:"cvss_base", value:"9.3");
  script_tag(name:"risk_factor", value:"Critical");
@@ -66,10 +68,8 @@
 Hat Update Agent with the following command: up2date
 
 http://rhn.redhat.com/errata/RHSA-2009-1673.html
-http://www.redhat.com/security/updates/classification/#critical
+http://www.redhat.com/security/updates/classification/#critical";
 
-Risk factor: Critical";
-
  script_description(desc);
 
  script_summary("Redhat Security Advisory RHSA-2009:1673");

Modified: trunk/openvas-plugins/scripts/SiteX_35122.nasl
===================================================================
--- trunk/openvas-plugins/scripts/SiteX_35122.nasl	2011-11-09 16:10:49 UTC (rev 12074)
+++ trunk/openvas-plugins/scripts/SiteX_35122.nasl	2011-11-09 16:18:42 UTC (rev 12075)
@@ -28,6 +28,8 @@
 {
  script_id(100454);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2010-01-20 10:52:14 +0100 (Wed, 20 Jan 2010)");
  script_tag(name:"cvss_base", value:"7.5");
  script_cve_id("CVE-2009-1846");
  script_bugtraq_id(35122);
@@ -48,10 +50,8 @@
 
 References:
 http://www.securityfocus.com/bid/35122
-http://sitex.bjsintay.com/index.php
+http://sitex.bjsintay.com/index.php";
 
-Risk factor: High";
-
  script_description(desc);
  script_summary("Determine if SiteX is prone to multiple local file-include vulnerabilities");
  script_category(ACT_ATTACK);

Modified: trunk/openvas-plugins/scripts/account_db2as_db2as.nasl
===================================================================
--- trunk/openvas-plugins/scripts/account_db2as_db2as.nasl	2011-11-09 16:10:49 UTC (rev 12074)
+++ trunk/openvas-plugins/scripts/account_db2as_db2as.nasl	2011-11-09 16:18:42 UTC (rev 12075)
@@ -29,6 +29,8 @@
 {
  script_id(11864);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2005-11-03 14:08:04 +0100 (Thu, 03 Nov 2005)");
  script_tag(name:"cvss_base", value:"7.5");
  script_tag(name:"risk_factor", value:"High");
  script_cve_id("CVE-2001-0051");

Modified: trunk/openvas-plugins/scripts/advanced_guestbook.nasl
===================================================================
--- trunk/openvas-plugins/scripts/advanced_guestbook.nasl	2011-11-09 16:10:49 UTC (rev 12074)
+++ trunk/openvas-plugins/scripts/advanced_guestbook.nasl	2011-11-09 16:18:42 UTC (rev 12075)
@@ -26,6 +26,8 @@
 {
  script_id(18217);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2005-11-03 14:08:04 +0100 (Thu, 03 Nov 2005)");
  script_cve_id("CVE-2005-1548");
  script_bugtraq_id(13548);
  script_tag(name:"cvss_base", value:"7.5");
@@ -43,8 +45,7 @@
 arbirtrary commands against the remote database.
 
 
-Solution : Upgrade to the newest version of this software
-Risk factor : High";
+Solution : Upgrade to the newest version of this software";
 
 
 

Modified: trunk/openvas-plugins/scripts/boastMachine_37940.nasl
===================================================================
--- trunk/openvas-plugins/scripts/boastMachine_37940.nasl	2011-11-09 16:10:49 UTC (rev 12074)
+++ trunk/openvas-plugins/scripts/boastMachine_37940.nasl	2011-11-09 16:18:42 UTC (rev 12075)
@@ -28,6 +28,8 @@
 {
  script_id(100461);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2010-01-25 18:49:48 +0100 (Mon, 25 Jan 2010)");
  script_bugtraq_id(37940);
  script_tag(name:"risk_factor", value:"Medium");
 
@@ -48,10 +50,8 @@
 
 References:
 http://www.securityfocus.com/bid/37940
-http://boastology.com/
+http://boastology.com/";
 
-Risk factor : Medium";
-
  script_description(desc);
  script_summary("Determine if boastMachine version is 3.1");
  script_category(ACT_GATHER_INFO);

Modified: trunk/openvas-plugins/scripts/bugbear_b_1080.nasl
===================================================================
--- trunk/openvas-plugins/scripts/bugbear_b_1080.nasl	2011-11-09 16:10:49 UTC (rev 12074)
+++ trunk/openvas-plugins/scripts/bugbear_b_1080.nasl	2011-11-09 16:18:42 UTC (rev 12075)
@@ -26,6 +26,8 @@
 {
  script_id(11733);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2005-11-03 14:08:04 +0100 (Thu, 03 Nov 2005)");
 
  script_tag(name:"risk_factor", value:"Critical");
  name = "Bugbear.B worm";
@@ -44,11 +46,9 @@
 Solution: 
 - Use an Anti-Virus package to remove it.
 - Close your Windows shares
-- See http://www.symantec.com/avcenter/venc/data/w32.bugbear.b@mm.removal.tool.html
+- See http://www.symantec.com/avcenter/venc/data/w32.bugbear.b@mm.removal.tool.html";
 
-Risk factor : Critical";
 
-
  script_description(desc);
  
  summary = "Detect Bugbear.B worm";

Modified: trunk/openvas-plugins/scripts/cisco_vpn_client_detect.nasl
===================================================================
--- trunk/openvas-plugins/scripts/cisco_vpn_client_detect.nasl	2011-11-09 16:10:49 UTC (rev 12074)
+++ trunk/openvas-plugins/scripts/cisco_vpn_client_detect.nasl	2011-11-09 16:18:42 UTC (rev 12075)
@@ -26,6 +26,8 @@
 if (description) {
  script_id(80037);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2008-10-24 20:38:19 +0200 (Fri, 24 Oct 2008)");
  script_tag(name:"risk_factor", value:"None");
  script_description(desc);
 
@@ -33,9 +35,7 @@
  script_name(name);
 
  desc = "Overview: This script is detects the installed version of Cisco VPN
- Client and sets the result in KB.
-
- Risk Factor: None";
+ Client and sets the result in KB.";
  script_description(desc);
  summary = "Detects the version number of the Cisco VPN Client in use";
  script_summary(summary);

Modified: trunk/openvas-plugins/scripts/citrix_xss.nasl
===================================================================
--- trunk/openvas-plugins/scripts/citrix_xss.nasl	2011-11-09 16:10:49 UTC (rev 12074)
+++ trunk/openvas-plugins/scripts/citrix_xss.nasl	2011-11-09 16:18:42 UTC (rev 12075)
@@ -29,6 +29,8 @@
 {
  script_id(14626);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2005-11-03 14:08:04 +0100 (Thu, 03 Nov 2005)");
  script_bugtraq_id(4372);
  script_cve_id("CVE-2002-0504");
  script_xref(name:"OSVDB", value:"9256");
@@ -45,10 +47,8 @@
 scripting attack.
 
 With a specially crafted request, an attacker can cause arbitrary code 
-execution resulting in a loss of integrity.
+execution resulting in a loss of integrity.";
 
-Risk Factor : High";
-
  script_description(desc);
 
  summary = "Test Citrix NFuse_Application parameter XSS";

Modified: trunk/openvas-plugins/scripts/citrusdb_cc_disclosure.nasl
===================================================================
--- trunk/openvas-plugins/scripts/citrusdb_cc_disclosure.nasl	2011-11-09 16:10:49 UTC (rev 12074)
+++ trunk/openvas-plugins/scripts/citrusdb_cc_disclosure.nasl	2011-11-09 16:18:42 UTC (rev 12075)
@@ -30,6 +30,8 @@
 {
  script_id(16388);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2005-11-03 14:08:04 +0100 (Thu, 03 Nov 2005)");
  script_bugtraq_id(12402);
  script_cve_id("CVE-2005-0229");
  script_tag(name:"cvss_base", value:"5.0");
@@ -55,10 +57,8 @@
 
 Solution : Update to CitrusDB version 0.3.6 or higher and set the 
 option '$path_to_ccfile' in the configuration to a path not 
-accessible via HTTP.
+accessible via HTTP.";
 
-Risk factor: Medium";
-
  script_description(desc);
  
  summary = "Checks for the presence of IO directory of CitrusDB";

Modified: trunk/openvas-plugins/scripts/deb_071_1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/deb_071_1.nasl	2011-11-09 16:10:49 UTC (rev 12074)
+++ trunk/openvas-plugins/scripts/deb_071_1.nasl	2011-11-09 16:18:42 UTC (rev 12075)
@@ -27,6 +27,8 @@
 {
  script_id(53821);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2008-01-17 14:24:38 +0100 (Thu, 17 Jan 2008)");
  script_tag(name:"risk_factor", value:"High");
  name = "Debian Security Advisory DSA 071-1 (fetchmail)";
  script_name(name);
@@ -44,10 +46,8 @@
 This has been fixed in version 5.3.3-3.
 
 Solution:
-https://secure1.securityspace.com/smysecure/catid.html?in=DSA%20071-1
+https://secure1.securityspace.com/smysecure/catid.html?in=DSA%20071-1";
 
-Risk factor : High";
-
  script_description(desc);
 
  summary = "Debian Security Advisory DSA 071-1 (fetchmail)";

Modified: trunk/openvas-plugins/scripts/deb_097_1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/deb_097_1.nasl	2011-11-09 16:10:49 UTC (rev 12074)
+++ trunk/openvas-plugins/scripts/deb_097_1.nasl	2011-11-09 16:18:42 UTC (rev 12075)
@@ -27,6 +27,8 @@
 {
  script_id(53385);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2008-01-17 14:24:38 +0100 (Thu, 17 Jan 2008)");
  script_tag(name:"risk_factor", value:"High");
  name = "Debian Security Advisory DSA 097-1 (exim)";
  script_name(name);
@@ -53,10 +55,8 @@
 
 
 Solution:
-https://secure1.securityspace.com/smysecure/catid.html?in=DSA%20097-1
+https://secure1.securityspace.com/smysecure/catid.html?in=DSA%20097-1";
 
-Risk factor : High";
-
  script_description(desc);
 
  summary = "Debian Security Advisory DSA 097-1 (exim)";

Modified: trunk/openvas-plugins/scripts/deb_1144_1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/deb_1144_1.nasl	2011-11-09 16:10:49 UTC (rev 12074)
+++ trunk/openvas-plugins/scripts/deb_1144_1.nasl	2011-11-09 16:18:42 UTC (rev 12075)
@@ -27,6 +27,8 @@
 {
  script_id(57261);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2008-01-17 23:13:11 +0100 (Thu, 17 Jan 2008)");
  script_cve_id("CVE-2006-3178");
  script_tag(name:"cvss_base", value:"5.0");
  script_tag(name:"risk_factor", value:"Medium");
@@ -49,10 +51,8 @@
 We recommend that you upgrade your chmlib-bin package.
 
 Solution:
-https://secure1.securityspace.com/smysecure/catid.html?in=DSA%201144-1
+https://secure1.securityspace.com/smysecure/catid.html?in=DSA%201144-1";
 
-Risk factor: Medium";
-
  script_description(desc);
 
  summary = "Debian Security Advisory DSA 1144-1 (chmlib)";

Modified: trunk/openvas-plugins/scripts/deb_1185_1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/deb_1185_1.nasl	2011-11-09 16:10:49 UTC (rev 12074)
+++ trunk/openvas-plugins/scripts/deb_1185_1.nasl	2011-11-09 16:18:42 UTC (rev 12075)
@@ -27,6 +27,8 @@
 {
  script_id(57478);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2008-01-17 23:13:11 +0100 (Thu, 17 Jan 2008)");
  script_cve_id("CVE-2006-2940", "CVE-2006-3738", "CVE-2006-4343", "CVE-2006-2937");
  script_tag(name:"cvss_base", value:"10.0");
  script_tag(name:"risk_factor", value:"Critical");
@@ -90,10 +92,8 @@
 We recommend that you upgrade your openssl package.  Note that
 
 Solution:
-https://secure1.securityspace.com/smysecure/catid.html?in=DSA%201185-1
+https://secure1.securityspace.com/smysecure/catid.html?in=DSA%201185-1";
 
-Risk factor : Critical";
-
  script_description(desc);
 
  summary = "Debian Security Advisory DSA 1185-1 (openssl)";

Modified: trunk/openvas-plugins/scripts/deb_1257_1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/deb_1257_1.nasl	2011-11-09 16:10:49 UTC (rev 12074)
+++ trunk/openvas-plugins/scripts/deb_1257_1.nasl	2011-11-09 16:18:42 UTC (rev 12075)
@@ -27,6 +27,8 @@
 {
  script_id(58012);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2008-01-17 23:17:11 +0100 (Thu, 17 Jan 2008)");
  script_cve_id("CVE-2007-0452", "CVE-2007-0454");
  script_tag(name:"cvss_base", value:"7.5");
  script_tag(name:"risk_factor", value:"High");
@@ -64,10 +66,8 @@
 We recommend that you upgrade your samba package.
 
 Solution:
-https://secure1.securityspace.com/smysecure/catid.html?in=DSA%201257-1
+https://secure1.securityspace.com/smysecure/catid.html?in=DSA%201257-1";
 
-Risk factor : High";
-
  script_description(desc);
 
  summary = "Debian Security Advisory DSA 1257-1 (samba)";

Modified: trunk/openvas-plugins/scripts/deb_1342_1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/deb_1342_1.nasl	2011-11-09 16:10:49 UTC (rev 12074)
+++ trunk/openvas-plugins/scripts/deb_1342_1.nasl	2011-11-09 16:18:42 UTC (rev 12075)
@@ -27,6 +27,8 @@
 {
  script_id(58514);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2008-01-17 23:19:52 +0100 (Thu, 17 Jan 2008)");
  script_cve_id("CVE-2007-3103");
  script_tag(name:"cvss_base", value:"6.2");
  script_tag(name:"risk_factor", value:"High");
@@ -53,10 +55,8 @@
 We recommend that you upgrade your xfs package.
 
 Solution:
-https://secure1.securityspace.com/smysecure/catid.html?in=DSA%201342-1
+https://secure1.securityspace.com/smysecure/catid.html?in=DSA%201342-1";
 
-Risk factor : High";
-
  script_description(desc);
 
  summary = "Debian Security Advisory DSA 1342-1 (xfs)";

Modified: trunk/openvas-plugins/scripts/deb_1355_1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/deb_1355_1.nasl	2011-11-09 16:10:49 UTC (rev 12074)
+++ trunk/openvas-plugins/scripts/deb_1355_1.nasl	2011-11-09 16:18:42 UTC (rev 12075)
@@ -27,6 +27,8 @@
 {
  script_id(58527);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2008-01-17 23:19:52 +0100 (Thu, 17 Jan 2008)");
  script_cve_id("CVE-2007-3387");
  script_tag(name:"cvss_base", value:"6.8");
  script_tag(name:"risk_factor", value:"High");
@@ -53,10 +55,8 @@
 We recommend that you upgrade your kpdf packages.
 
 Solution:
-https://secure1.securityspace.com/smysecure/catid.html?in=DSA%201355-1
+https://secure1.securityspace.com/smysecure/catid.html?in=DSA%201355-1";
 
-Risk factor : High";
-
  script_description(desc);
 
  summary = "Debian Security Advisory DSA 1355-1 (kdegraphics)";

Modified: trunk/openvas-plugins/scripts/deb_1383_1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/deb_1383_1.nasl	2011-11-09 16:10:49 UTC (rev 12074)
+++ trunk/openvas-plugins/scripts/deb_1383_1.nasl	2011-11-09 16:18:42 UTC (rev 12075)
@@ -27,6 +27,8 @@
 {
  script_id(58642);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2008-01-17 23:19:52 +0100 (Thu, 17 Jan 2008)");
  script_cve_id("CVE-2007-3918");
  script_tag(name:"cvss_base", value:"4.3");
  script_tag(name:"risk_factor", value:"Medium");
@@ -52,10 +54,8 @@
 We recommend that you upgrade your gforge package.
 
 Solution:
-https://secure1.securityspace.com/smysecure/catid.html?in=DSA%201383-1
+https://secure1.securityspace.com/smysecure/catid.html?in=DSA%201383-1";
 
-Risk factor: Medium";
-
  script_description(desc);
 
  summary = "Debian Security Advisory DSA 1383-1 (gforge)";

Modified: trunk/openvas-plugins/scripts/deb_1468_1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/deb_1468_1.nasl	2011-11-09 16:10:49 UTC (rev 12074)
+++ trunk/openvas-plugins/scripts/deb_1468_1.nasl	2011-11-09 16:18:42 UTC (rev 12075)
@@ -28,6 +28,8 @@
 {
  script_id(60212);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2008-01-31 16:11:48 +0100 (Thu, 31 Jan 2008)");
  script_cve_id("CVE-2008-0128", "CVE-2007-2450");
  script_tag(name:"cvss_base", value:"5.0");
  script_tag(name:"risk_factor", value:"Medium");
@@ -69,10 +71,8 @@
 We recommend that you upgrade your tomcat5.5 packages.
 
 Solution:
-https://secure1.securityspace.com/smysecure/catid.html?in=DSA%201468-1
+https://secure1.securityspace.com/smysecure/catid.html?in=DSA%201468-1";
 
-Risk factor: Medium";
-
  script_description(desc);
 
  summary = "Debian Security Advisory DSA 1468-1 (tomcat5.5)";

Modified: trunk/openvas-plugins/scripts/deb_1502_1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/deb_1502_1.nasl	2011-11-09 16:10:49 UTC (rev 12074)
+++ trunk/openvas-plugins/scripts/deb_1502_1.nasl	2011-11-09 16:18:42 UTC (rev 12075)
@@ -28,6 +28,8 @@
 {
  script_id(60436);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2008-02-28 02:09:28 +0100 (Thu, 28 Feb 2008)");
  script_cve_id("CVE-2007-3238", "CVE-2007-2821", "CVE-2008-0193", "CVE-2008-0194");
  script_tag(name:"cvss_base", value:"7.5");
  script_tag(name:"risk_factor", value:"High");
@@ -75,10 +77,8 @@
 We recommend that you upgrade your wordpress package.
 
 Solution:
-https://secure1.securityspace.com/smysecure/catid.html?in=DSA%201502-1
+https://secure1.securityspace.com/smysecure/catid.html?in=DSA%201502-1";
 
-Risk factor : High";
-
  script_description(desc);
 
  summary = "Debian Security Advisory DSA 1502-1 (wordpress)";

Modified: trunk/openvas-plugins/scripts/deb_1531_2.nasl
===================================================================
--- trunk/openvas-plugins/scripts/deb_1531_2.nasl	2011-11-09 16:10:49 UTC (rev 12074)
+++ trunk/openvas-plugins/scripts/deb_1531_2.nasl	2011-11-09 16:18:42 UTC (rev 12075)
@@ -28,6 +28,8 @@
 {
  script_id(60656);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2008-04-07 20:38:54 +0200 (Mon, 07 Apr 2008)");
  script_tag(name:"risk_factor", value:"High");
  name = "Debian Security Advisory DSA 1531-2 (policyd-weight)";
  script_name(name);
@@ -54,10 +56,8 @@
 We recommend that you upgrade your policyd-weight package.
 
 Solution:
-https://secure1.securityspace.com/smysecure/catid.html?in=DSA%201531-2
+https://secure1.securityspace.com/smysecure/catid.html?in=DSA%201531-2";
 
-Risk factor : High";
-
  script_description(desc);
 
  summary = "Debian Security Advisory DSA 1531-2 (policyd-weight)";

Modified: trunk/openvas-plugins/scripts/deb_1533_1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/deb_1533_1.nasl	2011-11-09 16:10:49 UTC (rev 12074)
+++ trunk/openvas-plugins/scripts/deb_1533_1.nasl	2011-11-09 16:18:42 UTC (rev 12075)
@@ -28,6 +28,8 @@
 {
  script_id(60654);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2008-04-07 20:38:54 +0200 (Mon, 07 Apr 2008)");
  script_cve_id("CVE-2007-6354", "CVE-2007-6355", "CVE-2007-6356");
  script_tag(name:"cvss_base", value:"10.0");
  script_tag(name:"risk_factor", value:"Critical");
@@ -72,10 +74,8 @@
 We recommend that you upgrade your exiftags package.
 
 Solution:
-https://secure1.securityspace.com/smysecure/catid.html?in=DSA%201533-1
+https://secure1.securityspace.com/smysecure/catid.html?in=DSA%201533-1";
 
-Risk factor: Critical";
-
  script_description(desc);
 
  summary = "Debian Security Advisory DSA 1533-1 (exiftags)";

Modified: trunk/openvas-plugins/scripts/deb_1627_2.nasl
===================================================================
--- trunk/openvas-plugins/scripts/deb_1627_2.nasl	2011-11-09 16:10:49 UTC (rev 12074)
+++ trunk/openvas-plugins/scripts/deb_1627_2.nasl	2011-11-09 16:18:42 UTC (rev 12075)
@@ -28,6 +28,8 @@
 {
  script_id(61590);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2008-09-17 04:23:15 +0200 (Wed, 17 Sep 2008)");
  script_cve_id("CVE-2008-2235");
  script_tag(name:"cvss_base", value:"4.9");
  script_tag(name:"risk_factor", value:"Medium");
@@ -74,10 +76,8 @@
 We recommend that you upgrade your opensc package and check your card(s)
 
 Solution:
-https://secure1.securityspace.com/smysecure/catid.html?in=DSA%201627-2
+https://secure1.securityspace.com/smysecure/catid.html?in=DSA%201627-2";
 
-Risk factor: Medium";
-
  script_description(desc);
 
  summary = "Debian Security Advisory DSA 1627-2 (opensc)";

Modified: trunk/openvas-plugins/scripts/deb_1694_2.nasl
===================================================================
--- trunk/openvas-plugins/scripts/deb_1694_2.nasl	2011-11-09 16:10:49 UTC (rev 12074)
+++ trunk/openvas-plugins/scripts/deb_1694_2.nasl	2011-11-09 16:18:42 UTC (rev 12075)
@@ -29,6 +29,8 @@
 {
  script_id(63100);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2009-01-07 23:16:01 +0100 (Wed, 07 Jan 2009)");
  script_cve_id("CVE-2008-2383");
  script_tag(name:"cvss_base", value:"9.3");
  script_tag(name:"risk_factor", value:"Critical");
@@ -56,10 +58,8 @@
 We recommend that you upgrade your xterm package.
 
 Solution:
-https://secure1.securityspace.com/smysecure/catid.html?in=DSA%201694-2
+https://secure1.securityspace.com/smysecure/catid.html?in=DSA%201694-2";
 
-Risk factor: Critical";
-
  script_description(desc);
 
  summary = "Debian Security Advisory DSA 1694-2 (xterm)";

Modified: trunk/openvas-plugins/scripts/deb_1719_2.nasl
===================================================================
--- trunk/openvas-plugins/scripts/deb_1719_2.nasl	2011-11-09 16:10:49 UTC (rev 12074)
+++ trunk/openvas-plugins/scripts/deb_1719_2.nasl	2011-11-09 16:18:42 UTC (rev 12075)
@@ -29,6 +29,8 @@
 {
  script_id(63575);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2009-03-20 00:52:38 +0100 (Fri, 20 Mar 2009)");
  script_cve_id("CVE-2008-4989");
  script_tag(name:"cvss_base", value:"4.3");
  script_tag(name:"risk_factor", value:"Medium");
@@ -62,10 +64,8 @@
 We recommend that you upgrade your GNUTLS packages.
 
 Solution:
-https://secure1.securityspace.com/smysecure/catid.html?in=DSA%201719-2
+https://secure1.securityspace.com/smysecure/catid.html?in=DSA%201719-2";
 
-Risk factor: Medium";
-
  script_description(desc);
 
  summary = "Debian Security Advisory DSA 1719-2 (gnutls13, gnutls26)";

Modified: trunk/openvas-plugins/scripts/deb_1859_1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/deb_1859_1.nasl	2011-11-09 16:10:49 UTC (rev 12074)
+++ trunk/openvas-plugins/scripts/deb_1859_1.nasl	2011-11-09 16:18:42 UTC (rev 12075)
@@ -29,6 +29,8 @@
 {
  script_id(64638);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2009-08-17 16:54:45 +0200 (Mon, 17 Aug 2009)");
  script_cve_id("CVE-2009-2416", "CVE-2009-2414");
  script_tag(name:"cvss_base", value:"4.3");
  script_tag(name:"risk_factor", value:"Medium");
@@ -65,10 +67,8 @@
 We recommend that you upgrade your libxml2 packages.
 
 Solution:
-https://secure1.securityspace.com/smysecure/catid.html?in=DSA%201859-1
+https://secure1.securityspace.com/smysecure/catid.html?in=DSA%201859-1";
 
-Risk factor: Medium";
-
  script_description(desc);
 
  script_summary("Debian Security Advisory DSA 1859-1 (libxml2)");

Modified: trunk/openvas-plugins/scripts/deb_1873_1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/deb_1873_1.nasl	2011-11-09 16:10:49 UTC (rev 12074)
+++ trunk/openvas-plugins/scripts/deb_1873_1.nasl	2011-11-09 16:18:42 UTC (rev 12075)
@@ -29,6 +29,8 @@
 {
  script_id(64757);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2009-09-02 04:58:39 +0200 (Wed, 02 Sep 2009)");
  script_cve_id("CVE-2009-2654");
  script_tag(name:"cvss_base", value:"5.8");
  script_tag(name:"risk_factor", value:"High");
@@ -52,10 +54,8 @@
 We recommend that you upgrade your xulrunner packages.
 
 Solution:
-https://secure1.securityspace.com/smysecure/catid.html?in=DSA%201873-1
+https://secure1.securityspace.com/smysecure/catid.html?in=DSA%201873-1";
 
-Risk factor : High";
-
  script_description(desc);
 
  script_summary("Debian Security Advisory DSA 1873-1 (xulrunner)");

Modified: trunk/openvas-plugins/scripts/deb_1929_1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/deb_1929_1.nasl	2011-11-09 16:10:49 UTC (rev 12074)
+++ trunk/openvas-plugins/scripts/deb_1929_1.nasl	2011-11-09 16:18:42 UTC (rev 12075)
@@ -29,6 +29,8 @@
 {
  script_id(66209);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2009-11-11 15:56:44 +0100 (Wed, 11 Nov 2009)");
  script_cve_id("CVE-2009-1883", "CVE-2009-2909", "CVE-2009-3001", "CVE-2009-3002", "CVE-2009-3228", "CVE-2009-3238", "CVE-2009-3286", "CVE-2009-3547", "CVE-2009-3612", "CVE-2009-3621");
  script_tag(name:"cvss_base", value:"7.8");
  script_tag(name:"risk_factor", value:"High");
@@ -48,10 +50,8 @@
 version 2.6.18.dfsg.1-26etch1.
 
 Solution:
-https://secure1.securityspace.com/smysecure/catid.html?in=DSA%201929-1
+https://secure1.securityspace.com/smysecure/catid.html?in=DSA%201929-1";
 
-Risk factor : High";
-
  script_description(desc);
 
  script_summary("Debian Security Advisory DSA 1929-1 (linux-2.6)");

Modified: trunk/openvas-plugins/scripts/deb_1992_1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/deb_1992_1.nasl	2011-11-09 16:10:49 UTC (rev 12074)
+++ trunk/openvas-plugins/scripts/deb_1992_1.nasl	2011-11-09 16:18:42 UTC (rev 12075)
@@ -29,6 +29,8 @@
 {
  script_id(66809);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2010-02-10 21:51:26 +0100 (Wed, 10 Feb 2010)");
  script_cve_id("CVE-2010-0292", "CVE-2010-0293", "CVE-2010-0294", "CVE-2009-3563");
  script_tag(name:"cvss_base", value:"6.4");
  script_tag(name:"risk_factor", value:"High");
@@ -78,10 +80,8 @@
 We recommend that you upgrade your chrony packages.
 
 Solution:
-https://secure1.securityspace.com/smysecure/catid.html?in=DSA%201992-1
+https://secure1.securityspace.com/smysecure/catid.html?in=DSA%201992-1";
 
-Risk factor : High";
-
  script_description(desc);
 
  script_summary("Debian Security Advisory DSA 1992-1 (chrony)");

Modified: trunk/openvas-plugins/scripts/deb_2028_1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/deb_2028_1.nasl	2011-11-09 16:10:49 UTC (rev 12074)
+++ trunk/openvas-plugins/scripts/deb_2028_1.nasl	2011-11-09 16:18:42 UTC (rev 12075)
@@ -29,6 +29,8 @@
 {
  script_id(67264);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2010-04-21 03:31:17 +0200 (Wed, 21 Apr 2010)");
  script_cve_id("CVE-2009-1188", "CVE-2009-3603", "CVE-2009-3604", "CVE-2009-3606", "CVE-2009-3608", "CVE-2009-3609");
  script_tag(name:"cvss_base", value:"9.3");
  script_tag(name:"risk_factor", value:"Critical");
@@ -82,10 +84,8 @@
 version 3.02-2.
 
 Solution:
-https://secure1.securityspace.com/smysecure/catid.html?in=DSA%202028-1
+https://secure1.securityspace.com/smysecure/catid.html?in=DSA%202028-1";
 
-Risk factor : Critical";
-
  script_description(desc);
 
  script_summary("Debian Security Advisory DSA 2028-1 (xpdf)");

Modified: trunk/openvas-plugins/scripts/deb_2049_1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/deb_2049_1.nasl	2011-11-09 16:10:49 UTC (rev 12074)
+++ trunk/openvas-plugins/scripts/deb_2049_1.nasl	2011-11-09 16:18:42 UTC (rev 12075)
@@ -29,6 +29,8 @@
 {
  script_id(67401);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2010-06-03 22:55:24 +0200 (Thu, 03 Jun 2010)");
  script_tag(name:"cvss_base", value:"7.5");
  script_cve_id("CVE-2010-0793");
  script_tag(name:"risk_factor", value:"High");
@@ -52,10 +54,8 @@
 We recommend that you upgrade your barnowl packages.
 
 Solution:
-https://secure1.securityspace.com/smysecure/catid.html?in=DSA%202049-1
+https://secure1.securityspace.com/smysecure/catid.html?in=DSA%202049-1";
 
-Risk factor : High";
-
  script_description(desc);
 
  script_summary("Debian Security Advisory DSA 2049-1 (barnowl)");

Modified: trunk/openvas-plugins/scripts/deb_2101_1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/deb_2101_1.nasl	2011-11-09 16:10:49 UTC (rev 12074)
+++ trunk/openvas-plugins/scripts/deb_2101_1.nasl	2011-11-09 16:18:42 UTC (rev 12075)
@@ -29,6 +29,8 @@
 {
  script_id(67988);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2010-10-10 19:35:00 +0200 (Sun, 10 Oct 2010)");
  script_tag(name:"cvss_base", value:"10.0");
  script_cve_id("CVE-2010-2994", "CVE-2010-2995");
  script_tag(name:"risk_factor", value:"Critical");
@@ -50,10 +52,8 @@
 We recommend that you upgrade your wireshark packages.
 
 Solution:
-https://secure1.securityspace.com/smysecure/catid.html?in=DSA%202101-1
+https://secure1.securityspace.com/smysecure/catid.html?in=DSA%202101-1";
 
-Risk factor : Critical";
-
  script_description(desc);
 
  script_summary("Debian Security Advisory DSA 2101-1 (wireshark)");

Modified: trunk/openvas-plugins/scripts/deb_2245_1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/deb_2245_1.nasl	2011-11-09 16:10:49 UTC (rev 12074)
+++ trunk/openvas-plugins/scripts/deb_2245_1.nasl	2011-11-09 16:18:42 UTC (rev 12075)
@@ -29,6 +29,8 @@
 {
  script_id(69744);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2011-08-03 04:36:20 +0200 (Wed, 03 Aug 2011)");
  script_tag(name:"cvss_base", value:"9.3");
  script_cve_id("CVE-2011-1292", "CVE-2011-1293", "CVE-2011-1440", "CVE-2011-1444", "CVE-2011-1797", "CVE-2011-1799");
  script_tag(name:"risk_factor", value:"Critical");
@@ -97,10 +99,8 @@
 We recommend that you upgrade your chromium-browser packages.
 
 Solution:
-https://secure1.securityspace.com/smysecure/catid.html?in=DSA%202245-1
+https://secure1.securityspace.com/smysecure/catid.html?in=DSA%202245-1";
 
-Risk factor : Critical";
-
  script_description(desc);
 
  script_summary("Debian Security Advisory DSA 2245-1 (chromium-browser)");

Modified: trunk/openvas-plugins/scripts/deb_2270_1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/deb_2270_1.nasl	2011-11-09 16:10:49 UTC (rev 12074)
+++ trunk/openvas-plugins/scripts/deb_2270_1.nasl	2011-11-09 16:18:42 UTC (rev 12075)
@@ -29,6 +29,8 @@
 {
  script_id(69978);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2011-08-03 04:36:20 +0200 (Wed, 03 Aug 2011)");
  script_cve_id("CVE-2011-2512");
  script_tag(name:"risk_factor", value:"High");
  script_name("Debian Security Advisory DSA 2270-1 (qemu-kvm)");
@@ -52,10 +54,8 @@
 We recommend that you upgrade your qemu-kvm packages.
 
 Solution:
-https://secure1.securityspace.com/smysecure/catid.html?in=DSA%202270-1
+https://secure1.securityspace.com/smysecure/catid.html?in=DSA%202270-1";
 
-Risk factor : High";
-
  script_description(desc);
 
  script_summary("Debian Security Advisory DSA 2270-1 (qemu-kvm)");

Modified: trunk/openvas-plugins/scripts/deb_425_1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/deb_425_1.nasl	2011-11-09 16:10:49 UTC (rev 12074)
+++ trunk/openvas-plugins/scripts/deb_425_1.nasl	2011-11-09 16:18:42 UTC (rev 12075)
@@ -27,6 +27,8 @@
 {
  script_id(53126);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2008-01-17 22:41:51 +0100 (Thu, 17 Jan 2008)");
  script_cve_id("CVE-2003-1029", "CVE-2003-0989", "CVE-2004-0055", "CVE-2004-0057");
  script_tag(name:"cvss_base", value:"7.5");
  script_tag(name:"risk_factor", value:"High");
@@ -61,10 +63,8 @@
 
 
 Solution:
-https://secure1.securityspace.com/smysecure/catid.html?in=DSA%20425-1
+https://secure1.securityspace.com/smysecure/catid.html?in=DSA%20425-1";
 
-Risk factor : High";
-
  script_description(desc);
 
  summary = "Debian Security Advisory DSA 425-1 (tcpdump)";

Modified: trunk/openvas-plugins/scripts/deb_574_1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/deb_574_1.nasl	2011-11-09 16:10:49 UTC (rev 12074)
+++ trunk/openvas-plugins/scripts/deb_574_1.nasl	2011-11-09 16:18:42 UTC (rev 12075)
@@ -27,6 +27,8 @@
 {
  script_id(53266);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2008-01-17 22:45:44 +0100 (Thu, 17 Jan 2008)");
  script_bugtraq_id(11460);
  script_cve_id("CVE-2004-0916");
  script_tag(name:"cvss_base", value:"5.0");
@@ -52,10 +54,8 @@
 
 
 Solution:
-https://secure1.securityspace.com/smysecure/catid.html?in=DSA%20574-1
+https://secure1.securityspace.com/smysecure/catid.html?in=DSA%20574-1";
 
-Risk factor: Medium";
-
  script_description(desc);
 
  summary = "Debian Security Advisory DSA 574-1 (cabextract)";

Modified: trunk/openvas-plugins/scripts/deb_657_1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/deb_657_1.nasl	2011-11-09 16:10:49 UTC (rev 12074)
+++ trunk/openvas-plugins/scripts/deb_657_1.nasl	2011-11-09 16:18:42 UTC (rev 12075)
@@ -27,6 +27,8 @@
 {
  script_id(53745);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2008-01-17 22:56:38 +0100 (Thu, 17 Jan 2008)");
  script_cve_id("CVE-2004-1379");
  script_bugtraq_id(11205);
  script_tag(name:"cvss_base", value:"7.5");
@@ -52,10 +54,8 @@
 
 
 Solution:
-https://secure1.securityspace.com/smysecure/catid.html?in=DSA%20657-1
+https://secure1.securityspace.com/smysecure/catid.html?in=DSA%20657-1";
 
-Risk factor : High";
-
  script_description(desc);
 
  summary = "Debian Security Advisory DSA 657-1 (xine-lib)";

Modified: trunk/openvas-plugins/scripts/deb_662_2.nasl
===================================================================
--- trunk/openvas-plugins/scripts/deb_662_2.nasl	2011-11-09 16:10:49 UTC (rev 12074)
+++ trunk/openvas-plugins/scripts/deb_662_2.nasl	2011-11-09 16:18:42 UTC (rev 12075)
@@ -27,6 +27,8 @@
 {
  script_id(53523);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2008-01-17 22:56:38 +0100 (Thu, 17 Jan 2008)");
  script_cve_id("CVE-2005-0104", "CVE-2005-0152");
  script_tag(name:"cvss_base", value:"7.5");
  script_tag(name:"risk_factor", value:"High");
@@ -67,10 +69,8 @@
 
 
 Solution:
-https://secure1.securityspace.com/smysecure/catid.html?in=DSA%20662-2
+https://secure1.securityspace.com/smysecure/catid.html?in=DSA%20662-2";
 
-Risk factor : High";
-
  script_description(desc);
 
  summary = "Debian Security Advisory DSA 662-2 (squirrelmail)";

Modified: trunk/openvas-plugins/scripts/deb_676_1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/deb_676_1.nasl	2011-11-09 16:10:49 UTC (rev 12074)
+++ trunk/openvas-plugins/scripts/deb_676_1.nasl	2011-11-09 16:18:42 UTC (rev 12075)
@@ -27,6 +27,8 @@
 {
  script_id(53506);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2008-01-17 22:56:38 +0100 (Thu, 17 Jan 2008)");
  script_bugtraq_id(12523);
  script_cve_id("CVE-2005-0074");
  script_tag(name:"cvss_base", value:"7.2");
@@ -52,10 +54,8 @@
 
 
 Solution:
-https://secure1.securityspace.com/smysecure/catid.html?in=DSA%20676-1
+https://secure1.securityspace.com/smysecure/catid.html?in=DSA%20676-1";
 
-Risk factor : High";
-
  script_description(desc);
 
  summary = "Debian Security Advisory DSA 676-1 (xpcd)";

Modified: trunk/openvas-plugins/scripts/deb_704_1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/deb_704_1.nasl	2011-11-09 16:10:49 UTC (rev 12074)
+++ trunk/openvas-plugins/scripts/deb_704_1.nasl	2011-11-09 16:18:42 UTC (rev 12075)
@@ -27,6 +27,8 @@
 {
  script_id(53533);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2008-01-17 23:00:53 +0100 (Thu, 17 Jan 2008)");
  script_cve_id("CVE-2005-0387", "CVE-2005-0388");
  script_tag(name:"cvss_base", value:"7.5");
  script_tag(name:"risk_factor", value:"High");
@@ -62,10 +64,8 @@
 
 
 Solution:
-https://secure1.securityspace.com/smysecure/catid.html?in=DSA%20704-1
+https://secure1.securityspace.com/smysecure/catid.html?in=DSA%20704-1";
 
-Risk factor : High";
-
  script_description(desc);
 
  summary = "Debian Security Advisory DSA 704-1 (remstats)";

Modified: trunk/openvas-plugins/scripts/deb_804_1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/deb_804_1.nasl	2011-11-09 16:10:49 UTC (rev 12074)
+++ trunk/openvas-plugins/scripts/deb_804_1.nasl	2011-11-09 16:18:42 UTC (rev 12075)
@@ -27,6 +27,8 @@
 {
  script_id(55260);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2008-01-17 23:03:37 +0100 (Thu, 17 Jan 2008)");
  script_bugtraq_id(14297);
  script_cve_id("CVE-2005-1920");
  script_tag(name:"cvss_base", value:"5.0");
@@ -51,10 +53,8 @@
 We recommend that you upgrade your kate package.
 
 Solution:
-https://secure1.securityspace.com/smysecure/catid.html?in=DSA%20804-1
+https://secure1.securityspace.com/smysecure/catid.html?in=DSA%20804-1";
 
-Risk factor: Medium";
-
  script_description(desc);
 
  summary = "Debian Security Advisory DSA 804-1 (kdelibs)";

Modified: trunk/openvas-plugins/scripts/deb_861_1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/deb_861_1.nasl	2011-11-09 16:10:49 UTC (rev 12074)
+++ trunk/openvas-plugins/scripts/deb_861_1.nasl	2011-11-09 16:18:42 UTC (rev 12075)
@@ -27,6 +27,8 @@
 {
  script_id(55592);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2008-01-17 23:03:37 +0100 (Thu, 17 Jan 2008)");
  script_bugtraq_id(15009);
  script_cve_id("CVE-2005-2933");
  script_tag(name:"cvss_base", value:"7.5");
@@ -52,10 +54,8 @@
 We recommend that you upgrade your uw-imap packages.
 
 Solution:
-https://secure1.securityspace.com/smysecure/catid.html?in=DSA%20861-1
+https://secure1.securityspace.com/smysecure/catid.html?in=DSA%20861-1";
 
-Risk factor : High";
-
  script_description(desc);
 
  summary = "Debian Security Advisory DSA 861-1 (uw-imap)";

Modified: trunk/openvas-plugins/scripts/deb_863_1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/deb_863_1.nasl	2011-11-09 16:10:49 UTC (rev 12074)
+++ trunk/openvas-plugins/scripts/deb_863_1.nasl	2011-11-09 16:18:42 UTC (rev 12075)
@@ -27,6 +27,8 @@
 {
  script_id(55607);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2008-01-17 23:03:37 +0100 (Thu, 17 Jan 2008)");
  script_bugtraq_id(15044);
  script_cve_id("CVE-2005-2967");
  script_tag(name:"cvss_base", value:"7.5");
@@ -53,10 +55,8 @@
 We recommend that you upgrade your libxine0 and libxine1 packages.
 
 Solution:
-https://secure1.securityspace.com/smysecure/catid.html?in=DSA%20863-1
+https://secure1.securityspace.com/smysecure/catid.html?in=DSA%20863-1";
 
-Risk factor : High";
-
  script_description(desc);
 
  summary = "Debian Security Advisory DSA 863-1 (xine-lib)";

Modified: trunk/openvas-plugins/scripts/deb_878_1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/deb_878_1.nasl	2011-11-09 16:10:49 UTC (rev 12074)
+++ trunk/openvas-plugins/scripts/deb_878_1.nasl	2011-11-09 16:18:42 UTC (rev 12075)
@@ -27,6 +27,8 @@
 {
  script_id(55753);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2008-01-17 23:03:37 +0100 (Thu, 17 Jan 2008)");
  script_bugtraq_id(15128);
  script_cve_id("CVE-2005-2978");
  script_tag(name:"cvss_base", value:"7.5");
@@ -53,10 +55,8 @@
 We recommend that you upgrade your netpbm-free packages.
 
 Solution:
-https://secure1.securityspace.com/smysecure/catid.html?in=DSA%20878-1
+https://secure1.securityspace.com/smysecure/catid.html?in=DSA%20878-1";
 
-Risk factor : High";
-
  script_description(desc);
 
  summary = "Debian Security Advisory DSA 878-1 (netpbm-free)";

Modified: trunk/openvas-plugins/scripts/directory_manager.nasl
===================================================================
--- trunk/openvas-plugins/scripts/directory_manager.nasl	2011-11-09 16:10:49 UTC (rev 12074)
+++ trunk/openvas-plugins/scripts/directory_manager.nasl	2011-11-09 16:18:42 UTC (rev 12075)
@@ -28,8 +28,7 @@
 Directory Manager is installed and does not properly filter user input.
 A cracker may use this flaw to execute any command on your system.
 
-Solution : Upgrade your software or firewall your web server
-Risk factor : High";
+Solution : Upgrade your software or firewall your web server";
 
 
 
@@ -37,6 +36,8 @@
 {
  script_id(80054);;
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2008-10-24 23:33:44 +0200 (Fri, 24 Oct 2008)");
  script_bugtraq_id(3288);
  script_tag(name:"cvss_base", value:"7.5");
  script_tag(name:"risk_factor", value:"High");

Modified: trunk/openvas-plugins/scripts/domino_authentication_bypass.nasl
===================================================================
--- trunk/openvas-plugins/scripts/domino_authentication_bypass.nasl	2011-11-09 16:10:49 UTC (rev 12074)
+++ trunk/openvas-plugins/scripts/domino_authentication_bypass.nasl	2011-11-09 16:18:42 UTC (rev 12075)
@@ -33,6 +33,8 @@
 {
  script_id(10953);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2005-11-03 14:08:04 +0100 (Thu, 03 Nov 2005)");
  script_cve_id("CVE-2001-1567");
  script_bugtraq_id(4022);
  script_tag(name:"cvss_base", value:"5.0");
@@ -48,8 +50,7 @@
 http://host.com/<databasename>.ntf<buff>.nsf/ in which <buff> has a
 certain length.
 
-Solution: Upgrade to the latest version of Domino.
-Risk factor: Medium";
+Solution: Upgrade to the latest version of Domino.";
 
 script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/dopewars_server_36606.nasl
===================================================================
--- trunk/openvas-plugins/scripts/dopewars_server_36606.nasl	2011-11-09 16:10:49 UTC (rev 12074)
+++ trunk/openvas-plugins/scripts/dopewars_server_36606.nasl	2011-11-09 16:18:42 UTC (rev 12075)
@@ -28,6 +28,8 @@
 {
  script_id(100305);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2009-10-15 20:14:59 +0200 (Thu, 15 Oct 2009)");
  script_tag(name:"cvss_base", value:"5.0");
  script_cve_id("CVE-2009-3591");
  script_bugtraq_id(36606);
@@ -52,10 +54,8 @@
 References:
 http://www.securityfocus.com/bid/36606
 http://dopewars.sourceforge.net/
-http://dopewars.svn.sourceforge.net/viewvc/dopewars?view=rev&revision=1033
+http://dopewars.svn.sourceforge.net/viewvc/dopewars?view=rev&revision=1033";
 
-Risk factor: Medium";
-
  script_description(desc);
  script_summary("Determine if Dopewars is prone to a dos vulnerability");
  script_category(ACT_GATHER_INFO);

Modified: trunk/openvas-plugins/scripts/fcore_2008_11848.nasl
===================================================================
--- trunk/openvas-plugins/scripts/fcore_2008_11848.nasl	2011-11-09 16:10:49 UTC (rev 12074)
+++ trunk/openvas-plugins/scripts/fcore_2008_11848.nasl	2011-11-09 16:18:42 UTC (rev 12075)
@@ -29,6 +29,8 @@
 {
  script_id(63329);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2009-02-10 15:52:40 +0100 (Tue, 10 Feb 2009)");
  script_cve_id("CVE-2005-0706");
  script_tag(name:"cvss_base", value:"7.5");
  script_tag(name:"risk_factor", value:"High");
@@ -67,10 +69,8 @@
 For more information, refer to Managing Software with yum,
 available at http://docs.fedoraproject.org/yum/.
 
-https://secure1.securityspace.com/smysecure/catid.html?in=FEDORA-2008-11848
+https://secure1.securityspace.com/smysecure/catid.html?in=FEDORA-2008-11848";
 
-Risk factor : High";
-
  script_description(desc);
 
  summary = "Fedora Core 10 FEDORA-2008-11848 (libcdaudio)";

Modified: trunk/openvas-plugins/scripts/fcore_2009_10539.nasl
===================================================================
--- trunk/openvas-plugins/scripts/fcore_2009_10539.nasl	2011-11-09 16:10:49 UTC (rev 12074)
+++ trunk/openvas-plugins/scripts/fcore_2009_10539.nasl	2011-11-09 16:18:42 UTC (rev 12075)
@@ -29,6 +29,8 @@
 {
  script_id(66050);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2009-10-19 21:50:22 +0200 (Mon, 19 Oct 2009)");
  script_tag(name:"risk_factor", value:"High");
  script_name("Fedora Core 11 FEDORA-2009-10539 (perl-Net-OAuth)");
 
@@ -62,10 +64,8 @@
 For more information, refer to Managing Software with yum,
 available at http://docs.fedoraproject.org/yum/.
 
-https://secure1.securityspace.com/smysecure/catid.html?in=FEDORA-2009-10539
+https://secure1.securityspace.com/smysecure/catid.html?in=FEDORA-2009-10539";
 
-Risk factor : High";
-
  script_description(desc);
 
  script_summary("Fedora Core 11 FEDORA-2009-10539 (perl-Net-OAuth)");

Modified: trunk/openvas-plugins/scripts/fcore_2009_1204.nasl
===================================================================
--- trunk/openvas-plugins/scripts/fcore_2009_1204.nasl	2011-11-09 16:10:49 UTC (rev 12074)
+++ trunk/openvas-plugins/scripts/fcore_2009_1204.nasl	2011-11-09 16:18:42 UTC (rev 12075)
@@ -29,6 +29,8 @@
 {
  script_id(63323);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2009-02-10 15:52:40 +0100 (Tue, 10 Feb 2009)");
  script_cve_id("CVE-2009-0413");
  script_tag(name:"cvss_base", value:"4.3");
  script_tag(name:"risk_factor", value:"Medium");
@@ -69,10 +71,8 @@
 For more information, refer to Managing Software with yum,
 available at http://docs.fedoraproject.org/yum/.
 
-https://secure1.securityspace.com/smysecure/catid.html?in=FEDORA-2009-1204
+https://secure1.securityspace.com/smysecure/catid.html?in=FEDORA-2009-1204";
 
-Risk factor: Medium";
-
  script_description(desc);
 
  summary = "Fedora Core 10 FEDORA-2009-1204 (roundcubemail)";

Modified: trunk/openvas-plugins/scripts/fcore_2009_12481.nasl
===================================================================
--- trunk/openvas-plugins/scripts/fcore_2009_12481.nasl	2011-11-09 16:10:49 UTC (rev 12074)
+++ trunk/openvas-plugins/scripts/fcore_2009_12481.nasl	2011-11-09 16:18:42 UTC (rev 12075)
@@ -29,6 +29,8 @@
 {
  script_id(66434);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2009-12-10 00:23:54 +0100 (Thu, 10 Dec 2009)");
  script_cve_id("CVE-2009-4076", "CVE-2009-4077", "CVE-2009-0413");
  script_tag(name:"cvss_base", value:"6.8");
  script_tag(name:"risk_factor", value:"High");
@@ -58,10 +60,8 @@
 For more information, refer to Managing Software with yum,
 available at http://docs.fedoraproject.org/yum/.
 
-https://secure1.securityspace.com/smysecure/catid.html?in=FEDORA-2009-12481
+https://secure1.securityspace.com/smysecure/catid.html?in=FEDORA-2009-12481";
 
-Risk factor : High";
-
  script_description(desc);
 
  script_summary("Fedora Core 10 FEDORA-2009-12481 (roundcubemail)");

Modified: trunk/openvas-plugins/scripts/fcore_2009_2122.nasl
===================================================================
--- trunk/openvas-plugins/scripts/fcore_2009_2122.nasl	2011-11-09 16:10:49 UTC (rev 12074)
+++ trunk/openvas-plugins/scripts/fcore_2009_2122.nasl	2011-11-09 16:18:42 UTC (rev 12075)
@@ -29,6 +29,8 @@
 {
  script_id(63462);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2009-03-02 19:11:09 +0100 (Mon, 02 Mar 2009)");
  script_tag(name:"risk_factor", value:"High");
  name = "Fedora Core 10 FEDORA-2009-2122 (mldonkey)";
  script_name(name);
@@ -54,10 +56,8 @@
 For more information, refer to Managing Software with yum,
 available at http://docs.fedoraproject.org/yum/.
 
-https://secure1.securityspace.com/smysecure/catid.html?in=FEDORA-2009-2122
+https://secure1.securityspace.com/smysecure/catid.html?in=FEDORA-2009-2122";
 
-Risk factor : High";
-
  script_description(desc);
 
  summary = "Fedora Core 10 FEDORA-2009-2122 (mldonkey)";

Modified: trunk/openvas-plugins/scripts/fcore_2009_2149.nasl
===================================================================
--- trunk/openvas-plugins/scripts/fcore_2009_2149.nasl	2011-11-09 16:10:49 UTC (rev 12074)
+++ trunk/openvas-plugins/scripts/fcore_2009_2149.nasl	2011-11-09 16:18:42 UTC (rev 12075)
@@ -29,6 +29,8 @@
 {
  script_id(63466);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2009-03-02 19:11:09 +0100 (Mon, 02 Mar 2009)");
  script_cve_id("CVE-2008-5189");
  script_tag(name:"cvss_base", value:"5.0");
  script_tag(name:"risk_factor", value:"Medium");
@@ -59,10 +61,8 @@
 For more information, refer to Managing Software with yum,
 available at http://docs.fedoraproject.org/yum/.
 
-https://secure1.securityspace.com/smysecure/catid.html?in=FEDORA-2009-2149
+https://secure1.securityspace.com/smysecure/catid.html?in=FEDORA-2009-2149";
 
-Risk factor: Medium";
-
  script_description(desc);
 
  summary = "Fedora Core 10 FEDORA-2009-2149 (rubygem-actionpack)";

Modified: trunk/openvas-plugins/scripts/fcore_2009_3064.nasl
===================================================================
--- trunk/openvas-plugins/scripts/fcore_2009_3064.nasl	2011-11-09 16:10:49 UTC (rev 12074)
+++ trunk/openvas-plugins/scripts/fcore_2009_3064.nasl	2011-11-09 16:18:42 UTC (rev 12075)
@@ -29,6 +29,8 @@
 {
  script_id(63675);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2009-03-31 19:20:21 +0200 (Tue, 31 Mar 2009)");
  script_cve_id("CVE-2008-5718");
  script_tag(name:"cvss_base", value:"9.3");
  script_tag(name:"risk_factor", value:"Critical");
@@ -63,10 +65,8 @@
 For more information, refer to Managing Software with yum,
 available at http://docs.fedoraproject.org/yum/.
 
-https://secure1.securityspace.com/smysecure/catid.html?in=FEDORA-2009-3064
+https://secure1.securityspace.com/smysecure/catid.html?in=FEDORA-2009-3064";
 
-Risk factor: Critical";
-
  script_description(desc);
 
  summary = "Fedora Core 9 FEDORA-2009-3064 (netatalk)";

Modified: trunk/openvas-plugins/scripts/fcore_2009_6279.nasl
===================================================================
--- trunk/openvas-plugins/scripts/fcore_2009_6279.nasl	2011-11-09 16:10:49 UTC (rev 12074)
+++ trunk/openvas-plugins/scripts/fcore_2009_6279.nasl	2011-11-09 16:18:42 UTC (rev 12075)
@@ -29,6 +29,8 @@
 {
  script_id(64308);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2009-06-30 00:29:55 +0200 (Tue, 30 Jun 2009)");
  script_cve_id("CVE-2009-1384", "CVE-2008-3825");
  script_tag(name:"cvss_base", value:"5.0");
  script_tag(name:"risk_factor", value:"Medium");
@@ -69,10 +71,8 @@
 For more information, refer to Managing Software with yum,
 available at http://docs.fedoraproject.org/yum/.
 
-https://secure1.securityspace.com/smysecure/catid.html?in=FEDORA-2009-6279
+https://secure1.securityspace.com/smysecure/catid.html?in=FEDORA-2009-6279";
 
-Risk factor: Medium";
-
  script_description(desc);
 
  summary = "Fedora Core 9 FEDORA-2009-6279 (pam_krb5)";

Modified: trunk/openvas-plugins/scripts/fcore_2009_7898.nasl
===================================================================
--- trunk/openvas-plugins/scripts/fcore_2009_7898.nasl	2011-11-09 16:10:49 UTC (rev 12074)
+++ trunk/openvas-plugins/scripts/fcore_2009_7898.nasl	2011-11-09 16:18:42 UTC (rev 12075)
@@ -29,6 +29,8 @@
 {
  script_id(64465);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2009-07-29 19:28:37 +0200 (Wed, 29 Jul 2009)");
  script_cve_id("CVE-2009-2477", "CVE-2009-2478", "CVE-2009-2479");
  script_tag(name:"cvss_base", value:"9.3");
  script_tag(name:"risk_factor", value:"Critical");
@@ -68,10 +70,8 @@
 For more information, refer to Managing Software with yum,
 available at http://docs.fedoraproject.org/yum/.
 
-https://secure1.securityspace.com/smysecure/catid.html?in=FEDORA-2009-7898
+https://secure1.securityspace.com/smysecure/catid.html?in=FEDORA-2009-7898";
 
-Risk factor: Critical";
-
  script_description(desc);
 
  script_summary("Fedora Core 11 FEDORA-2009-7898 (firefox)");

Modified: trunk/openvas-plugins/scripts/fcore_2009_8114.nasl
===================================================================
--- trunk/openvas-plugins/scripts/fcore_2009_8114.nasl	2011-11-09 16:10:49 UTC (rev 12074)
+++ trunk/openvas-plugins/scripts/fcore_2009_8114.nasl	2011-11-09 16:18:42 UTC (rev 12075)
@@ -29,6 +29,8 @@
 {
  script_id(64540);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2009-08-17 16:54:45 +0200 (Mon, 17 Aug 2009)");
  script_tag(name:"risk_factor", value:"High");
  script_name("Fedora Core 10 FEDORA-2009-8114 (wordpress)");
 
@@ -60,10 +62,8 @@
 For more information, refer to Managing Software with yum,
 available at http://docs.fedoraproject.org/yum/.
 
-https://secure1.securityspace.com/smysecure/catid.html?in=FEDORA-2009-8114
+https://secure1.securityspace.com/smysecure/catid.html?in=FEDORA-2009-8114";
 
-Risk factor : High";
-
  script_description(desc);
 
  script_summary("Fedora Core 10 FEDORA-2009-8114 (wordpress)");

Modified: trunk/openvas-plugins/scripts/fcore_2009_8498.nasl
===================================================================
--- trunk/openvas-plugins/scripts/fcore_2009_8498.nasl	2011-11-09 16:10:49 UTC (rev 12074)
+++ trunk/openvas-plugins/scripts/fcore_2009_8498.nasl	2011-11-09 16:18:42 UTC (rev 12075)
@@ -29,6 +29,8 @@
 {
  script_id(64626);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2009-08-17 16:54:45 +0200 (Mon, 17 Aug 2009)");
  script_cve_id("CVE-2009-2414", "CVE-2009-2416");
  script_tag(name:"cvss_base", value:"4.3");
  script_tag(name:"risk_factor", value:"Medium");
@@ -60,10 +62,8 @@
 For more information, refer to Managing Software with yum,
 available at http://docs.fedoraproject.org/yum/.
 
-https://secure1.securityspace.com/smysecure/catid.html?in=FEDORA-2009-8498
+https://secure1.securityspace.com/smysecure/catid.html?in=FEDORA-2009-8498";
 
-Risk factor: Medium";
-
  script_description(desc);
 
  script_summary("Fedora Core 11 FEDORA-2009-8498 (libxml2)");

Modified: trunk/openvas-plugins/scripts/fcore_2009_8770.nasl
===================================================================
--- trunk/openvas-plugins/scripts/fcore_2009_8770.nasl	2011-11-09 16:10:49 UTC (rev 12074)
+++ trunk/openvas-plugins/scripts/fcore_2009_8770.nasl	2011-11-09 16:18:42 UTC (rev 12075)
@@ -29,6 +29,8 @@
 {
  script_id(64818);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2009-09-09 02:15:49 +0200 (Wed, 09 Sep 2009)");
  script_cve_id("CVE-2009-2666");
  script_tag(name:"cvss_base", value:"6.4");
  script_tag(name:"risk_factor", value:"High");
@@ -59,10 +61,8 @@
 For more information, refer to Managing Software with yum,
 available at http://docs.fedoraproject.org/yum/.
 
-https://secure1.securityspace.com/smysecure/catid.html?in=FEDORA-2009-8770
+https://secure1.securityspace.com/smysecure/catid.html?in=FEDORA-2009-8770";
 
-Risk factor : High";
-
  script_description(desc);
 
  script_summary("Fedora Core 10 FEDORA-2009-8770 (fetchmail)");

Modified: trunk/openvas-plugins/scripts/finger_akfingerd.nasl
===================================================================
--- trunk/openvas-plugins/scripts/finger_akfingerd.nasl	2011-11-09 16:10:49 UTC (rev 12074)
+++ trunk/openvas-plugins/scripts/finger_akfingerd.nasl	2011-11-09 16:18:42 UTC (rev 12075)
@@ -27,6 +27,8 @@
 {
  script_id(11193);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2005-11-03 14:08:04 +0100 (Thu, 03 Nov 2005)");
  script_tag(name:"cvss_base", value:"5.0");
  script_cve_id("CVE-2002-2243");
  script_bugtraq_id(6323);
@@ -48,10 +50,8 @@
 
 Versions 0.5 and earlier of akfingerd are vulnerable to a
 remote denial of service attack.  They are also vulnerable
-to several local attacks.
+to several local attacks.";
 
-Risk factor : Medium";
-
  script_description(desc);
  
  summary = "Finger daemon DoS";

Modified: trunk/openvas-plugins/scripts/freebsd_amaya.nasl
===================================================================
--- trunk/openvas-plugins/scripts/freebsd_amaya.nasl	2011-11-09 16:10:49 UTC (rev 12074)
+++ trunk/openvas-plugins/scripts/freebsd_amaya.nasl	2011-11-09 16:18:42 UTC (rev 12075)
@@ -29,6 +29,8 @@
 {
  script_id(56650);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2008-09-04 20:41:11 +0200 (Thu, 04 Sep 2008)");
  script_bugtraq_id(17507);
  script_cve_id("CVE-2006-1900");
  script_tag(name:"cvss_base", value:"7.6");
@@ -57,10 +59,8 @@
 http://morph3us.org/advisories/20060412-amaya-94.txt
 http://morph3us.org/advisories/20060412-amaya-94-2.txt
 http://secunia.com/advisories/19670/
-http://www.vuxml.org/freebsd/dc930435-d59f-11da-8098-00123ffe8333.html
+http://www.vuxml.org/freebsd/dc930435-d59f-11da-8098-00123ffe8333.html";
 
-Risk factor : High";
-
  script_description(desc);
 
  summary = "FreeBSD Ports: amaya";

Modified: trunk/openvas-plugins/scripts/freebsd_ca_root_nss.nasl
===================================================================
--- trunk/openvas-plugins/scripts/freebsd_ca_root_nss.nasl	2011-11-09 16:10:49 UTC (rev 12074)
+++ trunk/openvas-plugins/scripts/freebsd_ca_root_nss.nasl	2011-11-09 16:18:42 UTC (rev 12075)
@@ -30,6 +30,8 @@
 {
  script_id(70251);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2011-09-21 05:47:11 +0200 (Wed, 21 Sep 2011)");
  script_tag(name:"risk_factor", value:"High");
  script_name("FreeBSD Ports: ca_root_nss");
 
@@ -40,11 +42,8 @@
 
 Solution:
 Update your system with the appropriate patches or
-software upgrades.
+software upgrades.";
 
-
-Risk factor : High";
-
  script_description(desc);
 
  script_summary("FreeBSD Ports: ca_root_nss");

Modified: trunk/openvas-plugins/scripts/freebsd_dnrd.nasl
===================================================================
--- trunk/openvas-plugins/scripts/freebsd_dnrd.nasl	2011-11-09 16:10:49 UTC (rev 12074)
+++ trunk/openvas-plugins/scripts/freebsd_dnrd.nasl	2011-11-09 16:18:42 UTC (rev 12075)
@@ -29,6 +29,8 @@
 {
  script_id(54409);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2008-09-04 20:41:11 +0200 (Thu, 04 Sep 2008)");
  script_cve_id("CVE-2005-2315", "CVE-2005-2316");
  script_tag(name:"cvss_base", value:"7.5");
  script_tag(name:"risk_factor", value:"High");
@@ -42,11 +44,8 @@
 
 Solution:
 Update your system with the appropriate patches or
-software upgrades.
+software upgrades.";
 
-
-Risk factor : High";
-
  script_description(desc);
 
  summary = "FreeBSD Ports: dnrd";

Modified: trunk/openvas-plugins/scripts/freebsd_dokuwiki5.nasl
===================================================================
--- trunk/openvas-plugins/scripts/freebsd_dokuwiki5.nasl	2011-11-09 16:10:49 UTC (rev 12074)
+++ trunk/openvas-plugins/scripts/freebsd_dokuwiki5.nasl	2011-11-09 16:18:42 UTC (rev 12075)
@@ -30,6 +30,8 @@
 {
  script_id(66820);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2010-02-10 21:51:26 +0100 (Wed, 10 Feb 2010)");
  script_tag(name:"risk_factor", value:"High");
  script_name("FreeBSD Ports: dokuwiki");
 
@@ -44,10 +46,8 @@
 
 http://bugs.splitbrain.org/index.php?do=details&task_id=1847
 http://bugs.splitbrain.org/index.php?do=details&task_id=1853
-http://www.vuxml.org/freebsd/848539dc-0458-11df-8dd7-002170daae37.html
+http://www.vuxml.org/freebsd/848539dc-0458-11df-8dd7-002170daae37.html";
 
-Risk factor : High";
-
  script_description(desc);
 
  script_summary("FreeBSD Ports: dokuwiki");

Modified: trunk/openvas-plugins/scripts/freebsd_drupal510.nasl
===================================================================
--- trunk/openvas-plugins/scripts/freebsd_drupal510.nasl	2011-11-09 16:10:49 UTC (rev 12074)
+++ trunk/openvas-plugins/scripts/freebsd_drupal510.nasl	2011-11-09 16:18:42 UTC (rev 12075)
@@ -30,6 +30,8 @@
 {
  script_id(63363);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2009-02-13 20:43:17 +0100 (Fri, 13 Feb 2009)");
  script_tag(name:"risk_factor", value:"High");
  name = "FreeBSD Ports: drupal5";
  script_name(name);
@@ -49,10 +51,8 @@
 http://secunia.com/advisories/33550/
 http://secunia.com/advisories/33500/
 http://secunia.com/advisories/33542/
-http://www.vuxml.org/freebsd/6d85dc62-f2bd-11dd-9f55-0030843d3802.html
+http://www.vuxml.org/freebsd/6d85dc62-f2bd-11dd-9f55-0030843d3802.html";
 
-Risk factor : High";
-
  script_description(desc);
 
  summary = "FreeBSD Ports: drupal5";

Modified: trunk/openvas-plugins/scripts/freebsd_faad2.nasl
===================================================================
--- trunk/openvas-plugins/scripts/freebsd_faad2.nasl	2011-11-09 16:10:49 UTC (rev 12074)
+++ trunk/openvas-plugins/scripts/freebsd_faad2.nasl	2011-11-09 16:18:42 UTC (rev 12075)
@@ -30,6 +30,8 @@
 {
  script_id(61875);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2008-11-19 16:52:57 +0100 (Wed, 19 Nov 2008)");
  script_cve_id("CVE-2008-4201");
  script_tag(name:"cvss_base", value:"9.3");
  script_tag(name:"risk_factor", value:"Critical");
@@ -53,10 +55,8 @@
 
 http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=499899
 http://www.gentoo.org/security/en/glsa/glsa-200811-03.xml
-http://www.vuxml.org/freebsd/445ed958-b0d9-11dd-a55e-00163e000016.html
+http://www.vuxml.org/freebsd/445ed958-b0d9-11dd-a55e-00163e000016.html";
 
-Risk factor: Critical";
-
  script_description(desc);
 
  summary = "FreeBSD Ports: faad2";

Modified: trunk/openvas-plugins/scripts/freebsd_gtar2.nasl
===================================================================
--- trunk/openvas-plugins/scripts/freebsd_gtar2.nasl	2011-11-09 16:10:49 UTC (rev 12074)
+++ trunk/openvas-plugins/scripts/freebsd_gtar2.nasl	2011-11-09 16:18:42 UTC (rev 12075)
@@ -30,6 +30,8 @@
 {
  script_id(63239);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2009-01-20 22:42:09 +0100 (Tue, 20 Jan 2009)");
  script_cve_id("CVE-2007-4476");
  script_bugtraq_id(26445);
  script_tag(name:"cvss_base", value:"7.5");
@@ -52,10 +54,8 @@
 software upgrades.
 
 http://www.securityfocus.com/bid/26445/
-http://www.vuxml.org/freebsd/0809ce7d-f672-4924-9b3b-7c74bc279b83.html
+http://www.vuxml.org/freebsd/0809ce7d-f672-4924-9b3b-7c74bc279b83.html";
 
-Risk factor : High";
-
  script_description(desc);
 
  summary = "FreeBSD Ports: gtar";

Modified: trunk/openvas-plugins/scripts/freebsd_hlstats.nasl
===================================================================
--- trunk/openvas-plugins/scripts/freebsd_hlstats.nasl	2011-11-09 16:10:49 UTC (rev 12074)
+++ trunk/openvas-plugins/scripts/freebsd_hlstats.nasl	2011-11-09 16:18:42 UTC (rev 12075)
@@ -29,6 +29,8 @@
 {
  script_id(57324);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2008-09-04 20:41:11 +0200 (Thu, 04 Sep 2008)");
  script_cve_id("CVE-2006-4454");
  script_bugtraq_id(19745);
  script_tag(name:"cvss_base", value:"4.3");
@@ -43,11 +45,8 @@
 
 Solution:
 Update your system with the appropriate patches or
-software upgrades.
+software upgrades.";
 
-
-Risk factor: Medium";
-
  script_description(desc);
 
  summary = "FreeBSD Ports: hlstats";

Modified: trunk/openvas-plugins/scripts/freebsd_imap-uw.nasl
===================================================================
--- trunk/openvas-plugins/scripts/freebsd_imap-uw.nasl	2011-11-09 16:10:49 UTC (rev 12074)
+++ trunk/openvas-plugins/scripts/freebsd_imap-uw.nasl	2011-11-09 16:18:42 UTC (rev 12075)
@@ -29,6 +29,8 @@
 {
  script_id(53002);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2008-09-04 20:41:11 +0200 (Thu, 04 Sep 2008)");
  script_bugtraq_id(12391);
  script_cve_id("CVE-2005-0198");
  script_tag(name:"cvss_base", value:"7.5");
@@ -50,11 +52,8 @@
 
 Solution:
 Update your system with the appropriate patches or
-software upgrades.
+software upgrades.";
 
-
-Risk factor : High";
-
  script_description(desc);
 
  summary = "FreeBSD Ports: imap-uw";

Modified: trunk/openvas-plugins/scripts/freebsd_krb57.nasl
===================================================================
--- trunk/openvas-plugins/scripts/freebsd_krb57.nasl	2011-11-09 16:10:49 UTC (rev 12074)
+++ trunk/openvas-plugins/scripts/freebsd_krb57.nasl	2011-11-09 16:18:42 UTC (rev 12075)
@@ -30,6 +30,8 @@
 {
  script_id(68693);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2011-01-24 17:55:59 +0100 (Mon, 24 Jan 2011)");
  script_tag(name:"cvss_base", value:"4.3");
  script_cve_id("CVE-2010-1324");
  script_bugtraq_id(45116);
@@ -54,10 +56,8 @@
 
 http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2010-007.txt
 http://osvdb.org/69609
-http://www.vuxml.org/freebsd/9f971cea-03f5-11e0-bf50-001a926c7637.html
+http://www.vuxml.org/freebsd/9f971cea-03f5-11e0-bf50-001a926c7637.html";
 
-Risk factor : Medium";
-
  script_description(desc);
 
  script_summary("FreeBSD Ports: krb5");

Modified: trunk/openvas-plugins/scripts/freebsd_libxml.nasl
===================================================================
--- trunk/openvas-plugins/scripts/freebsd_libxml.nasl	2011-11-09 16:10:49 UTC (rev 12074)
+++ trunk/openvas-plugins/scripts/freebsd_libxml.nasl	2011-11-09 16:18:42 UTC (rev 12075)
@@ -29,6 +29,8 @@
 {
  script_id(52312);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2008-09-04 20:41:11 +0200 (Thu, 04 Sep 2008)");
  script_cve_id("CVE-2004-0989");
  script_bugtraq_id(11526);
  script_tag(name:"cvss_base", value:"10.0");
@@ -59,10 +61,8 @@
 
 http://www.debian.org/security/2004/dsa-582
 http://marc.theaimsgroup.com/?l=bugtraq&m=109880813013482
-http://www.vuxml.org/freebsd/9ff4c91e-328c-11d9-a9e7-0001020eed82.html
+http://www.vuxml.org/freebsd/9ff4c91e-328c-11d9-a9e7-0001020eed82.html";
 
-Risk factor: Critical";
-
  script_description(desc);
 
  summary = "FreeBSD Ports: libxml";

Modified: trunk/openvas-plugins/scripts/freebsd_mantis1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/freebsd_mantis1.nasl	2011-11-09 16:10:49 UTC (rev 12074)
+++ trunk/openvas-plugins/scripts/freebsd_mantis1.nasl	2011-11-09 16:18:42 UTC (rev 12075)
@@ -29,6 +29,8 @@
 {
  script_id(56266);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2008-09-04 20:41:11 +0200 (Thu, 04 Sep 2008)");
  script_bugtraq_id(15842);
  script_cve_id("CVE-2005-4238");
  script_tag(name:"cvss_base", value:"4.3");
@@ -51,10 +53,8 @@
 software upgrades.
 
 http://pridels.blogspot.com/2005/12/mantis-bugtracking-system-xss-vuln.html
-http://www.vuxml.org/freebsd/592815da-9eed-11da-b410-000e0c2e438a.html
+http://www.vuxml.org/freebsd/592815da-9eed-11da-b410-000e0c2e438a.html";
 
-Risk factor: Medium";
-
  script_description(desc);
 
  summary = "FreeBSD Ports: mantis";

Modified: trunk/openvas-plugins/scripts/freebsd_mgetty+sendfax.nasl
===================================================================
--- trunk/openvas-plugins/scripts/freebsd_mgetty+sendfax.nasl	2011-11-09 16:10:49 UTC (rev 12074)
+++ trunk/openvas-plugins/scripts/freebsd_mgetty+sendfax.nasl	2011-11-09 16:18:42 UTC (rev 12075)
@@ -30,6 +30,8 @@
 {
  script_id(62853);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2008-12-10 05:23:56 +0100 (Wed, 10 Dec 2008)");
  script_cve_id("CVE-2008-4936");
  script_tag(name:"cvss_base", value:"6.9");
  script_tag(name:"risk_factor", value:"High");
@@ -51,10 +53,8 @@
 
 http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=496403
 https://bugs.gentoo.org/show_bug.cgi?id=235806
-http://www.vuxml.org/freebsd/44ee8160-c453-11dd-a721-0030843d3802.html
+http://www.vuxml.org/freebsd/44ee8160-c453-11dd-a721-0030843d3802.html";
 
-Risk factor : High";
-
  script_description(desc);
 
  summary = "FreeBSD Ports: mgetty+sendfax";

Modified: trunk/openvas-plugins/scripts/freebsd_mod_jk-ap2.nasl
===================================================================
--- trunk/openvas-plugins/scripts/freebsd_mod_jk-ap2.nasl	2011-11-09 16:10:49 UTC (rev 12074)
+++ trunk/openvas-plugins/scripts/freebsd_mod_jk-ap2.nasl	2011-11-09 16:18:42 UTC (rev 12075)
@@ -29,6 +29,8 @@
 {
  script_id(58050);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2008-09-04 20:41:11 +0200 (Thu, 04 Sep 2008)");
  script_cve_id("CVE-2007-0774");
  script_tag(name:"cvss_base", value:"7.5");
  script_tag(name:"risk_factor", value:"High");
@@ -48,10 +50,8 @@
 
 http://tomcat.apache.org/security-jk.html
 http://www.zerodayinitiative.com/advisories/ZDI-07-008.html
-http://www.vuxml.org/freebsd/cf86c644-cb6c-11db-8e9d-000c6ec775d9.html
+http://www.vuxml.org/freebsd/cf86c644-cb6c-11db-8e9d-000c6ec775d9.html";
 
-Risk factor : High";
-
  script_description(desc);
 
  summary = "FreeBSD Ports: mod_jk-ap2, mod_jk";

Modified: trunk/openvas-plugins/scripts/freebsd_mysql-server4.nasl
===================================================================
--- trunk/openvas-plugins/scripts/freebsd_mysql-server4.nasl	2011-11-09 16:10:49 UTC (rev 12074)
+++ trunk/openvas-plugins/scripts/freebsd_mysql-server4.nasl	2011-11-09 16:18:42 UTC (rev 12075)
@@ -29,6 +29,8 @@
 {
  script_id(52274);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2008-09-04 20:41:11 +0200 (Thu, 04 Sep 2008)");
  script_cve_id("CVE-2004-0835");
  script_bugtraq_id(11357);
  script_tag(name:"cvss_base", value:"7.5");
@@ -54,10 +56,8 @@
 http://bugs.mysql.com/bug.php?id=3270
 http://rhn.redhat.com/errata/RHSA-2004-611.html
 http://xforce.iss.net/xforce/xfdb/17666
-http://www.vuxml.org/freebsd/035d17b2-484a-11d9-813c-00065be4b5b6.html
+http://www.vuxml.org/freebsd/035d17b2-484a-11d9-813c-00065be4b5b6.html";
 
-Risk factor : High";
-
  script_description(desc);
 
  summary = "FreeBSD Ports: mysql-server";

Modified: trunk/openvas-plugins/scripts/freebsd_net-snmp1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/freebsd_net-snmp1.nasl	2011-11-09 16:10:49 UTC (rev 12074)
+++ trunk/openvas-plugins/scripts/freebsd_net-snmp1.nasl	2011-11-09 16:18:42 UTC (rev 12075)
@@ -29,6 +29,8 @@
 {
  script_id(58761);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2008-09-04 20:41:11 +0200 (Thu, 04 Sep 2008)");
  script_cve_id("CVE-2007-5846");
  script_tag(name:"cvss_base", value:"7.8");
  script_tag(name:"risk_factor", value:"High");
@@ -44,11 +46,8 @@
 
 Solution:
 Update your system with the appropriate patches or
-software upgrades.
+software upgrades.";
 
-
-Risk factor : High";
-
  script_description(desc);
 
  summary = "FreeBSD Ports: net-snmp";

Modified: trunk/openvas-plugins/scripts/freebsd_openssl2.nasl
===================================================================
--- trunk/openvas-plugins/scripts/freebsd_openssl2.nasl	2011-11-09 16:10:49 UTC (rev 12074)
+++ trunk/openvas-plugins/scripts/freebsd_openssl2.nasl	2011-11-09 16:18:42 UTC (rev 12075)
@@ -29,6 +29,8 @@
 {
  script_id(58053);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2008-09-04 20:41:11 +0200 (Thu, 04 Sep 2008)");
  script_cve_id("CVE-2006-2937", "CVE-2006-2938", "CVE-2006-2940", "CVE-2006-3738", "CVE-2006-4343");
  script_tag(name:"cvss_base", value:"10.0");
  script_tag(name:"risk_factor", value:"Critical");
@@ -70,11 +72,8 @@
 
 Solution:
 Update your system with the appropriate patches or
-software upgrades.
+software upgrades.";
 
-
-Risk factor : Critical";
-
  script_description(desc);
 
  summary = "FreeBSD Ports: openssl";

Modified: trunk/openvas-plugins/scripts/freebsd_opera3.nasl
===================================================================
--- trunk/openvas-plugins/scripts/freebsd_opera3.nasl	2011-11-09 16:10:49 UTC (rev 12074)
+++ trunk/openvas-plugins/scripts/freebsd_opera3.nasl	2011-11-09 16:18:42 UTC (rev 12075)
@@ -29,6 +29,8 @@
 {
  script_id(57530);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2008-09-04 20:41:11 +0200 (Thu, 04 Sep 2008)");
  script_cve_id("CVE-2006-4819");
  script_tag(name:"cvss_base", value:"5.1");
  script_tag(name:"risk_factor", value:"High");
@@ -50,10 +52,8 @@
 http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=424
 http://secunia.com/advisories/22218/
 http://www.opera.com/support/search/supsearch.dml?index=848
-http://www.vuxml.org/freebsd/4867ae85-608d-11db-8faf-000c6ec775d9.html
+http://www.vuxml.org/freebsd/4867ae85-608d-11db-8faf-000c6ec775d9.html";
 
-Risk factor : High";
-
  script_description(desc);
 
  summary = "FreeBSD Ports: opera, opera-devel, linux-opera";

Modified: trunk/openvas-plugins/scripts/freebsd_p5-Mail-SpamAssassin2.nasl
===================================================================
--- trunk/openvas-plugins/scripts/freebsd_p5-Mail-SpamAssassin2.nasl	2011-11-09 16:10:49 UTC (rev 12074)
+++ trunk/openvas-plugins/scripts/freebsd_p5-Mail-SpamAssassin2.nasl	2011-11-09 16:18:42 UTC (rev 12075)
@@ -29,6 +29,8 @@
 {
  script_id(58840);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2008-09-04 20:41:11 +0200 (Thu, 04 Sep 2008)");
  script_cve_id("CVE-2007-2873");
  script_tag(name:"cvss_base", value:"1.9");
  script_tag(name:"risk_factor", value:"Low");
@@ -47,10 +49,8 @@
 software upgrades.
 
 http://spamassassin.apache.org/advisories/cve-2007-2873.txt
-http://www.vuxml.org/freebsd/8092b820-1d6f-11dc-a0b2-001921ab2fa4.html
+http://www.vuxml.org/freebsd/8092b820-1d6f-11dc-a0b2-001921ab2fa4.html";
 
-Risk factor: Low";
-
  script_description(desc);
 
  summary = "FreeBSD Ports: p5-Mail-SpamAssassin";

Modified: trunk/openvas-plugins/scripts/freebsd_phpMyAdmin16.nasl
===================================================================
--- trunk/openvas-plugins/scripts/freebsd_phpMyAdmin16.nasl	2011-11-09 16:10:49 UTC (rev 12074)
+++ trunk/openvas-plugins/scripts/freebsd_phpMyAdmin16.nasl	2011-11-09 16:18:42 UTC (rev 12075)
@@ -30,6 +30,8 @@
 {
  script_id(61659);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2008-09-24 17:42:31 +0200 (Wed, 24 Sep 2008)");
  script_tag(name:"risk_factor", value:"High");
  name = "FreeBSD Ports: phpMyAdmin";
  script_name(name);
@@ -45,10 +47,8 @@
 
 http://secunia.com/Advisories/31884/
 http://www.phpmyadmin.net/home_page/security.php?issue=PMASA-2008-7
-http://www.vuxml.org/freebsd/74bf1594-8493-11dd-bb64-0030843d3802.html
+http://www.vuxml.org/freebsd/74bf1594-8493-11dd-bb64-0030843d3802.html";
 
-Risk factor : High";
-
  script_description(desc);
 
  summary = "FreeBSD Ports: phpMyAdmin";

Modified: trunk/openvas-plugins/scripts/freebsd_picasm.nasl
===================================================================
--- trunk/openvas-plugins/scripts/freebsd_picasm.nasl	2011-11-09 16:10:49 UTC (rev 12074)
+++ trunk/openvas-plugins/scripts/freebsd_picasm.nasl	2011-11-09 16:18:42 UTC (rev 12075)
@@ -29,6 +29,8 @@
 {
  script_id(55511);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2008-09-04 20:41:11 +0200 (Thu, 04 Sep 2008)");
  script_cve_id("CVE-2005-1679");
  script_bugtraq_id(13698);
  script_tag(name:"cvss_base", value:"5.1");
@@ -51,10 +53,8 @@
 software upgrades.
 
 http://marc.theaimsgroup.com/?l=bugtraq&m=111661253517089
-http://www.vuxml.org/freebsd/8a3ece40-3315-11da-a263-0001020eed82.html
+http://www.vuxml.org/freebsd/8a3ece40-3315-11da-a263-0001020eed82.html";
 
-Risk factor : High";
-
  script_description(desc);
 
  summary = "FreeBSD Ports: picasm";

Modified: trunk/openvas-plugins/scripts/freebsd_pidgin0.nasl
===================================================================
--- trunk/openvas-plugins/scripts/freebsd_pidgin0.nasl	2011-11-09 16:10:49 UTC (rev 12074)
+++ trunk/openvas-plugins/scripts/freebsd_pidgin0.nasl	2011-11-09 16:18:42 UTC (rev 12075)
@@ -30,6 +30,8 @@
 {
  script_id(64784);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2009-09-02 04:58:39 +0200 (Wed, 02 Sep 2009)");
  script_cve_id("CVE-2009-2694");
  script_tag(name:"cvss_base", value:"10.0");
  script_tag(name:"risk_factor", value:"Critical");
@@ -59,10 +61,8 @@
 
 http://secunia.com/advisories/36384/
 http://www.pidgin.im/news/security/?id=34
-http://www.vuxml.org/freebsd/59e7af2d-8db7-11de-883b-001e3300a30d.html
+http://www.vuxml.org/freebsd/59e7af2d-8db7-11de-883b-001e3300a30d.html";
 
-Risk factor: Critical";
-
  script_description(desc);
 
  script_summary("FreeBSD Ports: pidgin, libpurple, finch");

Modified: trunk/openvas-plugins/scripts/freebsd_postgresql-contrib.nasl
===================================================================
--- trunk/openvas-plugins/scripts/freebsd_postgresql-contrib.nasl	2011-11-09 16:10:49 UTC (rev 12074)
+++ trunk/openvas-plugins/scripts/freebsd_postgresql-contrib.nasl	2011-11-09 16:18:42 UTC (rev 12075)
@@ -29,6 +29,8 @@
 {
  script_id(52315);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2008-09-04 20:41:11 +0200 (Thu, 04 Sep 2008)");
  script_cve_id("CVE-2004-0977");
  script_bugtraq_id(11295);
  script_tag(name:"cvss_base", value:"2.1");
@@ -51,10 +53,8 @@
 
 http://www.postgresql.org/news/234.html
 http://www.trustix.net/errata/2004/0050/
-http://www.vuxml.org/freebsd/6a164d84-2f7f-11d9-a9e7-0001020eed82.html
+http://www.vuxml.org/freebsd/6a164d84-2f7f-11d9-a9e7-0001020eed82.html";
 
-Risk factor: Medium";
-
  script_description(desc);
 
  summary = "FreeBSD Ports: postgresql-contrib";

Modified: trunk/openvas-plugins/scripts/freebsd_sudo5.nasl
===================================================================
--- trunk/openvas-plugins/scripts/freebsd_sudo5.nasl	2011-11-09 16:10:49 UTC (rev 12074)
+++ trunk/openvas-plugins/scripts/freebsd_sudo5.nasl	2011-11-09 16:18:42 UTC (rev 12075)
@@ -30,6 +30,8 @@
 {
  script_id(67052);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2010-03-16 17:25:39 +0100 (Tue, 16 Mar 2010)");
  script_cve_id("CVE-2010-0426");
  script_bugtraq_id(38362);
  script_tag(name:"cvss_base", value:"6.9");
@@ -56,10 +58,8 @@
 http://www.sudo.ws/pipermail/sudo-announce/2010-February/000092.html
 http://www.sudo.ws/sudo/alerts/sudoedit_escalate.html
 http://secunia.com/advisories/38659
-http://www.vuxml.org/freebsd/018a84d0-2548-11df-b4a3-00e0815b8da8.html
+http://www.vuxml.org/freebsd/018a84d0-2548-11df-b4a3-00e0815b8da8.html";
 
-Risk factor : High";
-
  script_description(desc);
 
  script_summary("FreeBSD Ports: sudo");

Modified: trunk/openvas-plugins/scripts/freebsd_typo32.nasl
===================================================================
--- trunk/openvas-plugins/scripts/freebsd_typo32.nasl	2011-11-09 16:10:49 UTC (rev 12074)
+++ trunk/openvas-plugins/scripts/freebsd_typo32.nasl	2011-11-09 16:18:42 UTC (rev 12075)
@@ -30,6 +30,8 @@
 {
  script_id(66154);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2009-11-11 15:56:44 +0100 (Wed, 11 Nov 2009)");
  script_cve_id("CVE-2009-3628", "CVE-2009-3629", "CVE-2009-3630", "CVE-2009-3631", "CVE-2009-3632", "CVE-2009-3633", "CVE-2009-3634", "CVE-2009-3635", "CVE-2009-3636");
  script_bugtraq_id(36801);
  script_tag(name:"cvss_base", value:"8.5");
@@ -104,10 +106,8 @@
 
 http://typo3.org/teams/security/security-bulletins/typo3-sa-2009-016/
 http://secunia.com/advisories/37122/
-http://www.vuxml.org/freebsd/6693bad2-ca50-11de-8ee8-00215c6a37bb.html
+http://www.vuxml.org/freebsd/6693bad2-ca50-11de-8ee8-00215c6a37bb.html";
 
-Risk factor : Critical";
-
  script_description(desc);
 
  script_summary("FreeBSD Ports: typo3");

Modified: trunk/openvas-plugins/scripts/freebsd_vtiger.nasl
===================================================================
--- trunk/openvas-plugins/scripts/freebsd_vtiger.nasl	2011-11-09 16:10:49 UTC (rev 12074)
+++ trunk/openvas-plugins/scripts/freebsd_vtiger.nasl	2011-11-09 16:18:42 UTC (rev 12075)
@@ -29,6 +29,8 @@
 {
  script_id(57509);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2008-09-04 20:41:11 +0200 (Thu, 04 Sep 2008)");
  script_cve_id("CVE-2006-5289");
  script_bugtraq_id(20435);
  script_tag(name:"cvss_base", value:"7.5");
@@ -47,10 +49,8 @@
 
 http://advisories.echo.or.id/adv/adv54-theday-2006.txt
 http://marc.theaimsgroup.com/?l=bugtraq&m=116049557032343
-http://www.vuxml.org/freebsd/2c8a84d9-5bee-11db-a5ae-00508d6a62df.html
+http://www.vuxml.org/freebsd/2c8a84d9-5bee-11db-a5ae-00508d6a62df.html";
 
-Risk factor : High";
-
  script_description(desc);
 
  summary = "FreeBSD Ports: vtiger";

Modified: trunk/openvas-plugins/scripts/freebsdsa_compress.nasl
===================================================================
--- trunk/openvas-plugins/scripts/freebsdsa_compress.nasl	2011-11-09 16:10:49 UTC (rev 12074)
+++ trunk/openvas-plugins/scripts/freebsdsa_compress.nasl	2011-11-09 16:18:42 UTC (rev 12075)
@@ -29,10 +29,12 @@
 if(description)
 {
  script_id(70415);
+ script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2011-10-16 23:01:53 +0200 (Sun, 16 Oct 2011)");
  script_cve_id("CVE-2011-2895");
  script_tag(name:"cvss_base", value:"9.3");
  script_tag(name:"risk_factor", value:"Critical");
- script_version("$Revision$");
  script_name("FreeBSD Security Advisory (FreeBSD-SA-11:04.compress.asc)");
 
  desc = "The remote host is missing an update to the system
@@ -52,8 +54,7 @@
 Upgrade your system to the appropriate stable release
 or security branch dated after the correction date
 
-https://secure1.securityspace.com/smysecure/catid.html?in=FreeBSD-SA-11:04.compress.asc
-Risk factor : Critical";
+https://secure1.securityspace.com/smysecure/catid.html?in=FreeBSD-SA-11:04.compress.asc";
 
  script_description(desc);
 


Property changes on: trunk/openvas-plugins/scripts/freebsdsa_compress.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/freebsdsa_mbuf.nasl
===================================================================
--- trunk/openvas-plugins/scripts/freebsdsa_mbuf.nasl	2011-11-09 16:10:49 UTC (rev 12074)
+++ trunk/openvas-plugins/scripts/freebsdsa_mbuf.nasl	2011-11-09 16:18:42 UTC (rev 12075)
@@ -30,6 +30,8 @@
 {
  script_id(67716);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2010-07-22 17:43:43 +0200 (Thu, 22 Jul 2010)");
  script_tag(name:"cvss_base", value:"7.2");
   script_cve_id("CVE-2010-2693");
  script_tag(name:"risk_factor", value:"High");
@@ -58,8 +60,7 @@
 Upgrade your system to the appropriate stable release
 or security branch dated after the correction date
 
-https://secure1.securityspace.com/smysecure/catid.html?in=FreeBSD-SA-10:07.mbuf.asc
-Risk factor : High";
+https://secure1.securityspace.com/smysecure/catid.html?in=FreeBSD-SA-10:07.mbuf.asc";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/fspd_directory_traversal.nasl
===================================================================
--- trunk/openvas-plugins/scripts/fspd_directory_traversal.nasl	2011-11-09 16:10:49 UTC (rev 12074)
+++ trunk/openvas-plugins/scripts/fspd_directory_traversal.nasl	2011-11-09 16:18:42 UTC (rev 12075)
@@ -26,6 +26,8 @@
 {
  script_id(11988);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2005-11-03 14:08:04 +0100 (Thu, 03 Nov 2005)");
  script_cve_id("CVE-2003-1022");
  script_bugtraq_id(9377);
  script_tag(name:"cvss_base", value:"7.5");
@@ -37,10 +39,8 @@
  desc = "
 The FSP Suite (daemon) has been found to improperly filter out
 paths with trailing / or starting with /. This would allow an attacker
-access to files that reside outside the bounding FSP root diretory.
+access to files that reside outside the bounding FSP root diretory.";
 
-Risk factor : High";
-
  script_description(desc);
 
  summary = "FSPD Detection";

Modified: trunk/openvas-plugins/scripts/gb_CESA-2008_0002_tog-pegasus_centos4_x86_64.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_CESA-2008_0002_tog-pegasus_centos4_x86_64.nasl	2011-11-09 16:10:49 UTC (rev 12074)
+++ trunk/openvas-plugins/scripts/gb_CESA-2008_0002_tog-pegasus_centos4_x86_64.nasl	2011-11-09 16:18:42 UTC (rev 12075)
@@ -27,6 +27,8 @@
 {
   script_id(880110);
   script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2009-02-27 09:02:20 +0100 (Fri, 27 Feb 2009)");
   script_tag(name:"cvss_base", value:"10.0");
   script_tag(name:"risk_factor", value:"Critical");
   script_xref(name: "CESA", value: "2008:0002");
@@ -63,10 +65,8 @@
   Fix: Please Install the Updated Packages.
 
   References:
-  http://lists.centos.org/pipermail/centos-announce/2008-January/014600.html
+  http://lists.centos.org/pipermail/centos-announce/2008-January/014600.html";
 
-  Risk factor: Critical";
-
   script_description(desc);
   script_summary("Check for the Version of tog-pegasus");
   script_category(ACT_GATHER_INFO);

Modified: trunk/openvas-plugins/scripts/gb_CESA-2008_0105_thunderbird_centos5_x86_64.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_CESA-2008_0105_thunderbird_centos5_x86_64.nasl	2011-11-09 16:10:49 UTC (rev 12074)
+++ trunk/openvas-plugins/scripts/gb_CESA-2008_0105_thunderbird_centos5_x86_64.nasl	2011-11-09 16:18:42 UTC (rev 12075)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(880271);
-  script_version("$Revision: 1.0 $");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2009-02-27 08:36:45 +0100 (Fri, 27 Feb 2009)");
   script_tag(name:"cvss_base", value:"9.3");
   script_tag(name:"risk_factor", value:"Critical");
   script_xref(name: "CESA", value: "2008:0105");
@@ -71,10 +73,8 @@
   Fix: Please Install the Updated Packages.
 
   References:
-  http://lists.centos.org/pipermail/centos-announce/2008-February/014672.html
+  http://lists.centos.org/pipermail/centos-announce/2008-February/014672.html";
 
-  Risk factor: Critical";
-
   script_description(desc);
   script_summary("Check for the Version of thunderbird");
   script_category(ACT_GATHER_INFO);


Property changes on: trunk/openvas-plugins/scripts/gb_CESA-2008_0105_thunderbird_centos5_x86_64.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_CESA-2008_0161_cups_centos5_x86_64.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_CESA-2008_0161_cups_centos5_x86_64.nasl	2011-11-09 16:10:49 UTC (rev 12074)
+++ trunk/openvas-plugins/scripts/gb_CESA-2008_0161_cups_centos5_x86_64.nasl	2011-11-09 16:18:42 UTC (rev 12075)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(880058);
-  script_version("$Revision: 1.0 $");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2009-02-27 08:36:45 +0100 (Fri, 27 Feb 2009)");
   script_tag(name:"cvss_base", value:"10.0");
   script_tag(name:"risk_factor", value:"Critical");
   script_xref(name: "CESA", value: "2008:0161");
@@ -65,10 +67,8 @@
   Fix: Please Install the Updated Packages.
 
   References:
-  http://lists.centos.org/pipermail/centos-announce/2008-February/014710.html
+  http://lists.centos.org/pipermail/centos-announce/2008-February/014710.html";
 
-  Risk factor : Critical";
-
   script_description(desc);
   script_summary("Check for the Version of cups");
   script_category(ACT_GATHER_INFO);


Property changes on: trunk/openvas-plugins/scripts/gb_CESA-2008_0161_cups_centos5_x86_64.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_CESA-2008_0515_evolution28_centos4_i386.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_CESA-2008_0515_evolution28_centos4_i386.nasl	2011-11-09 16:10:49 UTC (rev 12074)
+++ trunk/openvas-plugins/scripts/gb_CESA-2008_0515_evolution28_centos4_i386.nasl	2011-11-09 16:18:42 UTC (rev 12075)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(880197);
-  script_version("$Revision: 1.0 $");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2009-02-27 08:40:14 +0100 (Fri, 27 Feb 2009)");
   script_tag(name:"cvss_base", value:"9.3");
   script_tag(name:"risk_factor", value:"Critical");
   script_xref(name: "CESA", value: "2008:0515");
@@ -75,10 +77,8 @@
   Fix: Please Install the Updated Packages.
 
   References:
-  http://lists.centos.org/pipermail/centos-announce/2008-June/014967.html
+  http://lists.centos.org/pipermail/centos-announce/2008-June/014967.html";
 
-  Risk factor : Critical";
-
   script_description(desc);
   script_summary("Check for the Version of evolution28");
   script_category(ACT_GATHER_INFO);


Property changes on: trunk/openvas-plugins/scripts/gb_CESA-2008_0515_evolution28_centos4_i386.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_CESA-2008_0546-01_php_centos2_i386.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_CESA-2008_0546-01_php_centos2_i386.nasl	2011-11-09 16:10:49 UTC (rev 12074)
+++ trunk/openvas-plugins/scripts/gb_CESA-2008_0546-01_php_centos2_i386.nasl	2011-11-09 16:18:42 UTC (rev 12075)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(880031);
-  script_version("$Revision: 1.0 $");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2009-02-27 08:40:14 +0100 (Fri, 27 Feb 2009)");
   script_tag(name:"cvss_base", value:"10.0");
   script_tag(name:"risk_factor", value:"Critical");
   script_xref(name: "CESA", value: "2008:0546-01");
@@ -81,10 +83,8 @@
   Fix: Please Install the Updated Packages.
 
   References:
-  http://lists.centos.org/pipermail/centos-announce/2008-July/015152.html
+  http://lists.centos.org/pipermail/centos-announce/2008-July/015152.html";
 
-  Risk factor: Critical";
-
   script_description(desc);
   script_summary("Check for the Version of php");
   script_category(ACT_GATHER_INFO);


Property changes on: trunk/openvas-plugins/scripts/gb_CESA-2008_0546-01_php_centos2_i386.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_CESA-2008_0896_irb_centos3_i386.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_CESA-2008_0896_irb_centos3_i386.nasl	2011-11-09 16:10:49 UTC (rev 12074)
+++ trunk/openvas-plugins/scripts/gb_CESA-2008_0896_irb_centos3_i386.nasl	2011-11-09 16:18:42 UTC (rev 12075)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(880190);
-  script_version("$Revision: 1.0 $");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2009-02-27 09:02:20 +0100 (Fri, 27 Feb 2009)");
   script_tag(name:"cvss_base", value:"7.5");
   script_tag(name:"risk_factor", value:"High");
   script_xref(name: "CESA", value: "2008:0896");
@@ -61,10 +63,8 @@
   Fix: Please Install the Updated Packages.
 
   References:
-  http://lists.centos.org/pipermail/centos-announce/2008-October/015332.html
+  http://lists.centos.org/pipermail/centos-announce/2008-October/015332.html";
 
-  Risk factor : High";
-
   script_description(desc);
   script_summary("Check for the Version of irb");
   script_category(ACT_GATHER_INFO);


Property changes on: trunk/openvas-plugins/scripts/gb_CESA-2008_0896_irb_centos3_i386.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_CESA-2009_1522_kernel_centos4_i386.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_CESA-2009_1522_kernel_centos4_i386.nasl	2011-11-09 16:10:49 UTC (rev 12074)
+++ trunk/openvas-plugins/scripts/gb_CESA-2009_1522_kernel_centos4_i386.nasl	2011-11-09 16:18:42 UTC (rev 12075)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(880873);
-  script_version("$Revision$: 1.0");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2011-08-09 08:20:34 +0200 (Tue, 09 Aug 2011)");
   script_tag(name:"cvss_base", value:"4.9");
   script_tag(name:"risk_factor", value:"Medium");
   script_xref(name: "CESA", value: "2009:1522");


Property changes on: trunk/openvas-plugins/scripts/gb_CESA-2009_1522_kernel_centos4_i386.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_CESA-2009_1646_libtool_centos3_i386.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_CESA-2009_1646_libtool_centos3_i386.nasl	2011-11-09 16:10:49 UTC (rev 12074)
+++ trunk/openvas-plugins/scripts/gb_CESA-2009_1646_libtool_centos3_i386.nasl	2011-11-09 16:18:42 UTC (rev 12075)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(880704);
-  script_version("$Revision$: 1.0");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2011-08-09 08:20:34 +0200 (Tue, 09 Aug 2011)");
   script_tag(name:"cvss_base", value:"6.9");
   script_tag(name:"risk_factor", value:"High");
   script_xref(name: "CESA", value: "2009:1646");


Property changes on: trunk/openvas-plugins/scripts/gb_CESA-2009_1646_libtool_centos3_i386.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_CESA-2010_0343_krb5-devel_centos5_i386.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_CESA-2010_0343_krb5-devel_centos5_i386.nasl	2011-11-09 16:10:49 UTC (rev 12074)
+++ trunk/openvas-plugins/scripts/gb_CESA-2010_0343_krb5-devel_centos5_i386.nasl	2011-11-09 16:18:42 UTC (rev 12075)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(880624);
-  script_version("$Revision$: 1.0");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2011-08-09 08:20:34 +0200 (Tue, 09 Aug 2011)");
   script_tag(name:"cvss_base", value:"4.0");
   script_tag(name:"risk_factor", value:"Medium");
   script_xref(name: "CESA", value: "2010:0343");


Property changes on: trunk/openvas-plugins/scripts/gb_CESA-2010_0343_krb5-devel_centos5_i386.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_CESA-2010_0398_kernel_centos5_i386.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_CESA-2010_0398_kernel_centos5_i386.nasl	2011-11-09 16:10:49 UTC (rev 12074)
+++ trunk/openvas-plugins/scripts/gb_CESA-2010_0398_kernel_centos5_i386.nasl	2011-11-09 16:18:42 UTC (rev 12075)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(880586);
-  script_version("$Revision$: 1.0");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2011-08-09 08:20:34 +0200 (Tue, 09 Aug 2011)");
   script_tag(name:"cvss_base", value:"7.8");
   script_tag(name:"risk_factor", value:"High");
   script_xref(name: "CESA", value: "2010:0398");


Property changes on: trunk/openvas-plugins/scripts/gb_CESA-2010_0398_kernel_centos5_i386.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_CESA-2010_0606_kernel_centos4_i386.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_CESA-2010_0606_kernel_centos4_i386.nasl	2011-11-09 16:10:49 UTC (rev 12074)
+++ trunk/openvas-plugins/scripts/gb_CESA-2010_0606_kernel_centos4_i386.nasl	2011-11-09 16:18:42 UTC (rev 12075)
@@ -26,8 +26,10 @@
 if(description)
 {
   script_id(880417);
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2010-08-30 16:59:25 +0200 (Mon, 30 Aug 2010)");
   script_tag(name:"cvss_base", value:"10.0");
- script_version("$Revision$: 1.0");
   script_tag(name:"risk_factor", value:"Critical");
   script_xref(name: "CESA", value: "2010:0606");
   script_cve_id("CVE-2010-2248", "CVE-2010-2521");


Property changes on: trunk/openvas-plugins/scripts/gb_CESA-2010_0606_kernel_centos4_i386.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_CESA-2010_0680_seamonkey_centos3_i386.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_CESA-2010_0680_seamonkey_centos3_i386.nasl	2011-11-09 16:10:49 UTC (rev 12074)
+++ trunk/openvas-plugins/scripts/gb_CESA-2010_0680_seamonkey_centos3_i386.nasl	2011-11-09 16:18:42 UTC (rev 12075)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(880425);
-  script_version("$Revision$: 1.0");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2010-09-10 14:21:00 +0200 (Fri, 10 Sep 2010)");
   script_tag(name:"cvss_base", value:"9.3");
   script_tag(name:"risk_factor", value:"Critical");
   script_xref(name: "CESA", value: "2010:0680");


Property changes on: trunk/openvas-plugins/scripts/gb_CESA-2010_0680_seamonkey_centos3_i386.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_CESA-2011_0375_seamonkey_centos4_i386.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_CESA-2011_0375_seamonkey_centos4_i386.nasl	2011-11-09 16:10:49 UTC (rev 12074)
+++ trunk/openvas-plugins/scripts/gb_CESA-2011_0375_seamonkey_centos4_i386.nasl	2011-11-09 16:18:42 UTC (rev 12075)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(880483);
-  script_version("$Revision$: 1.0");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2011-03-25 15:26:27 +0100 (Fri, 25 Mar 2011)");
   script_tag(name:"risk_factor", value:"High");
   script_xref(name: "CESA", value: "2011:0375");
   script_name("CentOS Update for seamonkey CESA-2011:0375 centos4 i386");


Property changes on: trunk/openvas-plugins/scripts/gb_CESA-2011_0375_seamonkey_centos4_i386.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_CESA-2011_0394_luci_centos5_i386.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_CESA-2011_0394_luci_centos5_i386.nasl	2011-11-09 16:10:49 UTC (rev 12074)
+++ trunk/openvas-plugins/scripts/gb_CESA-2011_0394_luci_centos5_i386.nasl	2011-11-09 16:18:42 UTC (rev 12075)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(880497);
-  script_version("$Revision$: 1.0");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2011-08-09 08:20:34 +0200 (Tue, 09 Aug 2011)");
   script_tag(name:"cvss_base", value:"7.5");
   script_tag(name:"risk_factor", value:"High");
   script_xref(name: "CESA", value: "2011:0394");


Property changes on: trunk/openvas-plugins/scripts/gb_CESA-2011_0394_luci_centos5_i386.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_CESA-2011_0491_python_centos4_i386.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_CESA-2011_0491_python_centos4_i386.nasl	2011-11-09 16:10:49 UTC (rev 12074)
+++ trunk/openvas-plugins/scripts/gb_CESA-2011_0491_python_centos4_i386.nasl	2011-11-09 16:18:42 UTC (rev 12075)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(880556);
-  script_version("$Revision$: 1.0");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2011-08-09 08:20:34 +0200 (Tue, 09 Aug 2011)");
   script_tag(name:"cvss_base", value:"6.4");
   script_tag(name:"risk_factor", value:"High");
   script_xref(name: "CESA", value: "2011:0491");


Property changes on: trunk/openvas-plugins/scripts/gb_CESA-2011_0491_python_centos4_i386.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_CESA-2011_1065_kernel_centos5_i386.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_CESA-2011_1065_kernel_centos5_i386.nasl	2011-11-09 16:10:49 UTC (rev 12074)
+++ trunk/openvas-plugins/scripts/gb_CESA-2011_1065_kernel_centos5_i386.nasl	2011-11-09 16:18:42 UTC (rev 12075)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(880988);
-  script_version("$Revision$: 1.0");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2011-09-23 16:39:49 +0200 (Fri, 23 Sep 2011)");
   script_tag(name:"cvss_base", value:"4.9");
   script_tag(name:"risk_factor", value:"Medium");
   script_xref(name: "CESA", value: "2011:1065");


Property changes on: trunk/openvas-plugins/scripts/gb_CESA-2011_1065_kernel_centos5_i386.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_CESA-2011_1160_dhclient_centos4_i386.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_CESA-2011_1160_dhclient_centos4_i386.nasl	2011-11-09 16:10:49 UTC (rev 12074)
+++ trunk/openvas-plugins/scripts/gb_CESA-2011_1160_dhclient_centos4_i386.nasl	2011-11-09 16:18:42 UTC (rev 12075)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(880964);
-  script_version("$Revision$: 1.0");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2011-08-19 15:17:22 +0200 (Fri, 19 Aug 2011)");
   script_tag(name:"cvss_base", value:"7.8");
   script_tag(name:"risk_factor", value:"High");
   script_xref(name: "CESA", value: "2011:1160");


Property changes on: trunk/openvas-plugins/scripts/gb_CESA-2011_1160_dhclient_centos4_i386.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_RHSA-2007_1129-01_autofs5.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_RHSA-2007_1129-01_autofs5.nasl	2011-11-09 16:10:49 UTC (rev 12074)
+++ trunk/openvas-plugins/scripts/gb_RHSA-2007_1129-01_autofs5.nasl	2011-11-09 16:18:42 UTC (rev 12075)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(870193);
-  script_version("$Revision: 1.0 $");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2009-03-06 07:30:35 +0100 (Fri, 06 Mar 2009)");
   script_tag(name:"cvss_base", value:"6.9");
   script_tag(name:"risk_factor", value:"High");
   script_xref(name: "RHSA", value: "2007:1129-01");
@@ -68,10 +70,8 @@
   Fix: Please Install the Updated Packages.
 
   References:
-  https://www.redhat.com/archives/rhsa-announce/2007-December/msg00010.html
+  https://www.redhat.com/archives/rhsa-announce/2007-December/msg00010.html";
 
-  Risk factor: High";
-
   script_description(desc);
   script_summary("Check for the Version of autofs5");
   script_category(ACT_GATHER_INFO);


Property changes on: trunk/openvas-plugins/scripts/gb_RHSA-2007_1129-01_autofs5.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_RHSA-2008_0175-01_openoffice.org.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_RHSA-2008_0175-01_openoffice.org.nasl	2011-11-09 16:10:49 UTC (rev 12074)
+++ trunk/openvas-plugins/scripts/gb_RHSA-2008_0175-01_openoffice.org.nasl	2011-11-09 16:18:42 UTC (rev 12075)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(870080);
-  script_version("$Revision: 1.0 $");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2009-03-06 07:30:35 +0100 (Fri, 06 Mar 2009)");
   script_tag(name:"cvss_base", value:"9.3");
   script_tag(name:"risk_factor", value:"Critical");
   script_xref(name: "RHSA", value: "2008:0175-01");
@@ -69,10 +71,8 @@
   Fix: Please Install the Updated Packages.
 
   References:
-  https://www.redhat.com/archives/rhsa-announce/2008-April/msg00018.html
+  https://www.redhat.com/archives/rhsa-announce/2008-April/msg00018.html";
 
-  Risk factor : Critical";
-
   script_description(desc);
   script_summary("Check for the Version of openoffice.org");
   script_category(ACT_GATHER_INFO);


Property changes on: trunk/openvas-plugins/scripts/gb_RHSA-2008_0175-01_openoffice.org.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_RHSA-2008_0528-01_ucd-snmp.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_RHSA-2008_0528-01_ucd-snmp.nasl	2011-11-09 16:10:49 UTC (rev 12074)
+++ trunk/openvas-plugins/scripts/gb_RHSA-2008_0528-01_ucd-snmp.nasl	2011-11-09 16:18:42 UTC (rev 12075)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(870049);
-  script_version("$Revision: 1.0 $");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2009-03-06 07:30:35 +0100 (Fri, 06 Mar 2009)");
   script_tag(name:"cvss_base", value:"10.0");
   script_tag(name:"risk_factor", value:"Critical");
   script_xref(name: "RHSA", value: "2008:0528-01");
@@ -54,10 +56,8 @@
   Fix: Please Install the Updated Packages.
 
   References:
-  https://www.redhat.com/archives/rhsa-announce/2008-June/msg00006.html
+  https://www.redhat.com/archives/rhsa-announce/2008-June/msg00006.html";
 
-  Risk factor: Critical";
-
   script_description(desc);
   script_summary("Check for the Version of ucd-snmp");
   script_category(ACT_GATHER_INFO);


Property changes on: trunk/openvas-plugins/scripts/gb_RHSA-2008_0528-01_ucd-snmp.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_RHSA-2010_0113-01_seamonkey.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_RHSA-2010_0113-01_seamonkey.nasl	2011-11-09 16:10:49 UTC (rev 12074)
+++ trunk/openvas-plugins/scripts/gb_RHSA-2010_0113-01_seamonkey.nasl	2011-11-09 16:18:42 UTC (rev 12075)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(870221);
-  script_version("$Revision$: 1.0");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2010-02-19 13:38:15 +0100 (Fri, 19 Feb 2010)");
   script_tag(name:"cvss_base", value:"10.0");
   script_tag(name:"risk_factor", value:"Critical");
   script_xref(name: "RHSA", value: "2010:0113-01");
@@ -64,10 +66,8 @@
   Fix: Please Install the Updated Packages.
 
   References:
-  https://www.redhat.com/archives/rhsa-announce/2010-February/msg00012.html
+  https://www.redhat.com/archives/rhsa-announce/2010-February/msg00012.html";
 
-  Risk factor: Critical";
-
   script_description(desc);
   script_summary("Check for the Version of seamonkey");
   script_category(ACT_GATHER_INFO);


Property changes on: trunk/openvas-plugins/scripts/gb_RHSA-2010_0113-01_seamonkey.nasl
___________________________________________________________________
Name: svn:keywords
   - Revision
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_RHSA-2010_0768-01_java-1.6.0-openjdk.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_RHSA-2010_0768-01_java-1.6.0-openjdk.nasl	2011-11-09 16:10:49 UTC (rev 12074)
+++ trunk/openvas-plugins/scripts/gb_RHSA-2010_0768-01_java-1.6.0-openjdk.nasl	2011-11-09 16:18:42 UTC (rev 12075)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(870340);
-  script_version("$Revision$: 1.0");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2010-10-19 15:54:15 +0200 (Tue, 19 Oct 2010)");
   script_tag(name:"cvss_base", value:"10.0");
   script_tag(name:"risk_factor", value:"Critical");
   script_xref(name: "RHSA", value: "2010:0768-01");


Property changes on: trunk/openvas-plugins/scripts/gb_RHSA-2010_0768-01_java-1.6.0-openjdk.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_RHSA-2011_1073-01_bash.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_RHSA-2011_1073-01_bash.nasl	2011-11-09 16:10:49 UTC (rev 12074)
+++ trunk/openvas-plugins/scripts/gb_RHSA-2011_1073-01_bash.nasl	2011-11-09 16:18:42 UTC (rev 12075)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(870458);
-  script_version("$Revision$: 1.0");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2011-07-22 14:44:51 +0200 (Fri, 22 Jul 2011)");
   script_tag(name:"cvss_base", value:"6.9");
   script_tag(name:"risk_factor", value:"High");
   script_xref(name: "RHSA", value: "2011:1073-01");


Property changes on: trunk/openvas-plugins/scripts/gb_RHSA-2011_1073-01_bash.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_RealVNC_39895.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_RealVNC_39895.nasl	2011-11-09 16:10:49 UTC (rev 12074)
+++ trunk/openvas-plugins/scripts/gb_RealVNC_39895.nasl	2011-11-09 16:18:42 UTC (rev 12075)
@@ -27,8 +27,10 @@
 if (description)
 {
  script_id(100622);
+ script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2010-05-04 19:30:07 +0200 (Tue, 04 May 2010)");
  script_bugtraq_id(39895);
- script_version ("1.0-$Revision$");
 
  script_name("RealVNC 4.1.3 'ClientCutText' Message Remote Denial of Service Vulnerability");
 


Property changes on: trunk/openvas-plugins/scripts/gb_RealVNC_39895.nasl
___________________________________________________________________
Name: svn:keywords
   - Id Revision
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_adobe_prdts_code_exec_vuln_lin.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_adobe_prdts_code_exec_vuln_lin.nasl	2011-11-09 16:10:49 UTC (rev 12074)
+++ trunk/openvas-plugins/scripts/gb_adobe_prdts_code_exec_vuln_lin.nasl	2011-11-09 16:18:42 UTC (rev 12075)
@@ -1,6 +1,6 @@
 ###############################################################################
 # OpenVAS Vulnerability Test
-# $Id: gb_adobe_prdts_code_exec_vuln_lin.nasl 298 2008-10-03 16:37:37Z oct $
+# $Id$
 #
 # Adobe Reader/Acrobat JavaScript Method Handling Vulnerability (Linux)
 #
@@ -27,7 +27,9 @@
 if(description)
 {
   script_id(800107);
-  script_version("$Revision: 1.0 $");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2008-10-04 09:54:24 +0200 (Sat, 04 Oct 2008)");
   script_tag(name:"cvss_base", value:"9.3");
   script_tag(name:"risk_factor", value:"Critical");
   script_cve_id("CVE-2008-2641");
@@ -66,8 +68,7 @@
 
   CVSS Score:
     CVSS Base Score     : 9.3 (AV:N/AC:M/Au:NR/C:C/I:C/A:C)
-    CVSS Temporal Score : 6.9
-  Risk factor: Critical";
+    CVSS Temporal Score : 6.9";
 
   script_description(desc);
   script_summary("Check for the version of Adobe Reader/Acrobat");


Property changes on: trunk/openvas-plugins/scripts/gb_adobe_prdts_code_exec_vuln_lin.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_adobe_shockwave_player_bof_vuln_jan10.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_adobe_shockwave_player_bof_vuln_jan10.nasl	2011-11-09 16:10:49 UTC (rev 12074)
+++ trunk/openvas-plugins/scripts/gb_adobe_shockwave_player_bof_vuln_jan10.nasl	2011-11-09 16:18:42 UTC (rev 12075)
@@ -1,6 +1,6 @@
 ###############################################################################
 # OpenVAS Vulnerability Test
-# $Id: gb_adobe_shockwave_player_bof_vuln_jan10.nasl 6943 2010-01-22 13:39:02Z jan $
+# $Id$
 #
 # Adobe Shockwave Player 3D Model Buffer Overflow Vulnerabilities
 #
@@ -27,7 +27,9 @@
 if(description)
 {
   script_id(800443);
-  script_version("$Revision$: 1.0");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2010-01-28 16:24:05 +0100 (Thu, 28 Jan 2010)");
   script_tag(name:"cvss_base", value:"9.3");
   script_tag(name:"risk_factor", value:"Critical");
   script_cve_id("CVE-2009-4003", "CVE-2009-4002");
@@ -63,8 +65,7 @@
 
   CVSS Score:
     CVSS Base Score     : 9.3 (AV:N/AC:M/Au:NR/C:C/I:C/A:C)
-    CVSS Temporal Score : 6.9
-  Risk factor: Critical";
+    CVSS Temporal Score : 6.9";
 
   script_description(desc);
   script_summary("Check for the version of Adobe Shockwave Player");


Property changes on: trunk/openvas-plugins/scripts/gb_adobe_shockwave_player_bof_vuln_jan10.nasl
___________________________________________________________________
Name: svn:keywords
   - Revision
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_apache_tomcat_mod_jk_info_disc_vuln.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_apache_tomcat_mod_jk_info_disc_vuln.nasl	2011-11-09 16:10:49 UTC (rev 12074)
+++ trunk/openvas-plugins/scripts/gb_apache_tomcat_mod_jk_info_disc_vuln.nasl	2011-11-09 16:18:42 UTC (rev 12075)
@@ -1,6 +1,6 @@
 ###############################################################################
 # OpenVAS Vulnerability Test
-# $Id: gb_apache_tomcat_mod_jk_info_disc_vuln.nasl 1630 2009-04-13 12:40:34Z apr $
+# $Id$
 #
 # Apache Tomcat mod_jk Information Disclosure Vulnerability
 #
@@ -27,7 +27,9 @@
 if(description)
 {
   script_id(800277);
-  script_version("$Revision: 1.0 $");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2009-04-17 09:00:01 +0200 (Fri, 17 Apr 2009)");
   script_tag(name:"cvss_base", value:"2.6");
   script_tag(name:"risk_factor", value:"Medium");
   script_cve_id("CVE-2008-5519");
@@ -66,8 +68,7 @@
 
   CVSS Score:
     CVSS Base Score     : 2.6 (AV:N/AC:H/Au:NR/C:P/I:N/A:N)
-    CVSS Temporal Score : 1.9
-  Risk factor: Medium";
+    CVSS Temporal Score : 1.9";
 
   script_description(desc);
   script_summary("Check version of Apache Module mod_jk");


Property changes on: trunk/openvas-plugins/scripts/gb_apache_tomcat_mod_jk_info_disc_vuln.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_apple_safari_object_tag_dos_vuln.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_apple_safari_object_tag_dos_vuln.nasl	2011-11-09 16:10:49 UTC (rev 12074)
+++ trunk/openvas-plugins/scripts/gb_apple_safari_object_tag_dos_vuln.nasl	2011-11-09 16:18:42 UTC (rev 12075)
@@ -1,6 +1,6 @@
 ###############################################################################
 # OpenVAS Vulnerability Test
-# $Id: gb_apple_safari_object_tag_dos_vuln.nasl 8016 2010-04-01 12:29:17Z apr $
+# $Id$
 #
 # Apple Safari Nested 'object' Tag Remote Denial Of Service vulnerability
 #
@@ -27,7 +27,9 @@
 if(description)
 {
   script_id(800744);
-  script_version("$Revision$:1.0");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2010-04-01 11:04:35 +0200 (Thu, 01 Apr 2010)");
   script_cve_id("CVE-2010-1131");
   script_bugtraq_id(38884);
   script_tag(name:"cvss_base", value:"4.3");


Property changes on: trunk/openvas-plugins/scripts/gb_apple_safari_object_tag_dos_vuln.nasl
___________________________________________________________________
Name: svn:keywords
   - Revision
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_bugzilla_44618.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_bugzilla_44618.nasl	2011-11-09 16:10:49 UTC (rev 12074)
+++ trunk/openvas-plugins/scripts/gb_bugzilla_44618.nasl	2011-11-09 16:18:42 UTC (rev 12075)
@@ -27,10 +27,12 @@
 if (description)
 {
  script_id(100892);
+ script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2010-11-05 13:21:25 +0100 (Fri, 05 Nov 2010)");
  script_bugtraq_id(44618);
  script_cve_id("CVE-2010-3172","CVE-2010-3764");
  script_tag(name:"cvss_base", value:"5.0");
- script_version("1.0-$Revision$");
 
  script_name("Bugzilla Response Splitting and Security Bypass Vulnerabilities");
 


Property changes on: trunk/openvas-plugins/scripts/gb_bugzilla_44618.nasl
___________________________________________________________________
Name: svn:keywords
   - Id Revision
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_coldcalendar_eventid_sql_inj_vuln.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_coldcalendar_eventid_sql_inj_vuln.nasl	2011-11-09 16:10:49 UTC (rev 12074)
+++ trunk/openvas-plugins/scripts/gb_coldcalendar_eventid_sql_inj_vuln.nasl	2011-11-09 16:18:42 UTC (rev 12075)
@@ -1,6 +1,6 @@
 ###############################################################################
 # OpenVAS Vulnerability Test
-# $Id: gb_coldcalendar_eventid_sql_inj_vuln.nasl 17754 2011-10-12 11:11:11Z oct $
+# $Id$
 #
 # ColdGen ColdCalendar 'EventID' SQL Injection Vulnerability
 #
@@ -27,7 +27,9 @@
 if(description)
 {
   script_id(802253);
-  script_version("$Revision: 1.0$");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2011-10-14 14:22:41 +0200 (Fri, 14 Oct 2011)");
   script_bugtraq_id(43035);
   script_cve_id("CVE-2010-4910");
   script_tag(name:"cvss_base", value:"7.5");


Property changes on: trunk/openvas-plugins/scripts/gb_coldcalendar_eventid_sql_inj_vuln.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_community_server_49022.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_community_server_49022.nasl	2011-11-09 16:10:49 UTC (rev 12074)
+++ trunk/openvas-plugins/scripts/gb_community_server_49022.nasl	2011-11-09 16:18:42 UTC (rev 12075)
@@ -27,8 +27,10 @@
 if (description)
 {
  script_id(103197);
+ script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2011-08-11 14:25:35 +0200 (Thu, 11 Aug 2011)");
  script_bugtraq_id(49022);
- script_version ("1.0-$Revision$");
 
  script_name("Community Server 'TagSelector.aspx' Cross Site Scripting Vulnerability");
 


Property changes on: trunk/openvas-plugins/scripts/gb_community_server_49022.nasl
___________________________________________________________________
Name: svn:keywords
   - Id Revision
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_elecard_mpeg_player_bof_vuln.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_elecard_mpeg_player_bof_vuln.nasl	2011-11-09 16:10:49 UTC (rev 12074)
+++ trunk/openvas-plugins/scripts/gb_elecard_mpeg_player_bof_vuln.nasl	2011-11-09 16:18:42 UTC (rev 12075)
@@ -1,6 +1,6 @@
 ###############################################################################
 # OpenVAS Vulnerability Test
-# $Id: gb_elecard_mpeg_player_bof_vuln.nasl 1001 2009-02-10 15:56:36Z feb $
+# $Id$
 #
 # Elecard MPEG Player Buffer Overflow Vulnerability
 #
@@ -27,7 +27,9 @@
 if(description)
 {
   script_id(800511);
-  script_version("$Revision: 1.0 $");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2009-02-16 16:42:20 +0100 (Mon, 16 Feb 2009)");
   script_tag(name:"cvss_base", value:"9.3");
   script_tag(name:"risk_factor", value:"Critical");
   script_cve_id("CVE-2009-0491");
@@ -62,8 +64,7 @@
 
   CVSS Score:
     CVSS Base Score     : 9.3 (AV:N/AC:M/Au:NR/C:C/I:C/A:C)
-    CVSS Temporal Score : 8.4
-  Risk factor: Critical";
+    CVSS Temporal Score : 8.4";
 
   script_description(desc);
   script_summary("Check for the version of Elecard MPEG Player");


Property changes on: trunk/openvas-plugins/scripts/gb_elecard_mpeg_player_bof_vuln.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_emc_networker_detect.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_emc_networker_detect.nasl	2011-11-09 16:10:49 UTC (rev 12074)
+++ trunk/openvas-plugins/scripts/gb_emc_networker_detect.nasl	2011-11-09 16:18:42 UTC (rev 12075)
@@ -36,7 +36,9 @@
  
  script_tag(name:"risk_factor", value:"None");
  script_id(103123);
- script_version ("1.0-$Revision$");
+ script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2011-03-23 13:28:27 +0100 (Wed, 23 Mar 2011)");
 
  script_name("EMC Networker Detection");
  script_description(desc);


Property changes on: trunk/openvas-plugins/scripts/gb_emc_networker_detect.nasl
___________________________________________________________________
Name: svn:keywords
   - Id Revision
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_fedora_2007_2652_tempest_fc7.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_fedora_2007_2652_tempest_fc7.nasl	2011-11-09 16:10:49 UTC (rev 12074)
+++ trunk/openvas-plugins/scripts/gb_fedora_2007_2652_tempest_fc7.nasl	2011-11-09 16:18:42 UTC (rev 12075)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(861082);
-  script_version("$Revision: 1.0 $");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2009-02-27 16:01:32 +0100 (Fri, 27 Feb 2009)");
   script_tag(name:"cvss_base", value:"5.0");
   script_tag(name:"risk_factor", value:"Medium");
   script_xref(name: "FEDORA", value: "2007-2652");
@@ -45,10 +47,8 @@
   Fix: Please Install the Updated Packages.
 
   References:
-  https://www.redhat.com/archives/fedora-package-announce/2007-October/msg00334.html
+  https://www.redhat.com/archives/fedora-package-announce/2007-October/msg00334.html";
 
-  Risk factor: Medium";
-
   script_description(desc);
   script_summary("Check for the Version of tempest");
   script_category(ACT_GATHER_INFO);


Property changes on: trunk/openvas-plugins/scripts/gb_fedora_2007_2652_tempest_fc7.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_fedora_2007_422_libXfont_fc5.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_fedora_2007_422_libXfont_fc5.nasl	2011-11-09 16:10:49 UTC (rev 12074)
+++ trunk/openvas-plugins/scripts/gb_fedora_2007_422_libXfont_fc5.nasl	2011-11-09 16:18:42 UTC (rev 12075)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(861380);
-  script_version("$Revision: 1.0 $");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2009-02-27 16:27:46 +0100 (Fri, 27 Feb 2009)");
   script_tag(name:"risk_factor", value:"High");
   script_xref(name: "FEDORA", value: "2007-422");
   script_name( "Fedora Update for libXfont FEDORA-2007-422");
@@ -42,10 +44,8 @@
   Fix: Please Install the Updated Packages.
 
   References:
-  https://www.redhat.com/archives/fedora-package-announce/2007-April/msg00023.html
+  https://www.redhat.com/archives/fedora-package-announce/2007-April/msg00023.html";
 
-  Risk factor: High";
-
   script_description(desc);
   script_summary("Check for the Version of libXfont");
   script_category(ACT_GATHER_INFO);


Property changes on: trunk/openvas-plugins/scripts/gb_fedora_2007_422_libXfont_fc5.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_fedora_2007_740_cups_fc6.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_fedora_2007_740_cups_fc6.nasl	2011-11-09 16:10:49 UTC (rev 12074)
+++ trunk/openvas-plugins/scripts/gb_fedora_2007_740_cups_fc6.nasl	2011-11-09 16:18:42 UTC (rev 12075)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(861541);
-  script_version("$Revision: 1.0 $");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2009-02-27 16:31:39 +0100 (Fri, 27 Feb 2009)");
   script_tag(name:"cvss_base", value:"10.0");
   script_tag(name:"risk_factor", value:"Critical");
   script_xref(name: "FEDORA", value: "2007-740");
@@ -47,10 +49,8 @@
   Fix: Please Install the Updated Packages.
 
   References:
-  https://www.redhat.com/archives/fedora-package-announce/2007-November/msg00077.html
+  https://www.redhat.com/archives/fedora-package-announce/2007-November/msg00077.html";
 
-  Risk factor: Critical";
-
   script_description(desc);
   script_summary("Check for the Version of cups");
   script_category(ACT_GATHER_INFO);


Property changes on: trunk/openvas-plugins/scripts/gb_fedora_2007_740_cups_fc6.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_fedora_2008_0462_libxml2_fc8.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_fedora_2008_0462_libxml2_fc8.nasl	2011-11-09 16:10:49 UTC (rev 12074)
+++ trunk/openvas-plugins/scripts/gb_fedora_2008_0462_libxml2_fc8.nasl	2011-11-09 16:18:42 UTC (rev 12075)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(860226);
-  script_version("$Revision: 1.0 $");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2009-02-17 17:12:43 +0100 (Tue, 17 Feb 2009)");
   script_tag(name:"cvss_base", value:"5.0");
   script_tag(name:"risk_factor", value:"Medium");
   script_xref(name: "FEDORA", value: "2008-0462");
@@ -52,10 +54,8 @@
   Fix: Please Install the Updated Packages.
 
   References:
-  https://www.redhat.com/archives/fedora-package-announce/2008-January/msg00379.html
+  https://www.redhat.com/archives/fedora-package-announce/2008-January/msg00379.html";
 
-  Risk factor: Medium";
-
   script_description(desc);
   script_summary("Check for the Version of libxml2");
   script_category(ACT_GATHER_INFO);


Property changes on: trunk/openvas-plugins/scripts/gb_fedora_2008_0462_libxml2_fc8.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_fedora_2008_11511_yelp_fc10.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_fedora_2008_11511_yelp_fc10.nasl	2011-11-09 16:10:49 UTC (rev 12074)
+++ trunk/openvas-plugins/scripts/gb_fedora_2008_11511_yelp_fc10.nasl	2011-11-09 16:18:42 UTC (rev 12075)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(860016);
-  script_version("$Revision: 1.0 $");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2009-02-13 10:35:30 +0100 (Fri, 13 Feb 2009)");
   script_tag(name:"cvss_base", value:"10.0");
   script_tag(name:"risk_factor", value:"Critical");
   script_xref(name: "FEDORA", value: "2008-11511");
@@ -46,10 +48,8 @@
   Fix: Please Install the Updated Packages.
 
   References:
-  https://www.redhat.com/archives/fedora-package-announce/2008-December/msg01014.html
+  https://www.redhat.com/archives/fedora-package-announce/2008-December/msg01014.html";
 
-  Risk factor: Critical";
-
   script_description(desc);
   script_summary("Check for the Version of yelp");
   script_category(ACT_GATHER_INFO);


Property changes on: trunk/openvas-plugins/scripts/gb_fedora_2008_11511_yelp_fc10.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_fedora_2008_1287_deluge_fc8.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_fedora_2008_1287_deluge_fc8.nasl	2011-11-09 16:10:49 UTC (rev 12074)
+++ trunk/openvas-plugins/scripts/gb_fedora_2008_1287_deluge_fc8.nasl	2011-11-09 16:18:42 UTC (rev 12075)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(860335);
-  script_version("$Revision: 1.0 $");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2009-02-16 14:16:57 +0100 (Mon, 16 Feb 2009)");
   script_tag(name:"risk_factor", value:"High");
   script_xref(name: "FEDORA", value: "2008-1287");
   script_name( "Fedora Update for deluge FEDORA-2008-1287");
@@ -47,10 +49,8 @@
   Fix: Please Install the Updated Packages.
 
   References:
-  https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00079.html
+  https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00079.html";
 
-  Risk factor: High";
-
   script_description(desc);
   script_summary("Check for the Version of deluge");
   script_category(ACT_GATHER_INFO);


Property changes on: trunk/openvas-plugins/scripts/gb_fedora_2008_1287_deluge_fc8.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_fedora_2008_2464_dovecot_fc8.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_fedora_2008_2464_dovecot_fc8.nasl	2011-11-09 16:10:49 UTC (rev 12074)
+++ trunk/openvas-plugins/scripts/gb_fedora_2008_2464_dovecot_fc8.nasl	2011-11-09 16:18:42 UTC (rev 12075)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(860169);
-  script_version("$Revision: 1.0 $");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2009-02-16 16:22:52 +0100 (Mon, 16 Feb 2009)");
   script_tag(name:"cvss_base", value:"6.8");
   script_tag(name:"risk_factor", value:"High");
   script_xref(name: "FEDORA", value: "2008-2464");
@@ -48,10 +50,8 @@
   Fix: Please Install the Updated Packages.
 
   References:
-  https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00358.html
+  https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00358.html";
 
-  Risk factor : High";
-
   script_description(desc);
   script_summary("Check for the Version of dovecot");
   script_category(ACT_GATHER_INFO);


Property changes on: trunk/openvas-plugins/scripts/gb_fedora_2008_2464_dovecot_fc8.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_fedora_2008_2678_namazu_fc7.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_fedora_2008_2678_namazu_fc7.nasl	2011-11-09 16:10:49 UTC (rev 12074)
+++ trunk/openvas-plugins/scripts/gb_fedora_2008_2678_namazu_fc7.nasl	2011-11-09 16:18:42 UTC (rev 12075)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(860558);
-  script_version("$Revision: 1.0 $");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2009-02-16 16:22:52 +0100 (Mon, 16 Feb 2009)");
   script_tag(name:"cvss_base", value:"4.3");
   script_tag(name:"risk_factor", value:"Medium");
   script_xref(name: "FEDORA", value: "2008-2678");
@@ -47,10 +49,8 @@
   Fix: Please Install the Updated Packages.
 
   References:
-  https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00575.html
+  https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00575.html";
 
-  Risk factor: Medium";
-
   script_description(desc);
   script_summary("Check for the Version of namazu");
   script_category(ACT_GATHER_INFO);


Property changes on: trunk/openvas-plugins/scripts/gb_fedora_2008_2678_namazu_fc7.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_fedora_2008_2987_PolicyKit_fc8.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_fedora_2008_2987_PolicyKit_fc8.nasl	2011-11-09 16:10:49 UTC (rev 12074)
+++ trunk/openvas-plugins/scripts/gb_fedora_2008_2987_PolicyKit_fc8.nasl	2011-11-09 16:18:42 UTC (rev 12075)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(860384);
-  script_version("$Revision: 1.0 $");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2009-02-16 16:22:52 +0100 (Mon, 16 Feb 2009)");
   script_tag(name:"cvss_base", value:"4.6");
   script_tag(name:"risk_factor", value:"Medium");
   script_xref(name: "FEDORA", value: "2008-2987");
@@ -45,10 +47,8 @@
   Fix: Please Install the Updated Packages.
 
   References:
-  https://www.redhat.com/archives/fedora-package-announce/2008-April/msg00176.html
+  https://www.redhat.com/archives/fedora-package-announce/2008-April/msg00176.html";
 
-  Risk factor: Medium";
-
   script_description(desc);
   script_summary("Check for the Version of PolicyKit");
   script_category(ACT_GATHER_INFO);


Property changes on: trunk/openvas-plugins/scripts/gb_fedora_2008_2987_PolicyKit_fc8.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_fedora_2008_9597_lynx_fc8.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_fedora_2008_9597_lynx_fc8.nasl	2011-11-09 16:10:49 UTC (rev 12074)
+++ trunk/openvas-plugins/scripts/gb_fedora_2008_9597_lynx_fc8.nasl	2011-11-09 16:18:42 UTC (rev 12075)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(860692);
-  script_version("$Revision: 1.0 $");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2009-02-17 17:07:33 +0100 (Tue, 17 Feb 2009)");
   script_tag(name:"cvss_base", value:"10.0");
   script_tag(name:"risk_factor", value:"Critical");
   script_xref(name: "FEDORA", value: "2008-9597");
@@ -47,10 +49,8 @@
   Fix: Please Install the Updated Packages.
 
   References:
-  https://www.redhat.com/archives/fedora-package-announce/2008-December/msg00143.html
+  https://www.redhat.com/archives/fedora-package-announce/2008-December/msg00143.html";
 
-  Risk factor: Critical";
-
   script_description(desc);
   script_summary("Check for the Version of lynx");
   script_category(ACT_GATHER_INFO);


Property changes on: trunk/openvas-plugins/scripts/gb_fedora_2008_9597_lynx_fc8.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_fedora_2008_9633_optipng_fc9.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_fedora_2008_9633_optipng_fc9.nasl	2011-11-09 16:10:49 UTC (rev 12074)
+++ trunk/openvas-plugins/scripts/gb_fedora_2008_9633_optipng_fc9.nasl	2011-11-09 16:18:42 UTC (rev 12075)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(860182);
-  script_version("$Revision: 1.0 $");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2009-02-17 17:07:33 +0100 (Tue, 17 Feb 2009)");
   script_tag(name:"risk_factor", value:"High");
   script_xref(name: "FEDORA", value: "2008-9633");
   script_name( "Fedora Update for optipng FEDORA-2008-9633");
@@ -45,10 +47,8 @@
   Fix: Please Install the Updated Packages.
 
   References:
-  https://www.redhat.com/archives/fedora-package-announce/2008-November/msg00321.html
+  https://www.redhat.com/archives/fedora-package-announce/2008-November/msg00321.html";
 
-  Risk factor: High";
-
   script_description(desc);
   script_summary("Check for the Version of optipng");
   script_category(ACT_GATHER_INFO);


Property changes on: trunk/openvas-plugins/scripts/gb_fedora_2008_9633_optipng_fc9.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_fedora_2010_10400_python-paste_fc11.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_fedora_2010_10400_python-paste_fc11.nasl	2011-11-09 16:10:49 UTC (rev 12074)
+++ trunk/openvas-plugins/scripts/gb_fedora_2010_10400_python-paste_fc11.nasl	2011-11-09 16:18:42 UTC (rev 12075)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(862206);
-  script_version("$Revision$: 1.0");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2010-06-28 09:16:14 +0200 (Mon, 28 Jun 2010)");
   script_tag(name:"risk_factor", value:"High");
   script_xref(name: "FEDORA", value: "2010-10400");
   script_name("Fedora Update for python-paste FEDORA-2010-10400");


Property changes on: trunk/openvas-plugins/scripts/gb_fedora_2010_10400_python-paste_fc11.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_fedora_2010_11428_php_fc12.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_fedora_2010_11428_php_fc12.nasl	2011-11-09 16:10:49 UTC (rev 12074)
+++ trunk/openvas-plugins/scripts/gb_fedora_2010_11428_php_fc12.nasl	2011-11-09 16:18:42 UTC (rev 12075)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(862345);
-  script_version("$Revision$: 1.0");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2010-08-30 16:59:25 +0200 (Mon, 30 Aug 2010)");
   script_tag(name:"cvss_base", value:"7.5");
   script_tag(name:"risk_factor", value:"High");
   script_xref(name: "FEDORA", value: "2010-11428");


Property changes on: trunk/openvas-plugins/scripts/gb_fedora_2010_11428_php_fc12.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_fedora_2010_14501_phpMyAdmin_fc14.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_fedora_2010_14501_phpMyAdmin_fc14.nasl	2011-11-09 16:10:49 UTC (rev 12074)
+++ trunk/openvas-plugins/scripts/gb_fedora_2010_14501_phpMyAdmin_fc14.nasl	2011-11-09 16:18:42 UTC (rev 12075)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(862574);
-  script_version("$Revision$: 1.0");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2010-12-02 08:39:14 +0100 (Thu, 02 Dec 2010)");
   script_tag(name:"risk_factor", value:"High");
   script_xref(name: "FEDORA", value: "2010-14501");
   script_name("Fedora Update for phpMyAdmin FEDORA-2010-14501");


Property changes on: trunk/openvas-plugins/scripts/gb_fedora_2010_14501_phpMyAdmin_fc14.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_fedora_2010_14832_kernel_fc14.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_fedora_2010_14832_kernel_fc14.nasl	2011-11-09 16:10:49 UTC (rev 12074)
+++ trunk/openvas-plugins/scripts/gb_fedora_2010_14832_kernel_fc14.nasl	2011-11-09 16:18:42 UTC (rev 12075)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(862687);
-  script_version("$Revision$: 1.0");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2010-12-02 08:39:14 +0100 (Thu, 02 Dec 2010)");
   script_tag(name:"cvss_base", value:"7.2");
   script_tag(name:"risk_factor", value:"High");
   script_xref(name: "FEDORA", value: "2010-14832");


Property changes on: trunk/openvas-plugins/scripts/gb_fedora_2010_14832_kernel_fc14.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_fedora_2010_16782_moodle_fc13.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_fedora_2010_16782_moodle_fc13.nasl	2011-11-09 16:10:49 UTC (rev 12074)
+++ trunk/openvas-plugins/scripts/gb_fedora_2010_16782_moodle_fc13.nasl	2011-11-09 16:18:42 UTC (rev 12075)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(862549);
-  script_version("$Revision$: 1.0");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2010-11-16 14:49:48 +0100 (Tue, 16 Nov 2010)");
   script_tag(name:"cvss_base", value:"4.3");
   script_tag(name:"risk_factor", value:"Medium");
   script_xref(name: "FEDORA", value: "2010-16782");


Property changes on: trunk/openvas-plugins/scripts/gb_fedora_2010_16782_moodle_fc13.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_fedora_2010_18425_krb5_fc13.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_fedora_2010_18425_krb5_fc13.nasl	2011-11-09 16:10:49 UTC (rev 12074)
+++ trunk/openvas-plugins/scripts/gb_fedora_2010_18425_krb5_fc13.nasl	2011-11-09 16:18:42 UTC (rev 12075)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(862718);
-  script_version("$Revision$: 1.0");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2010-12-23 07:38:58 +0100 (Thu, 23 Dec 2010)");
   script_tag(name:"cvss_base", value:"6.8");
   script_tag(name:"risk_factor", value:"High");
   script_xref(name: "FEDORA", value: "2010-18425");


Property changes on: trunk/openvas-plugins/scripts/gb_fedora_2010_18425_krb5_fc13.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_fedora_2010_1863_maildrop_fc12.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_fedora_2010_1863_maildrop_fc12.nasl	2011-11-09 16:10:49 UTC (rev 12074)
+++ trunk/openvas-plugins/scripts/gb_fedora_2010_1863_maildrop_fc12.nasl	2011-11-09 16:18:42 UTC (rev 12075)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(861644);
-  script_version("$Revision$: 1.0");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2010-03-02 08:38:02 +0100 (Tue, 02 Mar 2010)");
   script_tag(name:"cvss_base", value:"6.9");
   script_tag(name:"risk_factor", value:"High");
   script_xref(name: "FEDORA", value: "2010-1863");
@@ -69,10 +71,8 @@
   Fix: Please Install the Updated Packages.
 
   References:
-  http://lists.fedoraproject.org/pipermail/package-announce/2010-February/035127.html
+  http://lists.fedoraproject.org/pipermail/package-announce/2010-February/035127.html";
 
-  Risk factor : High";
-
   script_description(desc);
   script_summary("Check for the Version of maildrop");
   script_category(ACT_GATHER_INFO);


Property changes on: trunk/openvas-plugins/scripts/gb_fedora_2010_1863_maildrop_fc12.nasl
___________________________________________________________________
Name: svn:keywords
   - Revision
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_fedora_2010_1941_openoffice.org_fc11.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_fedora_2010_1941_openoffice.org_fc11.nasl	2011-11-09 16:10:49 UTC (rev 12074)
+++ trunk/openvas-plugins/scripts/gb_fedora_2010_1941_openoffice.org_fc11.nasl	2011-11-09 16:18:42 UTC (rev 12075)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(861631);
-  script_version("$Revision$: 1.0");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2010-03-02 08:38:02 +0100 (Tue, 02 Mar 2010)");
   script_tag(name:"cvss_base", value:"9.3");
   script_tag(name:"risk_factor", value:"Critical");
   script_xref(name: "FEDORA", value: "2010-1941");
@@ -55,10 +57,8 @@
   Fix: Please Install the Updated Packages.
 
   References:
-  http://lists.fedoraproject.org/pipermail/package-announce/2010-February/035181.html
+  http://lists.fedoraproject.org/pipermail/package-announce/2010-February/035181.html";
 
-  Risk factor: Critical";
-
   script_description(desc);
   script_summary("Check for the Version of openoffice.org");
   script_category(ACT_GATHER_INFO);


Property changes on: trunk/openvas-plugins/scripts/gb_fedora_2010_1941_openoffice.org_fc11.nasl
___________________________________________________________________
Name: svn:keywords
   - Revision
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_fedora_2010_4339_gnu-smalltalk_fc12.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_fedora_2010_4339_gnu-smalltalk_fc12.nasl	2011-11-09 16:10:49 UTC (rev 12074)
+++ trunk/openvas-plugins/scripts/gb_fedora_2010_4339_gnu-smalltalk_fc12.nasl	2011-11-09 16:18:42 UTC (rev 12075)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(861791);
-  script_version("$Revision$: 1.0");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2010-03-22 11:34:53 +0100 (Mon, 22 Mar 2010)");
   script_tag(name:"cvss_base", value:"6.9");
   script_tag(name:"risk_factor", value:"High");
   script_xref(name: "FEDORA", value: "2010-4339");
@@ -57,10 +59,8 @@
   Fix: Please Install the Updated Packages.
 
   References:
-  http://lists.fedoraproject.org/pipermail/package-announce/2010-March/037576.html
+  http://lists.fedoraproject.org/pipermail/package-announce/2010-March/037576.html";
 
-  Risk factor: High";
-
   script_description(desc);
   script_summary("Check for the Version of gnu-smalltalk");
   script_category(ACT_GATHER_INFO);


Property changes on: trunk/openvas-plugins/scripts/gb_fedora_2010_4339_gnu-smalltalk_fc12.nasl
___________________________________________________________________
Name: svn:keywords
   - Revision
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_fedora_2010_5515_gnome-python2-extras_fc11.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_fedora_2010_5515_gnome-python2-extras_fc11.nasl	2011-11-09 16:10:49 UTC (rev 12074)
+++ trunk/openvas-plugins/scripts/gb_fedora_2010_5515_gnome-python2-extras_fc11.nasl	2011-11-09 16:18:42 UTC (rev 12075)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(861841);
-  script_version("$Revision$: 1.0");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2010-04-06 08:56:44 +0200 (Tue, 06 Apr 2010)");
   script_tag(name:"cvss_base", value:"10.0");
   script_tag(name:"risk_factor", value:"Critical");
   script_xref(name: "FEDORA", value: "2010-5515");
@@ -45,10 +47,8 @@
   Fix: Please Install the Updated Packages.
 
   References:
-  http://lists.fedoraproject.org/pipermail/package-announce/2010-April/038345.html
+  http://lists.fedoraproject.org/pipermail/package-announce/2010-April/038345.html";
 
-  Risk factor : Critical";
-
   script_description(desc);
   script_summary("Check for the Version of gnome-python2-extras");
   script_category(ACT_GATHER_INFO);


Property changes on: trunk/openvas-plugins/scripts/gb_fedora_2010_5515_gnome-python2-extras_fc11.nasl
___________________________________________________________________
Name: svn:keywords
   - Revision
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_fedora_2010_5526_thunderbird_fc11.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_fedora_2010_5526_thunderbird_fc11.nasl	2011-11-09 16:10:49 UTC (rev 12074)
+++ trunk/openvas-plugins/scripts/gb_fedora_2010_5526_thunderbird_fc11.nasl	2011-11-09 16:18:42 UTC (rev 12075)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(861842);
-  script_version("$Revision$: 1.0");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2010-04-06 08:56:44 +0200 (Tue, 06 Apr 2010)");
   script_tag(name:"cvss_base", value:"10.0");
   script_tag(name:"risk_factor", value:"Critical");
   script_xref(name: "FEDORA", value: "2010-5526");
@@ -44,10 +46,8 @@
   Fix: Please Install the Updated Packages.
 
   References:
-  http://lists.fedoraproject.org/pipermail/package-announce/2010-April/038367.html
+  http://lists.fedoraproject.org/pipermail/package-announce/2010-April/038367.html";
 
-  Risk factor : Critical";
-
   script_description(desc);
   script_summary("Check for the Version of thunderbird");
   script_category(ACT_GATHER_INFO);


Property changes on: trunk/openvas-plugins/scripts/gb_fedora_2010_5526_thunderbird_fc11.nasl
___________________________________________________________________
Name: svn:keywords
   - Revision
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_fedora_2010_5539_thunderbird_fc12.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_fedora_2010_5539_thunderbird_fc12.nasl	2011-11-09 16:10:49 UTC (rev 12074)
+++ trunk/openvas-plugins/scripts/gb_fedora_2010_5539_thunderbird_fc12.nasl	2011-11-09 16:18:42 UTC (rev 12075)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(861837);
-  script_version("$Revision$: 1.0");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2010-04-06 08:56:44 +0200 (Tue, 06 Apr 2010)");
   script_tag(name:"cvss_base", value:"10.0");
   script_tag(name:"risk_factor", value:"Critical");
   script_xref(name: "FEDORA", value: "2010-5539");
@@ -44,10 +46,8 @@
   Fix: Please Install the Updated Packages.
 
   References:
-  http://lists.fedoraproject.org/pipermail/package-announce/2010-April/038378.html
+  http://lists.fedoraproject.org/pipermail/package-announce/2010-April/038378.html";
 
-  Risk factor : Critical";
-
   script_description(desc);
   script_summary("Check for the Version of thunderbird");
   script_category(ACT_GATHER_INFO);


Property changes on: trunk/openvas-plugins/scripts/gb_fedora_2010_5539_thunderbird_fc12.nasl
___________________________________________________________________
Name: svn:keywords
   - Revision
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_fedora_2010_7640_boa_fc12.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_fedora_2010_7640_boa_fc12.nasl	2011-11-09 16:10:49 UTC (rev 12074)
+++ trunk/openvas-plugins/scripts/gb_fedora_2010_7640_boa_fc12.nasl	2011-11-09 16:18:42 UTC (rev 12075)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(861949);
-  script_version("$Revision$: 1.0");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2010-05-17 16:00:10 +0200 (Mon, 17 May 2010)");
   script_tag(name:"cvss_base", value:"5.0");
   script_tag(name:"risk_factor", value:"Medium");
   script_xref(name: "FEDORA", value: "2010-7640");


Property changes on: trunk/openvas-plugins/scripts/gb_fedora_2010_7640_boa_fc12.nasl
___________________________________________________________________
Name: svn:keywords
   - Revision
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_fedora_2011_11106_firefox_fc15.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_fedora_2011_11106_firefox_fc15.nasl	2011-11-09 16:10:49 UTC (rev 12074)
+++ trunk/openvas-plugins/scripts/gb_fedora_2011_11106_firefox_fc15.nasl	2011-11-09 16:18:42 UTC (rev 12075)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(863440);
-  script_version("$Revision$: 1.0");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2011-08-19 15:17:22 +0200 (Fri, 19 Aug 2011)");
   script_tag(name:"risk_factor", value:"High");
   script_xref(name: "FEDORA", value: "2011-11106");
   script_name("Fedora Update for firefox FEDORA-2011-11106");


Property changes on: trunk/openvas-plugins/scripts/gb_fedora_2011_11106_firefox_fc15.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_fedora_2011_13465_xulrunner_fc15.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_fedora_2011_13465_xulrunner_fc15.nasl	2011-11-09 16:10:49 UTC (rev 12074)
+++ trunk/openvas-plugins/scripts/gb_fedora_2011_13465_xulrunner_fc15.nasl	2011-11-09 16:18:42 UTC (rev 12075)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(863555);
-  script_version("$Revision$: 1.0");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2011-09-30 16:02:57 +0200 (Fri, 30 Sep 2011)");
   script_tag(name:"risk_factor", value:"High");
   script_xref(name: "FEDORA", value: "2011-13465");
   script_name("Fedora Update for xulrunner FEDORA-2011-13465");


Property changes on: trunk/openvas-plugins/scripts/gb_fedora_2011_13465_xulrunner_fc15.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_fedora_2011_6205_thunderbird_fc13.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_fedora_2011_6205_thunderbird_fc13.nasl	2011-11-09 16:10:49 UTC (rev 12074)
+++ trunk/openvas-plugins/scripts/gb_fedora_2011_6205_thunderbird_fc13.nasl	2011-11-09 16:18:42 UTC (rev 12075)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(863080);
-  script_version("$Revision$: 1.0");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2011-05-10 14:04:15 +0200 (Tue, 10 May 2011)");
   script_tag(name:"risk_factor", value:"High");
   script_xref(name: "FEDORA", value: "2011-6205");
   script_name("Fedora Update for thunderbird FEDORA-2011-6205");


Property changes on: trunk/openvas-plugins/scripts/gb_fedora_2011_6205_thunderbird_fc13.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_fedora_2011_7555_unbound_fc14.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_fedora_2011_7555_unbound_fc14.nasl	2011-11-09 16:10:49 UTC (rev 12074)
+++ trunk/openvas-plugins/scripts/gb_fedora_2011_7555_unbound_fc14.nasl	2011-11-09 16:18:42 UTC (rev 12075)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(863235);
-  script_version("$Revision$: 1.0");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2011-06-10 16:29:51 +0200 (Fri, 10 Jun 2011)");
   script_tag(name:"cvss_base", value:"4.3");
   script_tag(name:"risk_factor", value:"Medium");
   script_xref(name: "FEDORA", value: "2011-7555");


Property changes on: trunk/openvas-plugins/scripts/gb_fedora_2011_7555_unbound_fc14.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_fedora_2011_7818_jabberd_fc13.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_fedora_2011_7818_jabberd_fc13.nasl	2011-11-09 16:10:49 UTC (rev 12074)
+++ trunk/openvas-plugins/scripts/gb_fedora_2011_7818_jabberd_fc13.nasl	2011-11-09 16:18:42 UTC (rev 12075)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(863291);
-  script_version("$Revision$: 1.0");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2011-06-20 08:37:08 +0200 (Mon, 20 Jun 2011)");
   script_tag(name:"risk_factor", value:"Medium");
   script_xref(name: "FEDORA", value: "2011-7818");
   script_tag(name:"cvss_base", value:"5.0");


Property changes on: trunk/openvas-plugins/scripts/gb_fedora_2011_7818_jabberd_fc13.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_fedora_2011_8036_pam_ssh_fc13.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_fedora_2011_8036_pam_ssh_fc13.nasl	2011-11-09 16:10:49 UTC (rev 12074)
+++ trunk/openvas-plugins/scripts/gb_fedora_2011_8036_pam_ssh_fc13.nasl	2011-11-09 16:18:42 UTC (rev 12075)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(863294);
-  script_version("$Revision$: 1.0");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2011-06-24 16:46:35 +0200 (Fri, 24 Jun 2011)");
   script_tag(name:"risk_factor", value:"High");
   script_xref(name: "FEDORA", value: "2011-8036");
   script_name("Fedora Update for pam_ssh FEDORA-2011-8036");


Property changes on: trunk/openvas-plugins/scripts/gb_fedora_2011_8036_pam_ssh_fc13.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_fedora_2011_8627_perl-Gtk2-MozEmbed_fc15.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_fedora_2011_8627_perl-Gtk2-MozEmbed_fc15.nasl	2011-11-09 16:10:49 UTC (rev 12074)
+++ trunk/openvas-plugins/scripts/gb_fedora_2011_8627_perl-Gtk2-MozEmbed_fc15.nasl	2011-11-09 16:18:42 UTC (rev 12075)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(863304);
-  script_version("$Revision$: 1.0");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2011-07-12 08:00:26 +0200 (Tue, 12 Jul 2011)");
   script_tag(name:"risk_factor", value:"High");
   script_xref(name: "FEDORA", value: "2011-8627");
   script_name("Fedora Update for perl-Gtk2-MozEmbed FEDORA-2011-8627");


Property changes on: trunk/openvas-plugins/scripts/gb_fedora_2011_8627_perl-Gtk2-MozEmbed_fc15.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_firefox_mult_vuln_mar09_lin.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_firefox_mult_vuln_mar09_lin.nasl	2011-11-09 16:10:49 UTC (rev 12074)
+++ trunk/openvas-plugins/scripts/gb_firefox_mult_vuln_mar09_lin.nasl	2011-11-09 16:18:42 UTC (rev 12075)
@@ -1,6 +1,6 @@
 ###############################################################################
 # OpenVAS Vulnerability Test
-# $Id: gb_firefox_mult_vuln_mar09_lin.nasl 758 2009-03-05 16:07:33Z mar $
+# $Id$
 #
 # Mozilla Firefox Multiple Vulnerabilities Mar-09 (Linux)
 #
@@ -27,7 +27,9 @@
 if(description)
 {
   script_id(800362);
-  script_version("$Revision: 1.0 $");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2009-03-10 11:59:23 +0100 (Tue, 10 Mar 2009)");
   script_tag(name:"cvss_base", value:"9.3");
   script_tag(name:"risk_factor", value:"Critical");
   script_cve_id("CVE-2009-0771", "CVE-2009-0772", "CVE-2009-0773", "CVE-2009-0774",
@@ -84,8 +86,7 @@
 
   CVSS Score:
     CVSS Base Score     : 9.3 (AV:N/AC:M/Au:NR/C:C/I:C/A:C)
-    CVSS Temporal Score : 7.3
-  Risk factor: Critical";
+    CVSS Temporal Score : 7.3";
 
   script_description(desc);
   script_summary("Check for the version of Firefox");


Property changes on: trunk/openvas-plugins/scripts/gb_firefox_mult_vuln_mar09_lin.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_google_chrome_ftp_clnt_xss_vuln.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_google_chrome_ftp_clnt_xss_vuln.nasl	2011-11-09 16:10:49 UTC (rev 12074)
+++ trunk/openvas-plugins/scripts/gb_google_chrome_ftp_clnt_xss_vuln.nasl	2011-11-09 16:18:42 UTC (rev 12075)
@@ -1,6 +1,6 @@
 ###############################################################################
 # OpenVAS Vulnerability Test
-# $Id: gb_google_chrome_ftp_clnt_xss_vuln.nasl 388 2008-10-30 11:22:09Z oct $
+# $Id$
 #
 # Google Chrome Web Browser FTP Client XSS Vulnerability
 #
@@ -27,7 +27,9 @@
 if(description)
 {
   script_id(800121);
-  script_version("$Revision: 1.0 $");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2008-10-31 15:07:51 +0100 (Fri, 31 Oct 2008)");
   script_tag(name:"cvss_base", value:"5.8");
   script_tag(name:"risk_factor", value:"High");
   script_cve_id("CVE-2008-4724");
@@ -59,8 +61,7 @@
 
   CVSS Score:
     CVSS Base Score     : 5.8 (AV:N/AC:M/Au:NR/C:P/I:P/A:N)
-    CVSS Temporal Score : 5.2
-  Risk factor: High";
+    CVSS Temporal Score : 5.2";
 
   script_description(desc);
   script_summary("Check for the version of Google Chrome");


Property changes on: trunk/openvas-plugins/scripts/gb_google_chrome_ftp_clnt_xss_vuln.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_google_chrome_mult_vuln_jan11_lin.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_google_chrome_mult_vuln_jan11_lin.nasl	2011-11-09 16:10:49 UTC (rev 12074)
+++ trunk/openvas-plugins/scripts/gb_google_chrome_mult_vuln_jan11_lin.nasl	2011-11-09 16:18:42 UTC (rev 12075)
@@ -1,6 +1,6 @@
 ###############################################################################
 # OpenVAS Vulnerability Test
-# $Id: gb_google_chrome_mult_vuln_jan11_lin.nasl 13171 2011-01-21 12:12:12 jan $
+# $Id$
 #
 # Google Chrome Multiple Vulnerabilities - Jan11 (Linux)
 #
@@ -27,7 +27,9 @@
 if(description)
 {
   script_id(801826);
-  script_version("$Revision$: 1.0");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2011-01-27 07:47:27 +0100 (Thu, 27 Jan 2011)");
   script_cve_id("CVE-2011-0470", "CVE-2011-0471", "CVE-2011-0472", "CVE-2011-0473",
                 "CVE-2011-0474", "CVE-2011-0475", "CVE-2011-0476", "CVE-2011-0477",
                 "CVE-2011-0478", "CVE-2011-0479", "CVE-2011-0480", "CVE-2011-0481",


Property changes on: trunk/openvas-plugins/scripts/gb_google_chrome_mult_vuln_jan11_lin.nasl
___________________________________________________________________
Name: svn:keywords
   - Revision
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX00141.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX00141.nasl	2011-11-09 16:10:49 UTC (rev 12074)
+++ trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX00141.nasl	2011-11-09 16:18:42 UTC (rev 12075)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(835115);
-  script_version("$Revision: 1.0 $");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2009-05-05 12:14:23 +0200 (Tue, 05 May 2009)");
   script_tag(name:"risk_factor", value:"High");
   script_xref(name: "HPSBUX", value: "00141");
   script_name( "HP-UX Update for JRE HPSBUX00141");
@@ -47,10 +49,8 @@
   Fix: Please Install the Updated Packages.
 
   References:
-  http://www11.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c00993945-1
+  http://www11.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c00993945-1";
 
-  Risk factor: High";
-
   script_description(desc);
   script_summary("Check for the Version of JRE");
   script_category(ACT_GATHER_INFO);


Property changes on: trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX00141.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX02073.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX02073.nasl	2011-11-09 16:10:49 UTC (rev 12074)
+++ trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX02073.nasl	2011-11-09 16:18:42 UTC (rev 12075)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(835093);
-  script_version("$Revision: 1.0 $");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2009-05-05 12:14:23 +0200 (Tue, 05 May 2009)");
   script_tag(name:"risk_factor", value:"High");
   script_xref(name: "HPSBUX", value: "02073");
   script_name( "HP-UX Update for envd HPSBUX02073");
@@ -47,10 +49,8 @@
   Fix: Please Install the Updated Packages.
 
   References:
-  http://www11.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c00547561-2
+  http://www11.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c00547561-2";
 
-  Risk factor: High";
-
   script_description(desc);
   script_summary("Check for the Version of envd");
   script_category(ACT_GATHER_INFO);


Property changes on: trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX02073.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_ibm_openadmin_tool_detect.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_ibm_openadmin_tool_detect.nasl	2011-11-09 16:10:49 UTC (rev 12074)
+++ trunk/openvas-plugins/scripts/gb_ibm_openadmin_tool_detect.nasl	2011-11-09 16:18:42 UTC (rev 12075)
@@ -1,6 +1,6 @@
 ###############################################################################
 # OpenVAS Vulnerability Test
-# $Id: gb_ibm_openadmin_tool_detect.nasl 17030 2011-09-12 17:10:36Z sep $
+# $Id$
 #
 # IBM Open Admin Tool Version Detection
 #
@@ -27,7 +27,9 @@
 if(description)
 {
   script_id(802158);
-  script_version("$Revision: 1.0$");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2011-09-14 16:05:49 +0200 (Wed, 14 Sep 2011)");
   script_tag(name:"risk_factor", value:"None");
   script_name("IBM Open Admin Tool Version Detection");
   desc = "


Property changes on: trunk/openvas-plugins/scripts/gb_ibm_openadmin_tool_detect.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_mandriva_MDKA_2007_119.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_mandriva_MDKA_2007_119.nasl	2011-11-09 16:10:49 UTC (rev 12074)
+++ trunk/openvas-plugins/scripts/gb_mandriva_MDKA_2007_119.nasl	2011-11-09 16:18:42 UTC (rev 12075)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(830183);
-  script_version("$Revision: 1.0 $");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2009-04-09 13:48:43 +0200 (Thu, 09 Apr 2009)");
   script_tag(name:"risk_factor", value:"High");
   script_xref(name: "MDKA", value: "2007:119");
   script_name( "Mandriva Update for kbd MDKA-2007:119 (kbd)");
@@ -47,10 +49,8 @@
   Fix: Please Install the Updated Packages.
 
   References:
-  http://lists.mandriva.com/security-announce/2007-11/msg00049.php
+  http://lists.mandriva.com/security-announce/2007-11/msg00049.php";
 
-  Risk factor: High";
-
   script_description(desc);
   script_summary("Check for the Version of kbd");
   script_category(ACT_GATHER_INFO);


Property changes on: trunk/openvas-plugins/scripts/gb_mandriva_MDKA_2007_119.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_mandriva_MDKA_2007_136.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_mandriva_MDKA_2007_136.nasl	2011-11-09 16:10:49 UTC (rev 12074)
+++ trunk/openvas-plugins/scripts/gb_mandriva_MDKA_2007_136.nasl	2011-11-09 16:18:42 UTC (rev 12075)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(830301);
-  script_version("$Revision: 1.0 $");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2009-04-09 13:48:43 +0200 (Thu, 09 Apr 2009)");
   script_tag(name:"risk_factor", value:"High");
   script_xref(name: "MDKA", value: "2007:136");
   script_name( "Mandriva Update for ez-ipupdate MDKA-2007:136 (ez-ipupdate)");
@@ -44,10 +46,8 @@
   Fix: Please Install the Updated Packages.
 
   References:
-  http://lists.mandriva.com/security-announce/2007-12/msg00024.php
+  http://lists.mandriva.com/security-announce/2007-12/msg00024.php";
 
-  Risk factor: High";
-
   script_description(desc);
   script_summary("Check for the Version of ez-ipupdate");
   script_category(ACT_GATHER_INFO);


Property changes on: trunk/openvas-plugins/scripts/gb_mandriva_MDKA_2007_136.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_mandriva_MDKSA_2007_020.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_mandriva_MDKSA_2007_020.nasl	2011-11-09 16:10:49 UTC (rev 12074)
+++ trunk/openvas-plugins/scripts/gb_mandriva_MDKSA_2007_020.nasl	2011-11-09 16:18:42 UTC (rev 12075)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(830131);
-  script_version("$Revision: 1.0 $");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2009-04-09 13:53:01 +0200 (Thu, 09 Apr 2009)");
   script_tag(name:"cvss_base", value:"6.8");
   script_tag(name:"risk_factor", value:"High");
   script_xref(name: "MDKSA", value: "2007:020");
@@ -52,10 +54,8 @@
   Fix: Please Install the Updated Packages.
 
   References:
-  http://lists.mandriva.com/security-announce/2007-01/msg00030.php
+  http://lists.mandriva.com/security-announce/2007-01/msg00030.php";
 
-  Risk factor: High";
-
   script_description(desc);
   script_summary("Check for the Version of poppler");
   script_category(ACT_GATHER_INFO);


Property changes on: trunk/openvas-plugins/scripts/gb_mandriva_MDKSA_2007_020.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_mandriva_MDKSA_2007_032.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_mandriva_MDKSA_2007_032.nasl	2011-11-09 16:10:49 UTC (rev 12074)
+++ trunk/openvas-plugins/scripts/gb_mandriva_MDKSA_2007_032.nasl	2011-11-09 16:18:42 UTC (rev 12075)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(830242);
-  script_version("$Revision: 1.0 $");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2009-04-09 13:53:01 +0200 (Thu, 09 Apr 2009)");
   script_tag(name:"cvss_base", value:"4.3");
   script_tag(name:"risk_factor", value:"Medium");
   script_xref(name: "MDKSA", value: "2007:032");
@@ -51,10 +53,8 @@
   Fix: Please Install the Updated Packages.
 
   References:
-  http://lists.mandriva.com/security-announce/2007-02/msg00001.php
+  http://lists.mandriva.com/security-announce/2007-02/msg00001.php";
 
-  Risk factor: Medium";
-
   script_description(desc);
   script_summary("Check for the Version of mpg123");
   script_category(ACT_GATHER_INFO);


Property changes on: trunk/openvas-plugins/scripts/gb_mandriva_MDKSA_2007_032.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_mandriva_MDKSA_2007_175.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_mandriva_MDKSA_2007_175.nasl	2011-11-09 16:10:49 UTC (rev 12074)
+++ trunk/openvas-plugins/scripts/gb_mandriva_MDKSA_2007_175.nasl	2011-11-09 16:18:42 UTC (rev 12075)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(830056);
-  script_version("$Revision: 1.0 $");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2009-04-09 13:57:01 +0200 (Thu, 09 Apr 2009)");
   script_tag(name:"cvss_base", value:"6.8");
   script_tag(name:"risk_factor", value:"High");
   script_xref(name: "MDKSA", value: "2007:175");
@@ -51,10 +53,8 @@
   Fix: Please Install the Updated Packages.
 
   References:
-  http://lists.mandriva.com/security-announce/2007-09/msg00003.php
+  http://lists.mandriva.com/security-announce/2007-09/msg00003.php";
 
-  Risk factor: High";
-
   script_description(desc);
   script_summary("Check for the Version of eggdrop");
   script_category(ACT_GATHER_INFO);


Property changes on: trunk/openvas-plugins/scripts/gb_mandriva_MDKSA_2007_175.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_mandriva_MDKSA_2007_181.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_mandriva_MDKSA_2007_181.nasl	2011-11-09 16:10:49 UTC (rev 12074)
+++ trunk/openvas-plugins/scripts/gb_mandriva_MDKSA_2007_181.nasl	2011-11-09 16:18:42 UTC (rev 12075)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(830306);
-  script_version("$Revision: 1.0 $");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2009-04-09 13:57:01 +0200 (Thu, 09 Apr 2009)");
   script_tag(name:"cvss_base", value:"10.0");
   script_tag(name:"risk_factor", value:"Critical");
   script_xref(name: "MDKSA", value: "2007:181");
@@ -51,10 +53,8 @@
   Fix: Please Install the Updated Packages.
 
   References:
-  http://lists.mandriva.com/security-announce/2007-09/msg00012.php
+  http://lists.mandriva.com/security-announce/2007-09/msg00012.php";
 
-  Risk factor: Critical";
-
   script_description(desc);
   script_summary("Check for the Version of librpcsecgss");
   script_category(ACT_GATHER_INFO);


Property changes on: trunk/openvas-plugins/scripts/gb_mandriva_MDKSA_2007_181.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_mandriva_MDKSA_2007_185.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_mandriva_MDKSA_2007_185.nasl	2011-11-09 16:10:49 UTC (rev 12074)
+++ trunk/openvas-plugins/scripts/gb_mandriva_MDKSA_2007_185.nasl	2011-11-09 16:18:42 UTC (rev 12075)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(830120);
-  script_version("$Revision: 1.0 $");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2009-04-09 13:57:01 +0200 (Thu, 09 Apr 2009)");
   script_tag(name:"cvss_base", value:"2.1");
   script_tag(name:"risk_factor", value:"Medium");
   script_xref(name: "MDKSA", value: "2007:185");
@@ -51,10 +53,8 @@
   Fix: Please Install the Updated Packages.
 
   References:
-  http://lists.mandriva.com/security-announce/2007-09/msg00016.php
+  http://lists.mandriva.com/security-announce/2007-09/msg00016.php";
 
-  Risk factor: Medium";
-
   script_description(desc);
   script_summary("Check for the Version of avahi");
   script_category(ACT_GATHER_INFO);


Property changes on: trunk/openvas-plugins/scripts/gb_mandriva_MDKSA_2007_185.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_mandriva_MDKSA_2007_209.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_mandriva_MDKSA_2007_209.nasl	2011-11-09 16:10:49 UTC (rev 12074)
+++ trunk/openvas-plugins/scripts/gb_mandriva_MDKSA_2007_209.nasl	2011-11-09 16:18:42 UTC (rev 12075)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(830099);
-  script_version("$Revision: 1.0 $");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2009-04-09 14:00:25 +0200 (Thu, 09 Apr 2009)");
   script_tag(name:"cvss_base", value:"4.3");
   script_tag(name:"risk_factor", value:"Medium");
   script_xref(name: "MDKSA", value: "2007:209");
@@ -56,10 +58,8 @@
   Fix: Please Install the Updated Packages.
 
   References:
-  http://lists.mandriva.com/security-announce/2007-11/msg00010.php
+  http://lists.mandriva.com/security-announce/2007-11/msg00010.php";
 
-  Risk factor: Medium";
-
   script_description(desc);
   script_summary("Check for the Version of netpbm");
   script_category(ACT_GATHER_INFO);


Property changes on: trunk/openvas-plugins/scripts/gb_mandriva_MDKSA_2007_209.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_mandriva_MDVA_2008_012.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_mandriva_MDVA_2008_012.nasl	2011-11-09 16:10:49 UTC (rev 12074)
+++ trunk/openvas-plugins/scripts/gb_mandriva_MDVA_2008_012.nasl	2011-11-09 16:18:42 UTC (rev 12075)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(830634);
-  script_version("$Revision: 1.0 $");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2009-04-09 14:05:19 +0200 (Thu, 09 Apr 2009)");
   script_tag(name:"risk_factor", value:"High");
   script_xref(name: "MDVA", value: "2008:012");
   script_name( "Mandriva Update for lzma MDVA-2008:012 (lzma)");
@@ -50,10 +52,8 @@
   Fix: Please Install the Updated Packages.
 
   References:
-  http://lists.mandriva.com/security-announce/2008-01/msg00031.php
+  http://lists.mandriva.com/security-announce/2008-01/msg00031.php";
 
-  Risk factor: High";
-
   script_description(desc);
   script_summary("Check for the Version of lzma");
   script_category(ACT_GATHER_INFO);


Property changes on: trunk/openvas-plugins/scripts/gb_mandriva_MDVA_2008_012.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_mandriva_MDVA_2008_037.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_mandriva_MDVA_2008_037.nasl	2011-11-09 16:10:49 UTC (rev 12074)
+++ trunk/openvas-plugins/scripts/gb_mandriva_MDVA_2008_037.nasl	2011-11-09 16:18:42 UTC (rev 12075)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(830399);
-  script_version("$Revision: 1.0 $");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2009-04-09 14:05:19 +0200 (Thu, 09 Apr 2009)");
   script_tag(name:"risk_factor", value:"High");
   script_xref(name: "MDVA", value: "2008:037");
   script_name( "Mandriva Update for pdksh MDVA-2008:037 (pdksh)");
@@ -45,10 +47,8 @@
   Fix: Please Install the Updated Packages.
 
   References:
-  http://lists.mandriva.com/security-announce/2008-03/msg00015.php
+  http://lists.mandriva.com/security-announce/2008-03/msg00015.php";
 
-  Risk factor: High";
-
   script_description(desc);
   script_summary("Check for the Version of pdksh");
   script_category(ACT_GATHER_INFO);


Property changes on: trunk/openvas-plugins/scripts/gb_mandriva_MDVA_2008_037.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_mandriva_MDVA_2008_112.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_mandriva_MDVA_2008_112.nasl	2011-11-09 16:10:49 UTC (rev 12074)
+++ trunk/openvas-plugins/scripts/gb_mandriva_MDVA_2008_112.nasl	2011-11-09 16:18:42 UTC (rev 12075)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(830409);
-  script_version("$Revision: 1.0 $");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2009-04-09 14:09:08 +0200 (Thu, 09 Apr 2009)");
   script_tag(name:"risk_factor", value:"High");
   script_xref(name: "MDVA", value: "2008:112");
   script_name( "Mandriva Update for kino MDVA-2008:112 (kino)");
@@ -45,10 +47,8 @@
   Fix: Please Install the Updated Packages.
 
   References:
-  http://lists.mandriva.com/security-announce/2008-07/msg00048.php
+  http://lists.mandriva.com/security-announce/2008-07/msg00048.php";
 
-  Risk factor: High";
-
   script_description(desc);
   script_summary("Check for the Version of kino");
   script_category(ACT_GATHER_INFO);


Property changes on: trunk/openvas-plugins/scripts/gb_mandriva_MDVA_2008_112.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_mandriva_MDVA_2008_118.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_mandriva_MDVA_2008_118.nasl	2011-11-09 16:10:49 UTC (rev 12074)
+++ trunk/openvas-plugins/scripts/gb_mandriva_MDVA_2008_118.nasl	2011-11-09 16:18:42 UTC (rev 12075)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(830486);
-  script_version("$Revision: 1.0 $");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2009-04-09 14:09:08 +0200 (Thu, 09 Apr 2009)");
   script_tag(name:"risk_factor", value:"High");
   script_xref(name: "MDVA", value: "2008:118");
   script_name( "Mandriva Update for shared-mime-info MDVA-2008:118 (shared-mime-info)");
@@ -46,10 +48,8 @@
   Fix: Please Install the Updated Packages.
 
   References:
-  http://lists.mandriva.com/security-announce/2008-08/msg00025.php
+  http://lists.mandriva.com/security-announce/2008-08/msg00025.php";
 
-  Risk factor: High";
-
   script_description(desc);
   script_summary("Check for the Version of shared-mime-info");
   script_category(ACT_GATHER_INFO);


Property changes on: trunk/openvas-plugins/scripts/gb_mandriva_MDVA_2008_118.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_mandriva_MDVA_2010_048.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_mandriva_MDVA_2010_048.nasl	2011-11-09 16:10:49 UTC (rev 12074)
+++ trunk/openvas-plugins/scripts/gb_mandriva_MDVA_2010_048.nasl	2011-11-09 16:18:42 UTC (rev 12075)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(830859);
-  script_version("$Revision$: 1.0");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2010-02-08 11:34:22 +0100 (Mon, 08 Feb 2010)");
   script_tag(name:"risk_factor", value:"High");
   script_xref(name: "MDVA", value: "2010:048");
   script_name("Mandriva Update for gtk MDVA-2010:048 (gtk)");
@@ -47,10 +49,8 @@
   Fix: Please Install the Updated Packages.
 
   References:
-  http://lists.mandriva.com/security-announce/2010-02/msg00000.php
+  http://lists.mandriva.com/security-announce/2010-02/msg00000.php";
 
-  Risk factor: High";
-
   script_description(desc);
   script_summary("Check for the Version of gtk");
   script_category(ACT_GATHER_INFO);


Property changes on: trunk/openvas-plugins/scripts/gb_mandriva_MDVA_2010_048.nasl
___________________________________________________________________
Name: svn:keywords
   - Revision
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_mandriva_MDVA_2010_059.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_mandriva_MDVA_2010_059.nasl	2011-11-09 16:10:49 UTC (rev 12074)
+++ trunk/openvas-plugins/scripts/gb_mandriva_MDVA_2010_059.nasl	2011-11-09 16:18:42 UTC (rev 12075)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(830872);
-  script_version("$Revision$: 1.0");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2010-02-15 16:07:49 +0100 (Mon, 15 Feb 2010)");
   script_tag(name:"risk_factor", value:"High");
   script_xref(name: "MDVA", value: "2010:059");
   script_name("Mandriva Update for msec MDVA-2010:059 (msec)");
@@ -47,10 +49,8 @@
   Fix: Please Install the Updated Packages.
 
   References:
-  http://lists.mandriva.com/security-announce/2010-02/msg00018.php
+  http://lists.mandriva.com/security-announce/2010-02/msg00018.php";
 
-  Risk factor: High";
-
   script_description(desc);
   script_summary("Check for the Version of msec");
   script_category(ACT_GATHER_INFO);


Property changes on: trunk/openvas-plugins/scripts/gb_mandriva_MDVA_2010_059.nasl
___________________________________________________________________
Name: svn:keywords
   - Revision
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_mandriva_MDVSA_2008_080.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_mandriva_MDVSA_2008_080.nasl	2011-11-09 16:10:49 UTC (rev 12074)
+++ trunk/openvas-plugins/scripts/gb_mandriva_MDVSA_2008_080.nasl	2011-11-09 16:18:42 UTC (rev 12075)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(830456);
-  script_version("$Revision: 1.0 $");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2009-04-09 14:18:58 +0200 (Thu, 09 Apr 2009)");
   script_tag(name:"cvss_base", value:"9.3");
   script_tag(name:"risk_factor", value:"Critical");
   script_xref(name: "MDVSA", value: "2008:080");
@@ -50,10 +52,8 @@
   Fix: Please Install the Updated Packages.
 
   References:
-  http://lists.mandriva.com/security-announce/2008-03/msg00034.php
+  http://lists.mandriva.com/security-announce/2008-03/msg00034.php";
 
-  Risk factor : Critical";
-
   script_description(desc);
   script_summary("Check for the Version of mozilla-firefox");
   script_category(ACT_GATHER_INFO);


Property changes on: trunk/openvas-plugins/scripts/gb_mandriva_MDVSA_2008_080.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_mandriva_MDVSA_2008_105.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_mandriva_MDVSA_2008_105.nasl	2011-11-09 16:10:49 UTC (rev 12074)
+++ trunk/openvas-plugins/scripts/gb_mandriva_MDVSA_2008_105.nasl	2011-11-09 16:18:42 UTC (rev 12075)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(830754);
-  script_version("$Revision: 1.0 $");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2009-04-09 14:18:58 +0200 (Thu, 09 Apr 2009)");
   script_tag(name:"cvss_base", value:"7.2");
   script_tag(name:"risk_factor", value:"High");
   script_xref(name: "MDVSA", value: "2008:105");
@@ -96,10 +98,8 @@
   Fix: Please Install the Updated Packages.
 
   References:
-  http://lists.mandriva.com/security-announce/2008-05/msg00027.php
+  http://lists.mandriva.com/security-announce/2008-05/msg00027.php";
 
-  Risk factor : High";
-
   script_description(desc);
   script_summary("Check for the Version of kernel");
   script_category(ACT_GATHER_INFO);


Property changes on: trunk/openvas-plugins/scripts/gb_mandriva_MDVSA_2008_105.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_mandriva_MDVSA_2008_167.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_mandriva_MDVSA_2008_167.nasl	2011-11-09 16:10:49 UTC (rev 12074)
+++ trunk/openvas-plugins/scripts/gb_mandriva_MDVSA_2008_167.nasl	2011-11-09 16:18:42 UTC (rev 12075)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(830685);
-  script_version("$Revision: 1.0 $");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2009-04-09 14:18:58 +0200 (Thu, 09 Apr 2009)");
   script_tag(name:"cvss_base", value:"7.8");
   script_tag(name:"risk_factor", value:"High");
   script_xref(name: "MDVSA", value: "2008:167");
@@ -96,10 +98,8 @@
   Fix: Please Install the Updated Packages.
 
   References:
-  http://lists.mandriva.com/security-announce/2008-08/msg00009.php
+  http://lists.mandriva.com/security-announce/2008-08/msg00009.php";
 
-  Risk factor: High";
-
   script_description(desc);
   script_summary("Check for the Version of kernel");
   script_category(ACT_GATHER_INFO);


Property changes on: trunk/openvas-plugins/scripts/gb_mandriva_MDVSA_2008_167.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_mandriva_MDVSA_2008_206.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_mandriva_MDVSA_2008_206.nasl	2011-11-09 16:10:49 UTC (rev 12074)
+++ trunk/openvas-plugins/scripts/gb_mandriva_MDVSA_2008_206.nasl	2011-11-09 16:18:42 UTC (rev 12075)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(830709);
-  script_version("$Revision: 1.0 $");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2009-04-09 14:18:58 +0200 (Thu, 09 Apr 2009)");
   script_tag(name:"cvss_base", value:"10.0");
   script_tag(name:"risk_factor", value:"Critical");
   script_xref(name: "MDVSA", value: "2008:206");
@@ -53,10 +55,8 @@
   Fix: Please Install the Updated Packages.
 
   References:
-  http://lists.mandriva.com/security-announce/2008-09/msg00038.php
+  http://lists.mandriva.com/security-announce/2008-09/msg00038.php";
 
-  Risk factor: Critical";
-
   script_description(desc);
   script_summary("Check for the Version of mozilla-thunderbird");
   script_category(ACT_GATHER_INFO);


Property changes on: trunk/openvas-plugins/scripts/gb_mandriva_MDVSA_2008_206.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_mandriva_MDVSA_2009_241_1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_mandriva_MDVSA_2009_241_1.nasl	2011-11-09 16:10:49 UTC (rev 12074)
+++ trunk/openvas-plugins/scripts/gb_mandriva_MDVSA_2009_241_1.nasl	2011-11-09 16:18:42 UTC (rev 12075)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(830804);
-  script_version("$Revision$: 1.0");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2010-01-15 10:29:41 +0100 (Fri, 15 Jan 2010)");
   script_tag(name:"cvss_base", value:"5.0");
   script_tag(name:"risk_factor", value:"Medium");
   script_xref(name: "MDVSA", value: "2009:241-1");
@@ -57,10 +59,8 @@
   Fix: Please Install the Updated Packages.
 
   References:
-  http://lists.mandriva.com/security-announce/2010-01/msg00025.php
+  http://lists.mandriva.com/security-announce/2010-01/msg00025.php";
 
-  Risk factor: Medium";
-
   script_description(desc);
   script_summary("Check for the Version of squid");
   script_category(ACT_GATHER_INFO);


Property changes on: trunk/openvas-plugins/scripts/gb_mandriva_MDVSA_2009_241_1.nasl
___________________________________________________________________
Name: svn:keywords
   - Revision
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_mandriva_MDVSA_2010_010.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_mandriva_MDVSA_2010_010.nasl	2011-11-09 16:10:49 UTC (rev 12074)
+++ trunk/openvas-plugins/scripts/gb_mandriva_MDVSA_2010_010.nasl	2011-11-09 16:18:42 UTC (rev 12075)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(830817);
-  script_version("$Revision$: 1.0");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2010-01-19 08:58:46 +0100 (Tue, 19 Jan 2010)");
   script_tag(name:"cvss_base", value:"10.0");
   script_tag(name:"risk_factor", value:"Critical");
   script_xref(name: "MDVSA", value: "2010:010");
@@ -63,10 +65,8 @@
   Fix: Please Install the Updated Packages.
 
   References:
-  http://lists.mandriva.com/security-announce/2010-01/msg00051.php
+  http://lists.mandriva.com/security-announce/2010-01/msg00051.php";
 
-  Risk factor: Critical";
-
   script_description(desc);
   script_summary("Check for the Version of libthai");
   script_category(ACT_GATHER_INFO);


Property changes on: trunk/openvas-plugins/scripts/gb_mandriva_MDVSA_2010_010.nasl
___________________________________________________________________
Name: svn:keywords
   - Revision
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_mandriva_MDVSA_2010_123.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_mandriva_MDVSA_2010_123.nasl	2011-11-09 16:10:49 UTC (rev 12074)
+++ trunk/openvas-plugins/scripts/gb_mandriva_MDVSA_2010_123.nasl	2011-11-09 16:18:42 UTC (rev 12075)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(831088);
-  script_version("$Revision$: 1.0");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2010-06-25 12:25:26 +0200 (Fri, 25 Jun 2010)");
   script_tag(name:"risk_factor", value:"High");
   script_xref(name: "MDVSA", value: "2010:123");
   script_name("Mandriva Update for libneon0.27 MDVSA-2010:123 (libneon0.27)");


Property changes on: trunk/openvas-plugins/scripts/gb_mandriva_MDVSA_2010_123.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_mandriva_MDVSA_2010_128.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_mandriva_MDVSA_2010_128.nasl	2011-11-09 16:10:49 UTC (rev 12074)
+++ trunk/openvas-plugins/scripts/gb_mandriva_MDVSA_2010_128.nasl	2011-11-09 16:18:42 UTC (rev 12075)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(831103);
-  script_version("$Revision$: 1.0");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2010-07-12 11:56:20 +0200 (Mon, 12 Jul 2010)");
   script_tag(name:"risk_factor", value:"High");
   script_xref(name: "MDVSA", value: "2010:128");
   script_tag(name:"cvss_base", value:"7.5");


Property changes on: trunk/openvas-plugins/scripts/gb_mandriva_MDVSA_2010_128.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_mandriva_MDVSA_2011_017.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_mandriva_MDVSA_2011_017.nasl	2011-11-09 16:10:49 UTC (rev 12074)
+++ trunk/openvas-plugins/scripts/gb_mandriva_MDVSA_2011_017.nasl	2011-11-09 16:18:42 UTC (rev 12075)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(831318);
-  script_version("$Revision$: 1.0");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2011-01-24 15:31:16 +0100 (Mon, 24 Jan 2011)");
   script_tag(name:"cvss_base", value:"7.6");
   script_tag(name:"risk_factor", value:"High");
   script_xref(name: "MDVSA", value: "2011:017");


Property changes on: trunk/openvas-plugins/scripts/gb_mandriva_MDVSA_2011_017.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_mandriva_MDVSA_2011_063.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_mandriva_MDVSA_2011_063.nasl	2011-11-09 16:10:49 UTC (rev 12074)
+++ trunk/openvas-plugins/scripts/gb_mandriva_MDVSA_2011_063.nasl	2011-11-09 16:18:42 UTC (rev 12075)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(831362);
-  script_version("$Revision$: 1.0");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2011-04-06 16:20:31 +0200 (Wed, 06 Apr 2011)");
   script_tag(name:"cvss_base", value:"5.1");
   script_tag(name:"risk_factor", value:"High");
   script_xref(name: "MDVSA", value: "2011:063");


Property changes on: trunk/openvas-plugins/scripts/gb_mandriva_MDVSA_2011_063.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_mediawiki_clickjacking_vuln.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_mediawiki_clickjacking_vuln.nasl	2011-11-09 16:10:49 UTC (rev 12074)
+++ trunk/openvas-plugins/scripts/gb_mediawiki_clickjacking_vuln.nasl	2011-11-09 16:18:42 UTC (rev 12075)
@@ -1,6 +1,6 @@
 ################################################################################
 # OpenVAS Vulnerability Test
-# $Id: gb_mediawiki_clickjacking_vuln.nasl 13039 2011-03-03 15:11:27Z mar $
+# $Id$
 #
 # MediaWiki Frames Processing Clickjacking Information Disclosure Vulnerability
 #
@@ -27,7 +27,9 @@
 if(description)
 {
   script_id(801900);
-  script_version("$Revision: 1.0$");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2011-03-04 14:32:35 +0100 (Fri, 04 Mar 2011)");
   script_cve_id("CVE-2011-0003");
   script_tag(name:"cvss_base", value:"5.8");
   script_tag(name:"risk_factor", value:"High");


Property changes on: trunk/openvas-plugins/scripts/gb_mediawiki_clickjacking_vuln.nasl
___________________________________________________________________
Name: svn:keywords
   - Revision
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_mozilla_prdts_load_subscript_sec_bypass_vuln_win.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_mozilla_prdts_load_subscript_sec_bypass_vuln_win.nasl	2011-11-09 16:10:49 UTC (rev 12074)
+++ trunk/openvas-plugins/scripts/gb_mozilla_prdts_load_subscript_sec_bypass_vuln_win.nasl	2011-11-09 16:18:42 UTC (rev 12075)
@@ -1,6 +1,6 @@
 ###############################################################################
 # OpenVAS Vulnerability Test
-# $Id: gb_mozilla_prdts_load_subscript_sec_bypass_vuln_win.nasl 17580 2011-10-03 17:15:33Z oct $
+# $Id$
 #
 # Mozilla Firefox and SeaMonkey 'loadSubScript()' Security Bypass Vulnerability (Windows)
 #
@@ -27,7 +27,9 @@
 if(description)
 {
   script_id(802176);
-  script_version("$Revision: 1.0$");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2011-10-04 16:55:13 +0200 (Tue, 04 Oct 2011)");
   script_cve_id("CVE-2011-3004");
   script_bugtraq_id(49852);
   script_tag(name:"cvss_base", value:"4.3");


Property changes on: trunk/openvas-plugins/scripts/gb_mozilla_prdts_load_subscript_sec_bypass_vuln_win.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_mozilla_prdts_mult_vuln_win_sep10.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_mozilla_prdts_mult_vuln_win_sep10.nasl	2011-11-09 16:10:49 UTC (rev 12074)
+++ trunk/openvas-plugins/scripts/gb_mozilla_prdts_mult_vuln_win_sep10.nasl	2011-11-09 16:18:42 UTC (rev 12075)
@@ -1,6 +1,6 @@
 ###############################################################################
 # OpenVAS Vulnerability Test
-# $Id: gb_mozilla_prdts_mult_vuln_win_sep10.nasl 11049 2010-09-10 16:15:33Z sep $
+# $Id$
 #
 # Mozilla Products Multiple Vulnerabilities sep-10 (Windows)
 #
@@ -27,7 +27,9 @@
 if(description)
 {
   script_id(801450);
-  script_version("$Revision$: 1.0");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2010-09-10 16:37:50 +0200 (Fri, 10 Sep 2010)");
   script_cve_id("CVE-2010-2760", "CVE-2010-2764", "CVE-2010-2766", "CVE-2010-2765",
                 "CVE-2010-2768", "CVE-2010-2767", "CVE-2010-2769", "CVE-2010-3166",
                 "CVE-2010-3167", "CVE-2010-3169", "CVE-2010-3168");


Property changes on: trunk/openvas-plugins/scripts/gb_mozilla_prdts_mult_vuln_win_sep10.nasl
___________________________________________________________________
Name: svn:keywords
   - Revision
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_ms11-035_remote.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_ms11-035_remote.nasl	2011-11-09 16:10:49 UTC (rev 12074)
+++ trunk/openvas-plugins/scripts/gb_ms11-035_remote.nasl	2011-11-09 16:18:42 UTC (rev 12075)
@@ -1,6 +1,6 @@
 ###############################################################################
 # OpenVAS Vulnerability Test
-# $Id: gb_ms11-035_remote.nasl 17080 2011-10-20 11:11:11Z oct $
+# $Id$
 #
 # Microsoft Windows WINS Remote Code Execution Vulnerability (2524426)
 #
@@ -27,7 +27,9 @@
 if(description)
 {
   script_id(802260);
-  script_version("$Revision: $");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2011-10-21 16:31:29 +0200 (Fri, 21 Oct 2011)");
   script_cve_id("CVE-2011-1248");
   script_bugtraq_id(47730);
   script_tag(name:"cvss_base", value:"9.3");


Property changes on: trunk/openvas-plugins/scripts/gb_ms11-035_remote.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_ms_ie_bof_vuln_jul09.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_ms_ie_bof_vuln_jul09.nasl	2011-11-09 16:10:49 UTC (rev 12074)
+++ trunk/openvas-plugins/scripts/gb_ms_ie_bof_vuln_jul09.nasl	2011-11-09 16:18:42 UTC (rev 12075)
@@ -1,6 +1,6 @@
 ###############################################################################
 # OpenVAS Vulnerability Test
-# $Id: gb_ms_ie_bof_vuln_jul09.nasl 3411 2009-07-14 11-35-24Z jul $
+# $Id$
 #
 # Microsoft Internet Explorer Buffer Overflow Vulnerability - Jul09
 #
@@ -27,7 +27,9 @@
 if(description)
 {
   script_id(800910);
-  script_version("$Revision: 1.0 $");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2009-07-15 13:05:34 +0200 (Wed, 15 Jul 2009)");
   script_tag(name:"cvss_base", value:"4.3");
   script_tag(name:"risk_factor", value:"Medium");
   script_cve_id("CVE-2009-2433");
@@ -62,8 +64,7 @@
 
   CVSS Score:
     CVSS Base Score      : 4.3 (AV:N/AC:M/Au:NR/C:N/I:N/A:P)
-    CVSS Temporal Score  : 3.9
-  Risk factor: Medium";
+    CVSS Temporal Score  : 3.9";
 
   script_description(desc);
   script_summary("Check for the Version of Internet Explorer");


Property changes on: trunk/openvas-plugins/scripts/gb_ms_ie_bof_vuln_jul09.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_ms_smtp_dns_spoofing_vulnerability.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_ms_smtp_dns_spoofing_vulnerability.nasl	2011-11-09 16:10:49 UTC (rev 12074)
+++ trunk/openvas-plugins/scripts/gb_ms_smtp_dns_spoofing_vulnerability.nasl	2011-11-09 16:18:42 UTC (rev 12075)
@@ -27,9 +27,11 @@
 if (description)
 {
  script_id(100624);
+ script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2010-05-05 18:44:23 +0200 (Wed, 05 May 2010)");
  script_bugtraq_id(39910,39908);
  script_cve_id("CVE-2010-1690,CVE-2010-1689");
- script_version ("1.0-$Revision$");
 
  script_name("Microsoft Windows SMTP Server DNS spoofing vulnerability");
 


Property changes on: trunk/openvas-plugins/scripts/gb_ms_smtp_dns_spoofing_vulnerability.nasl
___________________________________________________________________
Name: svn:keywords
   - Id Revision
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_ms_win_media_player_int_overflow_vuln.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_ms_win_media_player_int_overflow_vuln.nasl	2011-11-09 16:10:49 UTC (rev 12074)
+++ trunk/openvas-plugins/scripts/gb_ms_win_media_player_int_overflow_vuln.nasl	2011-11-09 16:18:42 UTC (rev 12075)
@@ -1,6 +1,6 @@
 ###############################################################################
 # OpenVAS Vulnerability Test
-# $Id: gb_ms_win_mp_int_overflow_vuln.nasl 793 2009-01-02 10:43:24Z jan $
+# $Id$
 #
 # Integer Overflow vulnerability in Microsoft Windows Media Player
 #
@@ -27,7 +27,9 @@
 if(description)
 {
   script_id(800328);
-  script_version("$Revision: 1.0 $");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2009-01-06 15:38:06 +0100 (Tue, 06 Jan 2009)");
   script_tag(name:"cvss_base", value:"4.3");
   script_tag(name:"risk_factor", value:"Medium");
   script_cve_id("CVE-2008-5745");
@@ -61,8 +63,7 @@
 
   CVSS Score:
     CVSS Base Score     : 4.3 (AV:N/AC:M/Au:NR/C:N/I:N/A:P)
-    CVSS Temporal Score : 3.9
-  Risk factor: Medium";
+    CVSS Temporal Score : 3.9";
 
   script_description(desc);
   script_summary("Check for the Version of Windows Media Player");


Property changes on: trunk/openvas-plugins/scripts/gb_ms_win_media_player_int_overflow_vuln.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_nuralstorm_webmail_41559.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_nuralstorm_webmail_41559.nasl	2011-11-09 16:10:49 UTC (rev 12074)
+++ trunk/openvas-plugins/scripts/gb_nuralstorm_webmail_41559.nasl	2011-11-09 16:18:42 UTC (rev 12075)
@@ -27,8 +27,10 @@
 if (description)
 {
  script_id(100743);
+ script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2010-08-04 13:50:35 +0200 (Wed, 04 Aug 2010)");
  script_bugtraq_id(41559);
- script_version ("1.0-$Revision$");
 
  script_name("NuralStorm Webmail Multiple Security Vulnerabilities");
 


Property changes on: trunk/openvas-plugins/scripts/gb_nuralstorm_webmail_41559.nasl
___________________________________________________________________
Name: svn:keywords
   - Id Revision
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_open_urgence_vaccin_detect.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_open_urgence_vaccin_detect.nasl	2011-11-09 16:10:49 UTC (rev 12074)
+++ trunk/openvas-plugins/scripts/gb_open_urgence_vaccin_detect.nasl	2011-11-09 16:18:42 UTC (rev 12075)
@@ -1,6 +1,6 @@
 ###############################################################################
 # OpenVAS Vulnerability Test
-# $Id: gb_open_urgence_vaccin_detect.nasl 8493 2010-05-04 15:20:36Z may $
+# $Id$
 #
 # openUrgence Vaccin Version Detection
 #
@@ -27,7 +27,9 @@
 if(description)
 {
   script_id(800765);
-  script_version("$Revision$: 1.0");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2010-05-05 15:59:12 +0200 (Wed, 05 May 2010)");
   script_tag(name:"risk_factor", value:"None");
   script_name("openUrgence Vaccin Version Detection");
   desc = "


Property changes on: trunk/openvas-plugins/scripts/gb_open_urgence_vaccin_detect.nasl
___________________________________________________________________
Name: svn:keywords
   - Revision
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_openttd_mult_use_after_free_dos_vuln.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_openttd_mult_use_after_free_dos_vuln.nasl	2011-11-09 16:10:49 UTC (rev 12074)
+++ trunk/openvas-plugins/scripts/gb_openttd_mult_use_after_free_dos_vuln.nasl	2011-11-09 16:18:42 UTC (rev 12075)
@@ -1,6 +1,6 @@
 ###############################################################################
 # OpenVAS Vulnerability Test
-# $Id: gb_openttd_mult_use_after_free_dos_vuln.nasl 12258 2010-11-23 19:00:16Z nov $
+# $Id$
 #
 # OpenTTD Multiple use-after-free Denial of Service Vulnerabilities
 #
@@ -27,7 +27,9 @@
 if(description)
 {
   script_id(800184);
-  script_version("$Revision$: 1.0");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2010-11-30 12:42:12 +0100 (Tue, 30 Nov 2010)");
   script_cve_id("CVE-2010-4168");
   script_tag(name:"cvss_base", value:"5.0");
   script_tag(name:"risk_factor", value:"Medium");


Property changes on: trunk/openvas-plugins/scripts/gb_openttd_mult_use_after_free_dos_vuln.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_openx_auth_bypass_vuln.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_openx_auth_bypass_vuln.nasl	2011-11-09 16:10:49 UTC (rev 12074)
+++ trunk/openvas-plugins/scripts/gb_openx_auth_bypass_vuln.nasl	2011-11-09 16:18:42 UTC (rev 12075)
@@ -1,6 +1,6 @@
 ##############################################################################
 # OpenVAS Vulnerability Test
-# $Id: gb_openx_auth_bypass_vuln.nasl 8672 2010-05-03 10:10:29 apr $
+# $Id$
 #
 # OpenX Administrative Interface Authentication Bypass Vulnerability
 #
@@ -27,7 +27,9 @@
 if(description)
 {
   script_id(800760);
-  script_version("$Revision$: 1.0");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2010-05-04 09:40:09 +0200 (Tue, 04 May 2010)");
   script_bugtraq_id(37457);
   script_cve_id("CVE-2009-4830");
   script_tag(name:"cvss_base", value:"7.5");


Property changes on: trunk/openvas-plugins/scripts/gb_openx_auth_bypass_vuln.nasl
___________________________________________________________________
Name: svn:keywords
   - Revision
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_opera_mult_vuln_oct10_win.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_opera_mult_vuln_oct10_win.nasl	2011-11-09 16:10:49 UTC (rev 12074)
+++ trunk/openvas-plugins/scripts/gb_opera_mult_vuln_oct10_win.nasl	2011-11-09 16:18:42 UTC (rev 12075)
@@ -1,6 +1,6 @@
 ###############################################################################
 # OpenVAS Vulnerability Test
-# $Id: gb_opera_mult_vuln_oct10_win.nasl 11854 2010-10-28 11:27:11Z oct $
+# $Id$
 #
 # Opera Browser Multiple Vulnerabilities October-10 (Windows)
 #
@@ -27,7 +27,9 @@
 if(description)
 {
   script_id(801474);
-  script_version("Revision$:1.0");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2010-10-28 11:50:37 +0200 (Thu, 28 Oct 2010)");
   script_cve_id("CVE-2010-4043", "CVE-2010-4044", "CVE-2010-4046", "CVE-2010-4045",
                 "CVE-2010-4047", "CVE-2010-4049", "CVE-2010-4048", "CVE-2010-4050");
   script_tag(name:"cvss_base", value:"9.3");


Property changes on: trunk/openvas-plugins/scripts/gb_opera_mult_vuln_oct10_win.nasl
___________________________________________________________________
Name: svn:keywords
   - Revision
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_oscommerce_malware.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_oscommerce_malware.nasl	2011-11-09 16:10:49 UTC (rev 12074)
+++ trunk/openvas-plugins/scripts/gb_oscommerce_malware.nasl	2011-11-09 16:18:42 UTC (rev 12075)
@@ -27,7 +27,9 @@
 if (description)
 {
  script_id(103201);
- script_version ("1.0-$Revision$");
+ script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2011-08-16 16:27:02 +0200 (Tue, 16 Aug 2011)");
 
  script_name("osCommerce infected with malware");
 


Property changes on: trunk/openvas-plugins/scripts/gb_oscommerce_malware.nasl
___________________________________________________________________
Name: svn:keywords
   - Id Revision
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_peazip_detect_win.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_peazip_detect_win.nasl	2011-11-09 16:10:49 UTC (rev 12074)
+++ trunk/openvas-plugins/scripts/gb_peazip_detect_win.nasl	2011-11-09 16:18:42 UTC (rev 12075)
@@ -1,6 +1,6 @@
 ##############################################################################
 # OpenVAS Vulnerability Test
-# $Id: gb_peazip_detect_win.nasl 3193 2009-07-01 16:05:24Z jul $
+# $Id$
 #
 # PeaZIP Version Detection (Win)
 #
@@ -27,16 +27,16 @@
 if(description)
 {
   script_id(800592);
-  script_version("$Revision: 1.0 $");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2009-07-03 15:23:01 +0200 (Fri, 03 Jul 2009)");
   script_tag(name:"risk_factor", value:"None");
   script_name("PeaZIP Version Detection (Win)");
   desc = "
 
   Overview : This script finds the installed PeaZIP version and saves the
-  result in KB item.
+  result in KB item.";
 
-  Risk factor : None";
-
   script_description(desc);
   script_summary("Set Version of PeaZIP in KB");
   script_category(ACT_GATHER_INFO);


Property changes on: trunk/openvas-plugins/scripts/gb_peazip_detect_win.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_php_script_directory_sql_inj_vuln.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_php_script_directory_sql_inj_vuln.nasl	2011-11-09 16:10:49 UTC (rev 12074)
+++ trunk/openvas-plugins/scripts/gb_php_script_directory_sql_inj_vuln.nasl	2011-11-09 16:18:42 UTC (rev 12075)
@@ -1,6 +1,6 @@
 ###############################################################################
 # OpenVAS Vulnerability Test
-# $Id: gb_php_script_directory_sql_inj_vuln.nasl 13453 2011-02-18 16:14:14Z feb $
+# $Id$
 #
 # PHP Script Directory Software 'sbcat_id' SQL Injection Vulnerability
 #
@@ -27,7 +27,9 @@
 if(description)
 {
   script_id(801729);
-  script_version("$Revision: 1.0$");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2011-02-23 12:24:37 +0100 (Wed, 23 Feb 2011)");
   script_tag(name:"cvss_base", value:"7.5");
   script_tag(name:"risk_factor", value:"High");
   script_name("PHP Script Directory Software 'sbcat_id' Parameter SQL Injection Vulnerability");


Property changes on: trunk/openvas-plugins/scripts/gb_php_script_directory_sql_inj_vuln.nasl
___________________________________________________________________
Name: svn:keywords
   - Revision
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_php_sql_inj_vuln.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_php_sql_inj_vuln.nasl	2011-11-09 16:10:49 UTC (rev 12074)
+++ trunk/openvas-plugins/scripts/gb_php_sql_inj_vuln.nasl	2011-11-09 16:18:42 UTC (rev 12075)
@@ -1,6 +1,6 @@
 ###############################################################################
 # OpenVAS Vulnerability Test
-# $Id: gb_php_sql_inj_vuln.nasl 818 2009-01-06 15:14:56Z jan $
+# $Id$
 #
 # FILTER_UNSAFE_RAW SQL Injection Vulnerability in PHP
 #
@@ -27,7 +27,9 @@
 if(description)
 {
   script_id(800333);
-  script_version("$Revision: 1.0 $");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2009-01-08 07:43:30 +0100 (Thu, 08 Jan 2009)");
   script_tag(name:"cvss_base", value:"7.5");
   script_tag(name:"risk_factor", value:"High");
   script_cve_id("CVE-2008-5844");
@@ -60,8 +62,7 @@
 
   CVSS Score:
     CVSS Base Score     : 7.5 (AV:N/AC:L/Au:NR/C:P/I:P/A:P)
-    CVSS Temporal Score : 5.5
-  Risk factor : High";
+    CVSS Temporal Score : 5.5";
 
   script_description(desc);
   script_summary("Check for the version of PHP");


Property changes on: trunk/openvas-plugins/scripts/gb_php_sql_inj_vuln.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_phpmyadmin_42591.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_phpmyadmin_42591.nasl	2011-11-09 16:10:49 UTC (rev 12074)
+++ trunk/openvas-plugins/scripts/gb_phpmyadmin_42591.nasl	2011-11-09 16:18:42 UTC (rev 12075)
@@ -46,9 +46,11 @@
 if (description)
 {
  script_id(100760);
+ script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2010-08-30 14:30:07 +0200 (Mon, 30 Aug 2010)");
  script_bugtraq_id(42591);
  script_cve_id("CVE-2010-3055");
- script_version ("1.0-$Revision$");
 
  script_name("phpMyAdmin Configuration File PHP Code Injection Vulnerability");
 


Property changes on: trunk/openvas-plugins/scripts/gb_phpmyadmin_42591.nasl
___________________________________________________________________
Name: svn:keywords
   - Id Revision
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_pligg_mult_sql_inj_vuln.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_pligg_mult_sql_inj_vuln.nasl	2011-11-09 16:10:49 UTC (rev 12074)
+++ trunk/openvas-plugins/scripts/gb_pligg_mult_sql_inj_vuln.nasl	2011-11-09 16:18:42 UTC (rev 12075)
@@ -1,6 +1,6 @@
 ###############################################################################
 # OpenVAS Vulnerability Test
-# $Id: gb_pligg_mult_sql_inj_vuln.nasl 10681 2010-08-13 14:14:14Z aug $
+# $Id$
 #
 # Pligg Multiple SQL Injection Vulnerabilities
 #
@@ -30,7 +30,9 @@
 if(description)
 {
   script_id(801258);
-  script_version("$Revision$: 1.1");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2010-08-16 09:09:42 +0200 (Mon, 16 Aug 2010)");
   script_cve_id("CVE-2010-2577", "CVE-2010-3013");
   script_bugtraq_id(42408);
   script_tag(name:"cvss_base", value:"7.5");


Property changes on: trunk/openvas-plugins/scripts/gb_pligg_mult_sql_inj_vuln.nasl
___________________________________________________________________
Name: svn:keywords
   - Revision
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_s40_cms_xss_vuln.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_s40_cms_xss_vuln.nasl	2011-11-09 16:10:49 UTC (rev 12074)
+++ trunk/openvas-plugins/scripts/gb_s40_cms_xss_vuln.nasl	2011-11-09 16:18:42 UTC (rev 12075)
@@ -1,6 +1,6 @@
 ###############################################################################
 # OpenVAS Vulnerability Test
-# $Id: gb_s40_cms_xss_vuln.nasl 16431 2011-08-01 15:15:15Z aug $
+# $Id$
 #
 # S40 Content Management System (CMS) Cross-Site Scripting Vulnerability
 #
@@ -27,7 +27,9 @@
 if(description)
 {
   script_id(801961);
-  script_version("$Revision: 1.0$");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2011-08-04 10:01:53 +0200 (Thu, 04 Aug 2011)");
   script_tag(name:"cvss_base", value:"4.3");
   script_tag(name:"risk_factor", value:"Medium");
   script_name("S40 Content Management System (CMS) Cross-Site Scripting Vulnerability");


Property changes on: trunk/openvas-plugins/scripts/gb_s40_cms_xss_vuln.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_sahana_45730.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_sahana_45730.nasl	2011-11-09 16:10:49 UTC (rev 12074)
+++ trunk/openvas-plugins/scripts/gb_sahana_45730.nasl	2011-11-09 16:18:42 UTC (rev 12075)
@@ -27,8 +27,10 @@
 if (description)
 {
  script_id(103038);
+ script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2011-01-21 13:34:43 +0100 (Fri, 21 Jan 2011)");
  script_bugtraq_id(45730);
- script_version ("1.0-$Revision$");
 
  script_name("Sahana Agasti Multiple Input Validation Vulnerabilities");
 


Property changes on: trunk/openvas-plugins/scripts/gb_sahana_45730.nasl
___________________________________________________________________
Name: svn:keywords
   - Id Revision
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_solaris_110458_02.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_solaris_110458_02.nasl	2011-11-09 16:10:49 UTC (rev 12074)
+++ trunk/openvas-plugins/scripts/gb_solaris_110458_02.nasl	2011-11-09 16:18:42 UTC (rev 12075)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(855080);
-  script_version("$Revision: 1.0 $");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2009-06-03 12:19:17 +0200 (Wed, 03 Jun 2009)");
   script_tag(name:"risk_factor", value:"High");
   script_xref(name: "SUNSolve", value: "110458-02");
   script_name( "Solaris Update for libcurses 110458-02");
@@ -44,10 +46,8 @@
   Fix: Please Install the Updated Packages.
 
   References:
-  http://sunsolve.sun.com/search/document.do?assetkey=1-21-110458-02-1
+  http://sunsolve.sun.com/search/document.do?assetkey=1-21-110458-02-1";
 
-  Risk factor: High";
-
   script_description(desc);
   script_summary("Check for the Version of libcurses");
   script_category(ACT_GATHER_INFO);


Property changes on: trunk/openvas-plugins/scripts/gb_solaris_110458_02.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_solaris_115754_02.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_solaris_115754_02.nasl	2011-11-09 16:10:49 UTC (rev 12074)
+++ trunk/openvas-plugins/scripts/gb_solaris_115754_02.nasl	2011-11-09 16:18:42 UTC (rev 12075)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(855426);
-  script_version("$Revision: 1.0 $");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2009-06-03 12:28:12 +0200 (Wed, 03 Jun 2009)");
   script_tag(name:"risk_factor", value:"High");
   script_xref(name: "SUNSolve", value: "115754-02");
   script_name( "Solaris Update for zlib security 115754-02");
@@ -44,10 +46,8 @@
   Fix: Please Install the Updated Packages.
 
   References:
-  http://sunsolve.sun.com/search/document.do?assetkey=1-21-115754-02-1
+  http://sunsolve.sun.com/search/document.do?assetkey=1-21-115754-02-1";
 
-  Risk factor: High";
-
   script_description(desc);
   script_summary("Check for the Version of zlib security");
   script_category(ACT_GATHER_INFO);


Property changes on: trunk/openvas-plugins/scripts/gb_solaris_115754_02.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_solaris_116479_02.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_solaris_116479_02.nasl	2011-11-09 16:10:49 UTC (rev 12074)
+++ trunk/openvas-plugins/scripts/gb_solaris_116479_02.nasl	2011-11-09 16:18:42 UTC (rev 12075)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(855479);
-  script_version("$Revision: 1.0 $");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2009-06-03 12:28:12 +0200 (Wed, 03 Jun 2009)");
   script_tag(name:"risk_factor", value:"High");
   script_xref(name: "SUNSolve", value: "116479-02");
   script_name( "Solaris Update for edit, ex, vedit, vi and view 116479-02");
@@ -44,10 +46,8 @@
   Fix: Please Install the Updated Packages.
 
   References:
-  http://sunsolve.sun.com/search/document.do?assetkey=1-21-116479-02-1
+  http://sunsolve.sun.com/search/document.do?assetkey=1-21-116479-02-1";
 
-  Risk factor: High";
-
   script_description(desc);
   script_summary("Check for the Version of edit, ex, vedit, vi and view");
   script_category(ACT_GATHER_INFO);


Property changes on: trunk/openvas-plugins/scripts/gb_solaris_116479_02.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_solaris_117471_04.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_solaris_117471_04.nasl	2011-11-09 16:10:49 UTC (rev 12074)
+++ trunk/openvas-plugins/scripts/gb_solaris_117471_04.nasl	2011-11-09 16:18:42 UTC (rev 12075)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(855144);
-  script_version("$Revision: 1.0 $");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2009-06-03 12:28:12 +0200 (Wed, 03 Jun 2009)");
   script_tag(name:"risk_factor", value:"High");
   script_xref(name: "SUNSolve", value: "117471-04");
   script_name( "Solaris Update for connld, fifofs, fifonode 117471-04");
@@ -44,10 +46,8 @@
   Fix: Please Install the Updated Packages.
 
   References:
-  http://sunsolve.sun.com/search/document.do?assetkey=1-21-117471-04-1
+  http://sunsolve.sun.com/search/document.do?assetkey=1-21-117471-04-1";
 
-  Risk factor: High";
-
   script_description(desc);
   script_summary("Check for the Version of connld, fifofs, fifonode");
   script_category(ACT_GATHER_INFO);


Property changes on: trunk/openvas-plugins/scripts/gb_solaris_117471_04.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_solaris_119254_66.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_solaris_119254_66.nasl	2011-11-09 16:10:49 UTC (rev 12074)
+++ trunk/openvas-plugins/scripts/gb_solaris_119254_66.nasl	2011-11-09 16:18:42 UTC (rev 12075)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(855708);
-  script_version("$Revision: 1.0 $");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2009-09-23 10:48:35 +0200 (Wed, 23 Sep 2009)");
   script_tag(name:"risk_factor", value:"High");
   script_xref(name: "SUNSolve", value: "119254-66");
   script_name("Solaris Update for Install and  Utilities 119254-66");
@@ -44,10 +46,8 @@
   Fix: Please Install the Updated Packages.
 
   References:
-  http://sunsolve.sun.com/search/document.do?assetkey=1-21-119254-66-1
+  http://sunsolve.sun.com/search/document.do?assetkey=1-21-119254-66-1";
 
-  Risk factor: High";
-
   script_description(desc);
   script_summary("Check for the Version of Install and  Utilities");
   script_category(ACT_GATHER_INFO);


Property changes on: trunk/openvas-plugins/scripts/gb_solaris_119254_66.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_solaris_120740_05.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_solaris_120740_05.nasl	2011-11-09 16:10:49 UTC (rev 12074)
+++ trunk/openvas-plugins/scripts/gb_solaris_120740_05.nasl	2011-11-09 16:18:42 UTC (rev 12075)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(855116);
-  script_version("$Revision: 1.0 $");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2009-06-03 12:31:50 +0200 (Wed, 03 Jun 2009)");
   script_tag(name:"risk_factor", value:"High");
   script_xref(name: "SUNSolve", value: "120740-05");
   script_name( "Solaris Update for GNOME PDF Viewer based on Xpdf 120740-05");
@@ -44,10 +46,8 @@
   Fix: Please Install the Updated Packages.
 
   References:
-  http://sunsolve.sun.com/search/document.do?assetkey=1-21-120740-05-1
+  http://sunsolve.sun.com/search/document.do?assetkey=1-21-120740-05-1";
 
-  Risk factor: High";
-
   script_description(desc);
   script_summary("Check for the Version of GNOME PDF Viewer based on Xpdf");
   script_category(ACT_GATHER_INFO);


Property changes on: trunk/openvas-plugins/scripts/gb_solaris_120740_05.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_solaris_122911_16.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_solaris_122911_16.nasl	2011-11-09 16:10:49 UTC (rev 12074)
+++ trunk/openvas-plugins/scripts/gb_solaris_122911_16.nasl	2011-11-09 16:18:42 UTC (rev 12075)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(855695);
-  script_version("$Revision: 1.0 $");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2009-09-23 10:48:35 +0200 (Wed, 23 Sep 2009)");
   script_tag(name:"cvss_base", value:"10.0");
   script_tag(name:"risk_factor", value:"Critical");
   script_xref(name: "SUNSolve", value: "122911-16");
@@ -46,10 +48,8 @@
   Fix: Please Install the Updated Packages.
 
   References:
-  http://sunsolve.sun.com/search/document.do?assetkey=1-21-122911-16-1
+  http://sunsolve.sun.com/search/document.do?assetkey=1-21-122911-16-1";
 
-  Risk factor : Critical";
-
   script_description(desc);
   script_summary("Check for the Version of Apache 1.3");
   script_category(ACT_GATHER_INFO);


Property changes on: trunk/openvas-plugins/scripts/gb_solaris_122911_16.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_solaris_138577_01.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_solaris_138577_01.nasl	2011-11-09 16:10:49 UTC (rev 12074)
+++ trunk/openvas-plugins/scripts/gb_solaris_138577_01.nasl	2011-11-09 16:18:42 UTC (rev 12075)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(855016);
-  script_version("$Revision: 1.0 $");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2009-06-03 12:34:39 +0200 (Wed, 03 Jun 2009)");
   script_tag(name:"risk_factor", value:"High");
   script_xref(name: "SUNSolve", value: "138577-01");
   script_name( "Solaris Update for kernel/sys/kaio 138577-01");
@@ -44,10 +46,8 @@
   Fix: Please Install the Updated Packages.
 
   References:
-  http://sunsolve.sun.com/search/document.do?assetkey=1-21-138577-01-1
+  http://sunsolve.sun.com/search/document.do?assetkey=1-21-138577-01-1";
 
-  Risk factor: High";
-
   script_description(desc);
   script_summary("Check for the Version of kernel/sys/kaio");
   script_category(ACT_GATHER_INFO);


Property changes on: trunk/openvas-plugins/scripts/gb_solaris_138577_01.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_sun_java_sys_web_serv_heap_bof_vuln_lin.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_sun_java_sys_web_serv_heap_bof_vuln_lin.nasl	2011-11-09 16:10:49 UTC (rev 12074)
+++ trunk/openvas-plugins/scripts/gb_sun_java_sys_web_serv_heap_bof_vuln_lin.nasl	2011-11-09 16:18:42 UTC (rev 12075)
@@ -1,6 +1,6 @@
 ###############################################################################
 # OpenVAS Vulnerability Test
-# $Id: gb_sun_java_sys_web_serv_heap_bof_vuln_lin.nasl 6969 2010-01-29 17:57:42Z jan $
+# $Id$
 #
 # Sun Java System Web Server Multiple Heap-based Buffer Overflow Vulnerabilities (Linux)
 #
@@ -27,7 +27,9 @@
 if(description)
 {
   script_id(800160);
-  script_version("$Revision$: 1.0");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2010-02-02 07:26:26 +0100 (Tue, 02 Feb 2010)");
   script_tag(name:"cvss_base", value:"7.5");
   script_tag(name:"risk_factor", value:"High");
   script_cve_id("CVE-2010-0387");
@@ -65,8 +67,7 @@
 
   CVSS Score:
     CVSS Base Score     : 7.5 (AV:N/AC:L/Au:NR/C:P/I:P/A:P)
-    CVSS Temporal Score : 6.7
-  Risk factor: High";
+    CVSS Temporal Score : 6.7";
 
   script_description(desc);
   script_summary("Check for the version of Java System Web Server");


Property changes on: trunk/openvas-plugins/scripts/gb_sun_java_sys_web_serv_heap_bof_vuln_lin.nasl
___________________________________________________________________
Name: svn:keywords
   - Revision
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_thunderbird_detect_win.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_thunderbird_detect_win.nasl	2011-11-09 16:10:49 UTC (rev 12074)
+++ trunk/openvas-plugins/scripts/gb_thunderbird_detect_win.nasl	2011-11-09 16:18:42 UTC (rev 12075)
@@ -1,6 +1,6 @@
 ###############################################################################
 # OpenVAS Vulnerability Test
-# $Id: gb_thunderbird_detect_win.nasl 302 2008-10-03 14:23:34Z oct $
+# $Id$
 #
 # Mozilla Thunderbird Version Detection (Windows)
 #
@@ -31,15 +31,15 @@
 if(description)
 {
   script_id(800015);
-  script_version("Revision: 1.0 ");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2008-10-06 13:07:14 +0200 (Mon, 06 Oct 2008)");
   script_tag(name:"risk_factor", value:"None");
   script_name("Mozilla Thunderbird Version Detection (Windows)");
   desc = "
   Overview : This script retrieves Mozilla ThunderBird Version and
-  saves it in KB.
+  saves it in KB.";
 
-  Risk factor : None";
-
   script_description(desc);
   script_summary("Set Version of Mozilla Thunderbird in KB");
   script_category(ACT_GATHER_INFO);


Property changes on: trunk/openvas-plugins/scripts/gb_thunderbird_detect_win.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_ubuntu_USN_1037_1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_ubuntu_USN_1037_1.nasl	2011-11-09 16:10:49 UTC (rev 12074)
+++ trunk/openvas-plugins/scripts/gb_ubuntu_USN_1037_1.nasl	2011-11-09 16:18:42 UTC (rev 12075)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(840562);
-  script_version("$Revision$: 1.0");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2011-01-11 16:07:49 +0100 (Tue, 11 Jan 2011)");
   script_tag(name:"risk_factor", value:"High");
   script_xref(name: "USN", value: "1037-1");
   script_name("Ubuntu Update for ifupdown update USN-1037-1");


Property changes on: trunk/openvas-plugins/scripts/gb_ubuntu_USN_1037_1.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_ubuntu_USN_1042_1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_ubuntu_USN_1042_1.nasl	2011-11-09 16:10:49 UTC (rev 12074)
+++ trunk/openvas-plugins/scripts/gb_ubuntu_USN_1042_1.nasl	2011-11-09 16:18:42 UTC (rev 12075)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(840564);
-  script_version("$Revision$: 1.0");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2011-01-14 16:07:43 +0100 (Fri, 14 Jan 2011)");
   script_tag(name:"cvss_base", value:"6.8");
   script_tag(name:"risk_factor", value:"High");
   script_xref(name: "USN", value: "1042-1");


Property changes on: trunk/openvas-plugins/scripts/gb_ubuntu_USN_1042_1.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_ubuntu_USN_495_1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_ubuntu_USN_495_1.nasl	2011-11-09 16:10:49 UTC (rev 12074)
+++ trunk/openvas-plugins/scripts/gb_ubuntu_USN_495_1.nasl	2011-11-09 16:18:42 UTC (rev 12075)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(840043);
-  script_version("$Revision: 1.0 $");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2009-03-23 10:55:18 +0100 (Mon, 23 Mar 2009)");
   script_tag(name:"cvss_base", value:"6.8");
   script_tag(name:"risk_factor", value:"High");
   script_xref(name: "USN", value: "495-1");
@@ -50,10 +52,8 @@
   Fix: Please Install the Updated Packages.
 
   References:
-  https://lists.ubuntu.com/archives/ubuntu-security-announce/2007-August/000570.html
+  https://lists.ubuntu.com/archives/ubuntu-security-announce/2007-August/000570.html";
 
-  Risk factor: High";
-
   script_description(desc);
   script_summary("Check for the Version of qt-x11-free vulnerability");
   script_category(ACT_GATHER_INFO);


Property changes on: trunk/openvas-plugins/scripts/gb_ubuntu_USN_495_1.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_ubuntu_USN_543_1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_ubuntu_USN_543_1.nasl	2011-11-09 16:10:49 UTC (rev 12074)
+++ trunk/openvas-plugins/scripts/gb_ubuntu_USN_543_1.nasl	2011-11-09 16:18:42 UTC (rev 12075)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(840135);
-  script_version("$Revision: 1.0 $");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2009-03-23 10:59:50 +0100 (Mon, 23 Mar 2009)");
   script_tag(name:"cvss_base", value:"10.0");
   script_tag(name:"risk_factor", value:"Critical");
   script_xref(name: "USN", value: "543-1");
@@ -54,10 +56,8 @@
   Fix: Please Install the Updated Packages.
 
   References:
-  https://lists.ubuntu.com/archives/ubuntu-security-announce/2007-November/000624.html
+  https://lists.ubuntu.com/archives/ubuntu-security-announce/2007-November/000624.html";
 
-  Risk factor: Critical";
-
   script_description(desc);
   script_summary("Check for the Version of linux-restricted-modules-2.6.17/20, vmware-player-kernel-2.6.15 vulnerabilities");
   script_category(ACT_GATHER_INFO);


Property changes on: trunk/openvas-plugins/scripts/gb_ubuntu_USN_543_1.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_ubuntu_USN_914_1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_ubuntu_USN_914_1.nasl	2011-11-09 16:10:49 UTC (rev 12074)
+++ trunk/openvas-plugins/scripts/gb_ubuntu_USN_914_1.nasl	2011-11-09 16:18:42 UTC (rev 12075)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(840403);
-  script_version("$Revision$: 1.0");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2010-03-22 11:34:53 +0100 (Mon, 22 Mar 2010)");
   script_tag(name:"cvss_base", value:"6.8");
   script_tag(name:"risk_factor", value:"High");
   script_xref(name: "USN", value: "914-1");
@@ -70,10 +72,8 @@
   Fix: Please Install the Updated Packages.
 
   References:
-  https://lists.ubuntu.com/archives/ubuntu-security-announce/2010-March/001062.html
+  https://lists.ubuntu.com/archives/ubuntu-security-announce/2010-March/001062.html";
 
-  Risk factor : High";
-
   script_description(desc);
   script_summary("Check for the Version of Linux kernel vulnerabilities");
   script_category(ACT_GATHER_INFO);


Property changes on: trunk/openvas-plugins/scripts/gb_ubuntu_USN_914_1.nasl
___________________________________________________________________
Name: svn:keywords
   - Revision
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_ubuntu_USN_943_1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_ubuntu_USN_943_1.nasl	2011-11-09 16:10:49 UTC (rev 12074)
+++ trunk/openvas-plugins/scripts/gb_ubuntu_USN_943_1.nasl	2011-11-09 16:18:42 UTC (rev 12075)
@@ -26,8 +26,10 @@
 if(description)
 {
   script_id(840457);
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2010-07-12 11:56:20 +0200 (Mon, 12 Jul 2010)");
   script_tag(name:"cvss_base", value:"10.0");
- script_version("$Revision$: 1.0");
   script_tag(name:"risk_factor", value:"Critical");
   script_xref(name: "USN", value: "943-1");
   script_cve_id("CVE-2010-1121", "CVE-2010-1196", "CVE-2010-1199", "CVE-2010-1200", "CVE-2010-1201", "CVE-2010-1202", "CVE-2010-1203");


Property changes on: trunk/openvas-plugins/scripts/gb_ubuntu_USN_943_1.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_vlc_media_player_bookmark_bof_vuln_win.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_vlc_media_player_bookmark_bof_vuln_win.nasl	2011-11-09 16:10:49 UTC (rev 12074)
+++ trunk/openvas-plugins/scripts/gb_vlc_media_player_bookmark_bof_vuln_win.nasl	2011-11-09 16:18:42 UTC (rev 12075)
@@ -1,6 +1,6 @@
 ###############################################################################
 # OpenVAS Vulnerability Test
-# $Id: gb_vlc_media_player_bookmark_bof_vuln_win.nasl 15121 2011-05-29 13:23:17 may $
+# $Id$
 #
 # VLC Media Player 'Bookmark Creation' Buffer Overflow Vulnerability (Windows)
 #
@@ -27,7 +27,9 @@
 if(description)
 {
   script_id(801782);
-  script_version("$Revision: 1.0$");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2011-05-16 15:25:30 +0200 (Mon, 16 May 2011)");
   script_cve_id("CVE-2011-1087");
   script_bugtraq_id(38569);
   script_tag(name:"cvss_base", value:"7.6");


Property changes on: trunk/openvas-plugins/scripts/gb_vlc_media_player_bookmark_bof_vuln_win.nasl
___________________________________________________________________
Name: svn:keywords
   - Revision
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_winftp_serv_bof_vuln.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_winftp_serv_bof_vuln.nasl	2011-11-09 16:10:49 UTC (rev 12074)
+++ trunk/openvas-plugins/scripts/gb_winftp_serv_bof_vuln.nasl	2011-11-09 16:18:42 UTC (rev 12075)
@@ -1,6 +1,6 @@
 ###############################################################################
 # OpenVAS Vulnerability Test
-# $Id: gb_winftp_serv_bof_vuln.nasl 928 2009-02-03 13:21:29Z feb $
+# $Id$
 #
 # WinFTP Server LIST Command Buffer Overflow Vulnerability
 #
@@ -27,7 +27,9 @@
 if(description)
 {
   script_id(800346);
-  script_version("$Revision: 1.0 $");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2009-02-04 15:43:54 +0100 (Wed, 04 Feb 2009)");
   script_tag(name:"cvss_base", value:"9.0");
   script_tag(name:"risk_factor", value:"Critical");
   script_cve_id("CVE-2009-0351");
@@ -61,8 +63,7 @@
 
   CVSS Score:
     CVSS Base Score     : 9.0 (AV:N/AC:L/Au:SI/C:C/I:C/A:C)
-    CVSS Temporal Score : 8.1
-  Risk factor: Critical";
+    CVSS Temporal Score : 8.1";
 
   script_description(desc);
   script_summary("Check for the version of WinFTP Server");


Property changes on: trunk/openvas-plugins/scripts/gb_winftp_serv_bof_vuln.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_wireshark_bytes_repr_len_dos_vuln_win.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_wireshark_bytes_repr_len_dos_vuln_win.nasl	2011-11-09 16:10:49 UTC (rev 12074)
+++ trunk/openvas-plugins/scripts/gb_wireshark_bytes_repr_len_dos_vuln_win.nasl	2011-11-09 16:18:42 UTC (rev 12075)
@@ -1,6 +1,6 @@
 ###############################################################################
 # OpenVAS Vulnerability Test
-# $Id: gb_wireshark_bytes_repr_len_dos_vuln_win.nasl 15563 2011-06-09 15:15:15Z jun $
+# $Id$
 #
 # Wireshark 'bytes_repr_len' Function Denial of Service Vulnerability (Windows)
 #
@@ -27,7 +27,9 @@
 if(description)
 {
   script_id(802201);
-  script_version("$Revision: 1.0 $");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2011-06-13 15:43:58 +0200 (Mon, 13 Jun 2011)");
   script_cve_id("CVE-2011-1956");
   script_tag(name:"cvss_base", value:"4.3");
   script_tag(name:"risk_factor", value:"Medium");


Property changes on: trunk/openvas-plugins/scripts/gb_wireshark_bytes_repr_len_dos_vuln_win.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_zen_time_tracking_mult_sql_inj_vuln.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_zen_time_tracking_mult_sql_inj_vuln.nasl	2011-11-09 16:10:49 UTC (rev 12074)
+++ trunk/openvas-plugins/scripts/gb_zen_time_tracking_mult_sql_inj_vuln.nasl	2011-11-09 16:18:42 UTC (rev 12075)
@@ -1,6 +1,6 @@
 ###############################################################################
 # OpenVAS Vulnerability Test
-# $Id: gb_zen_time_tracking_mult_sql_inj_vuln.nasl 7858 2010-04-02 13:20:17Z mar $
+# $Id$
 #
 # Zen Time Tracking multiple SQL Injection vulnerabilities
 #
@@ -27,7 +27,9 @@
 if(description)
 {
   script_id(800748);
-  script_version("$Revision$: 1.0");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2010-04-06 08:47:09 +0200 (Tue, 06 Apr 2010)");
   script_bugtraq_id(38153);
   script_cve_id("CVE-2010-1053");
   script_tag(name:"cvss_base", value:"6.8");


Property changes on: trunk/openvas-plugins/scripts/gb_zen_time_tracking_mult_sql_inj_vuln.nasl
___________________________________________________________________
Name: svn:keywords
   - Revision
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/glsa_200405_20.nasl
===================================================================
--- trunk/openvas-plugins/scripts/glsa_200405_20.nasl	2011-11-09 16:10:49 UTC (rev 12074)
+++ trunk/openvas-plugins/scripts/glsa_200405_20.nasl	2011-11-09 16:18:42 UTC (rev 12075)
@@ -27,8 +27,10 @@
 if(description)
 {
  script_id(54580);
+ script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2008-09-24 21:14:03 +0200 (Wed, 24 Sep 2008)");
  script_cve_id("CVE-2004-0381", "CVE-2004-0388");
- script_version ("$");
  script_tag(name:"cvss_base", value:"2.1");
  script_tag(name:"risk_factor", value:"Medium");
  name = "Gentoo Security Advisory GLSA 200405-20 (MySQL)";
@@ -50,10 +52,8 @@
     # emerge '>=dev-db/mysql-4.0.18-r2'
 
 http://www.securityspace.com/smysecure/catid.html?in=GLSA%20200405-20
-http://bugs.gentoo.org/show_bug.cgi?id=46242
+http://bugs.gentoo.org/show_bug.cgi?id=46242";
 
-Risk factor : Medium";
-
  script_description(desc);
 
  summary = "Gentoo Security Advisory GLSA 200405-20 (MySQL)";


Property changes on: trunk/openvas-plugins/scripts/glsa_200405_20.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/glsa_200407_11.nasl
===================================================================
--- trunk/openvas-plugins/scripts/glsa_200407_11.nasl	2011-11-09 16:10:49 UTC (rev 12074)
+++ trunk/openvas-plugins/scripts/glsa_200407_11.nasl	2011-11-09 16:18:42 UTC (rev 12075)
@@ -27,7 +27,9 @@
 if(description)
 {
  script_id(54618);
- script_version ("$");
+ script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2008-09-24 21:14:03 +0200 (Wed, 24 Sep 2008)");
  script_tag(name:"risk_factor", value:"Medium");
  name = "Gentoo Security Advisory GLSA 200407-11 (app-text/wv)";
  script_name(name);
@@ -49,10 +51,8 @@
 
 http://www.securityspace.com/smysecure/catid.html?in=GLSA%20200407-11
 http://bugs.gentoo.org/show_bug.cgi?id=56595
-http://www.idefense.com/application/poi/display?id=115&type=vulnerabilities&flashstatus=true
+http://www.idefense.com/application/poi/display?id=115&type=vulnerabilities&flashstatus=true";
 
-Risk factor : Medium";
-
  script_description(desc);
 
  summary = "Gentoo Security Advisory GLSA 200407-11 (app-text/wv)";


Property changes on: trunk/openvas-plugins/scripts/glsa_200407_11.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/glsa_200407_21.nasl
===================================================================
--- trunk/openvas-plugins/scripts/glsa_200407_21.nasl	2011-11-09 16:10:49 UTC (rev 12074)
+++ trunk/openvas-plugins/scripts/glsa_200407_21.nasl	2011-11-09 16:18:42 UTC (rev 12075)
@@ -27,8 +27,10 @@
 if(description)
 {
  script_id(54628);
+ script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2008-09-24 21:14:03 +0200 (Wed, 24 Sep 2008)");
  script_cve_id("CVE-2004-0600", "CVE-2004-0686");
- script_version ("$");
  script_tag(name:"cvss_base", value:"10.0");
  script_tag(name:"risk_factor", value:"Critical");
  name = "Gentoo Security Advisory GLSA 200407-21 (Samba)";
@@ -50,10 +52,8 @@
 
 http://www.securityspace.com/smysecure/catid.html?in=GLSA%20200407-21
 http://bugs.gentoo.org/show_bug.cgi?id=57962
-http://www.samba.org/samba/whatsnew/samba-3.0.5.html
+http://www.samba.org/samba/whatsnew/samba-3.0.5.html";
 
-Risk factor: Critical";
-
  script_description(desc);
 
  summary = "Gentoo Security Advisory GLSA 200407-21 (Samba)";


Property changes on: trunk/openvas-plugins/scripts/glsa_200407_21.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/glsa_200409_33.nasl
===================================================================
--- trunk/openvas-plugins/scripts/glsa_200409_33.nasl	2011-11-09 16:10:49 UTC (rev 12074)
+++ trunk/openvas-plugins/scripts/glsa_200409_33.nasl	2011-11-09 16:18:42 UTC (rev 12075)
@@ -27,9 +27,11 @@
 if(description)
 {
  script_id(54689);
+ script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2008-09-24 21:14:03 +0200 (Wed, 24 Sep 2008)");
  script_bugtraq_id(11239);
  script_cve_id("CVE-2004-0811");
- script_version ("$");
  script_tag(name:"cvss_base", value:"7.5");
  script_tag(name:"risk_factor", value:"High");
  name = "Gentoo Security Advisory GLSA 200409-33 (net=www/apache)";
@@ -51,10 +53,8 @@
 
 http://www.securityspace.com/smysecure/catid.html?in=GLSA%20200409-33
 http://bugs.gentoo.org/show_bug.cgi?id=64804
-http://issues.apache.org/bugzilla/show_bug.cgi?id=31315
+http://issues.apache.org/bugzilla/show_bug.cgi?id=31315";
 
-Risk factor: High";
-
  script_description(desc);
 
  summary = "Gentoo Security Advisory GLSA 200409-33 (net=www/apache)";


Property changes on: trunk/openvas-plugins/scripts/glsa_200409_33.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/glsa_200502_28.nasl
===================================================================
--- trunk/openvas-plugins/scripts/glsa_200502_28.nasl	2011-11-09 16:10:49 UTC (rev 12074)
+++ trunk/openvas-plugins/scripts/glsa_200502_28.nasl	2011-11-09 16:18:42 UTC (rev 12075)
@@ -27,8 +27,10 @@
 if(description)
 {
  script_id(54860);
+ script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2008-09-24 21:14:03 +0200 (Wed, 24 Sep 2008)");
  script_cve_id("CVE-2005-0467");
- script_version ("$");
  script_tag(name:"cvss_base", value:"7.5");
  script_tag(name:"risk_factor", value:"High");
  name = "Gentoo Security Advisory GLSA 200502-28 (Putty)";
@@ -50,10 +52,8 @@
 http://bugs.gentoo.org/show_bug.cgi?id=82753
 http://www.chiark.greenend.org.uk/~sgtatham/putty/wishlist/vuln-sftp-readdir.html
 http://www.chiark.greenend.org.uk/~sgtatham/putty/wishlist/vuln-sftp-string.html
-http://www.idefense.com/application/poi/display?id=201&type=vulnerabilities
+http://www.idefense.com/application/poi/display?id=201&type=vulnerabilities";
 
-Risk factor: High";
-
  script_description(desc);
 
  summary = "Gentoo Security Advisory GLSA 200502-28 (Putty)";


Property changes on: trunk/openvas-plugins/scripts/glsa_200502_28.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/glsa_200507_13.nasl
===================================================================
--- trunk/openvas-plugins/scripts/glsa_200507_13.nasl	2011-11-09 16:10:49 UTC (rev 12074)
+++ trunk/openvas-plugins/scripts/glsa_200507_13.nasl	2011-11-09 16:18:42 UTC (rev 12075)
@@ -27,9 +27,11 @@
 if(description)
 {
  script_id(54989);
+ script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2008-09-24 21:14:03 +0200 (Wed, 24 Sep 2008)");
  script_bugtraq_id(14126, 14125);
  script_cve_id("CVE-2005-2069");
- script_version ("$");
  script_tag(name:"cvss_base", value:"5.0");
  script_tag(name:"risk_factor", value:"Medium");
  name = "Gentoo Security Advisory GLSA 200507-13 (pam_ldap nss_ldap)";
@@ -53,10 +55,8 @@
     # emerge --ask --oneshot --verbose sys-auth/nss_ldap
 
 http://www.securityspace.com/smysecure/catid.html?in=GLSA%20200507-13
-http://bugs.gentoo.org/show_bug.cgi?id=96767
+http://bugs.gentoo.org/show_bug.cgi?id=96767";
 
-Risk factor : Medium";
-
  script_description(desc);
 
  summary = "Gentoo Security Advisory GLSA 200507-13 (pam_ldap nss_ldap)";


Property changes on: trunk/openvas-plugins/scripts/glsa_200507_13.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/glsa_200507_26.nasl
===================================================================
--- trunk/openvas-plugins/scripts/glsa_200507_26.nasl	2011-11-09 16:10:49 UTC (rev 12074)
+++ trunk/openvas-plugins/scripts/glsa_200507_26.nasl	2011-11-09 16:18:42 UTC (rev 12075)
@@ -27,9 +27,11 @@
 if(description)
 {
  script_id(55002);
+ script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2008-09-24 21:14:03 +0200 (Wed, 24 Sep 2008)");
  script_bugtraq_id(14345);
  script_cve_id("CVE-2005-1852");
- script_version ("$");
  script_tag(name:"cvss_base", value:"7.5");
  script_tag(name:"risk_factor", value:"High");
  name = "Gentoo Security Advisory GLSA 200507-26 (gnugadu centericq kadu ekg libgadu)";
@@ -75,10 +77,8 @@
 http://bugs.gentoo.org/show_bug.cgi?id=99816
 http://bugs.gentoo.org/show_bug.cgi?id=99890
 http://bugs.gentoo.org/show_bug.cgi?id=99583
-http://www.securityfocus.com/archive/1/406026/30/
+http://www.securityfocus.com/archive/1/406026/30/";
 
-Risk factor : High";
-
  script_description(desc);
 
  summary = "Gentoo Security Advisory GLSA 200507-26 (gnugadu centericq kadu ekg libgadu)";


Property changes on: trunk/openvas-plugins/scripts/glsa_200507_26.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/glsa_200510_09.nasl
===================================================================
--- trunk/openvas-plugins/scripts/glsa_200510_09.nasl	2011-11-09 16:10:49 UTC (rev 12074)
+++ trunk/openvas-plugins/scripts/glsa_200510_09.nasl	2011-11-09 16:18:42 UTC (rev 12075)
@@ -27,9 +27,11 @@
 if(description)
 {
  script_id(55575);
+ script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2008-09-24 21:14:03 +0200 (Wed, 24 Sep 2008)");
  script_bugtraq_id(14999);
  script_cve_id("CVE-2005-3150");
- script_version ("$");
  script_tag(name:"cvss_base", value:"7.5");
  script_tag(name:"risk_factor", value:"High");
  name = "Gentoo Security Advisory GLSA 200510-09 (Weex)";
@@ -48,10 +50,8 @@
     # emerge --ask --oneshot --verbose '>=net-ftp/weex-2.6.1.5-r1'
 
 http://www.securityspace.com/smysecure/catid.html?in=GLSA%20200510-09
-http://bugs.gentoo.org/show_bug.cgi?id=107849
+http://bugs.gentoo.org/show_bug.cgi?id=107849";
 
-Risk factor: High";
-
  script_description(desc);
 
  summary = "Gentoo Security Advisory GLSA 200510-09 (Weex)";


Property changes on: trunk/openvas-plugins/scripts/glsa_200510_09.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/glsa_200603_01.nasl
===================================================================
--- trunk/openvas-plugins/scripts/glsa_200603_01.nasl	2011-11-09 16:10:49 UTC (rev 12074)
+++ trunk/openvas-plugins/scripts/glsa_200603_01.nasl	2011-11-09 16:18:42 UTC (rev 12075)
@@ -27,7 +27,9 @@
 if(description)
 {
  script_id(56362);
- script_version ("$");
+ script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2008-09-24 21:14:03 +0200 (Wed, 24 Sep 2008)");
  script_tag(name:"risk_factor", value:"Medium");
  name = "Gentoo Security Advisory GLSA 200603-01 (WordPress)";
  script_name(name);
@@ -44,10 +46,8 @@
     # emerge --ask --oneshot --verbose '>=www-apps/wordpress-2.0.1'
 
 http://www.securityspace.com/smysecure/catid.html?in=GLSA%20200603-01
-http://bugs.gentoo.org/show_bug.cgi?id=121661
+http://bugs.gentoo.org/show_bug.cgi?id=121661";
 
-Risk factor : Medium";
-
  script_description(desc);
 
  summary = "Gentoo Security Advisory GLSA 200603-01 (WordPress)";


Property changes on: trunk/openvas-plugins/scripts/glsa_200603_01.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/glsa_200604_02.nasl
===================================================================
--- trunk/openvas-plugins/scripts/glsa_200604_02.nasl	2011-11-09 16:10:49 UTC (rev 12074)
+++ trunk/openvas-plugins/scripts/glsa_200604_02.nasl	2011-11-09 16:18:42 UTC (rev 12075)
@@ -27,8 +27,10 @@
 if(description)
 {
  script_id(56556);
+ script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2008-09-24 21:14:03 +0200 (Wed, 24 Sep 2008)");
  script_cve_id("CVE-2006-1260", "CVE-2006-1491");
- script_version ("$");
  script_tag(name:"cvss_base", value:"7.5");
  script_tag(name:"risk_factor", value:"High");
  name = "Gentoo Security Advisory GLSA 200604-02 (horde)";
@@ -49,10 +51,8 @@
 http://www.securityspace.com/smysecure/catid.html?in=GLSA%20200604-02
 http://bugs.gentoo.org/show_bug.cgi?id=127889
 http://bugs.gentoo.org/show_bug.cgi?id=126435
-http://lists.horde.org/archives/announce/2006/000271.html
+http://lists.horde.org/archives/announce/2006/000271.html";
 
-Risk factor : High";
-
  script_description(desc);
 
  summary = "Gentoo Security Advisory GLSA 200604-02 (horde)";


Property changes on: trunk/openvas-plugins/scripts/glsa_200604_02.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/glsa_200606_02.nasl
===================================================================
--- trunk/openvas-plugins/scripts/glsa_200606_02.nasl	2011-11-09 16:10:49 UTC (rev 12074)
+++ trunk/openvas-plugins/scripts/glsa_200606_02.nasl	2011-11-09 16:18:42 UTC (rev 12075)
@@ -27,8 +27,10 @@
 if(description)
 {
  script_id(56910);
+ script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2008-09-24 21:14:03 +0200 (Wed, 24 Sep 2008)");
  script_cve_id("CVE-2006-1174");
- script_version ("$");
  script_tag(name:"cvss_base", value:"3.7");
  script_tag(name:"risk_factor", value:"Medium");
  name = "Gentoo Security Advisory GLSA 200606-02 (shadow)";
@@ -47,10 +49,8 @@
     # emerge --ask --oneshot --verbose '>=sys-apps/shadow-4.0.15-r2'
 
 http://www.securityspace.com/smysecure/catid.html?in=GLSA%20200606-02
-http://bugs.gentoo.org/show_bug.cgi?id=133615
+http://bugs.gentoo.org/show_bug.cgi?id=133615";
 
-Risk factor : Medium";
-
  script_description(desc);
 
  summary = "Gentoo Security Advisory GLSA 200606-02 (shadow)";


Property changes on: trunk/openvas-plugins/scripts/glsa_200606_02.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/glsa_200705_17.nasl
===================================================================
--- trunk/openvas-plugins/scripts/glsa_200705_17.nasl	2011-11-09 16:10:49 UTC (rev 12074)
+++ trunk/openvas-plugins/scripts/glsa_200705_17.nasl	2011-11-09 16:18:42 UTC (rev 12075)
@@ -27,8 +27,10 @@
 if(description)
 {
  script_id(58279);
+ script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2008-09-24 21:14:03 +0200 (Wed, 24 Sep 2008)");
  script_cve_id("CVE-2007-1359");
- script_version ("$");
  script_tag(name:"cvss_base", value:"6.8");
  script_tag(name:"risk_factor", value:"High");
  name = "Gentoo Security Advisory GLSA 200705-17 (mod_security)";
@@ -47,10 +49,8 @@
     # emerge --ask --oneshot --verbose '>=net-www/mod_security-2.1.1'
 
 http://www.securityspace.com/smysecure/catid.html?in=GLSA%20200705-17
-http://bugs.gentoo.org/show_bug.cgi?id=169778
+http://bugs.gentoo.org/show_bug.cgi?id=169778";
 
-Risk factor: High";
-
  script_description(desc);
 
  summary = "Gentoo Security Advisory GLSA 200705-17 (mod_security)";


Property changes on: trunk/openvas-plugins/scripts/glsa_200705_17.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/glsa_200712_17.nasl
===================================================================
--- trunk/openvas-plugins/scripts/glsa_200712_17.nasl	2011-11-09 16:10:49 UTC (rev 12074)
+++ trunk/openvas-plugins/scripts/glsa_200712_17.nasl	2011-11-09 16:18:42 UTC (rev 12075)
@@ -27,8 +27,10 @@
 if(description)
 {
  script_id(60079);
+ script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2008-09-24 21:14:03 +0200 (Wed, 24 Sep 2008)");
  script_cve_id("CVE-2007-6354", "CVE-2007-6355", "CVE-2007-6356");
- script_version ("$");
  script_tag(name:"cvss_base", value:"10.0");
  script_tag(name:"risk_factor", value:"Critical");
  name = "Gentoo Security Advisory GLSA 200712-17 (exiftags)";
@@ -47,10 +49,8 @@
     # emerge --ask --oneshot --verbose '>=media-gfx/exiftags-1.01'
 
 http://www.securityspace.com/smysecure/catid.html?in=GLSA%20200712-17
-http://bugs.gentoo.org/show_bug.cgi?id=202354
+http://bugs.gentoo.org/show_bug.cgi?id=202354";
 
-Risk factor: Critical";
-
  script_description(desc);
 
  summary = "Gentoo Security Advisory GLSA 200712-17 (exiftags)";


Property changes on: trunk/openvas-plugins/scripts/glsa_200712_17.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/glsa_200801_17.nasl
===================================================================
--- trunk/openvas-plugins/scripts/glsa_200801_17.nasl	2011-11-09 16:10:49 UTC (rev 12074)
+++ trunk/openvas-plugins/scripts/glsa_200801_17.nasl	2011-11-09 16:18:42 UTC (rev 12075)
@@ -27,8 +27,10 @@
 if(description)
 {
  script_id(60377);
+ script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2008-09-24 21:14:03 +0200 (Wed, 24 Sep 2008)");
  script_cve_id("CVE-2007-6263");
- script_version ("$");
  script_tag(name:"cvss_base", value:"9.3");
  script_tag(name:"risk_factor", value:"Critical");
  name = "Gentoo Security Advisory GLSA 200801-17 (netkit-ftpd)";
@@ -46,10 +48,8 @@
     # emerge --ask --oneshot --verbose '>=net-ftp/netkit-ftpd-0.17-r7'
 
 http://www.securityspace.com/smysecure/catid.html?in=GLSA%20200801-17
-http://bugs.gentoo.org/show_bug.cgi?id=199206
+http://bugs.gentoo.org/show_bug.cgi?id=199206";
 
-Risk factor: Critical";
-
  script_description(desc);
 
  summary = "Gentoo Security Advisory GLSA 200801-17 (netkit-ftpd)";


Property changes on: trunk/openvas-plugins/scripts/glsa_200801_17.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/glsa_200804_03.nasl
===================================================================
--- trunk/openvas-plugins/scripts/glsa_200804_03.nasl	2011-11-09 16:10:49 UTC (rev 12074)
+++ trunk/openvas-plugins/scripts/glsa_200804_03.nasl	2011-11-09 16:18:42 UTC (rev 12075)
@@ -27,8 +27,10 @@
 if(description)
 {
  script_id(60803);
+ script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2008-09-24 21:14:03 +0200 (Wed, 24 Sep 2008)");
  script_cve_id("CVE-2008-1483", "CVE-2008-1657");
- script_version ("$");
  script_tag(name:"cvss_base", value:"6.9");
  script_tag(name:"risk_factor", value:"High");
  name = "Gentoo Security Advisory GLSA 200804-03 (openssh)";
@@ -48,10 +50,8 @@
 
 http://www.securityspace.com/smysecure/catid.html?in=GLSA%20200804-03
 http://bugs.gentoo.org/show_bug.cgi?id=214985
-http://bugs.gentoo.org/show_bug.cgi?id=215702
+http://bugs.gentoo.org/show_bug.cgi?id=215702";
 
-Risk factor: High";
-
  script_description(desc);
 
  summary = "Gentoo Security Advisory GLSA 200804-03 (openssh)";


Property changes on: trunk/openvas-plugins/scripts/glsa_200804_03.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/glsa_200805_12.nasl
===================================================================
--- trunk/openvas-plugins/scripts/glsa_200805_12.nasl	2011-11-09 16:10:49 UTC (rev 12074)
+++ trunk/openvas-plugins/scripts/glsa_200805_12.nasl	2011-11-09 16:18:42 UTC (rev 12075)
@@ -27,8 +27,10 @@
 if(description)
 {
  script_id(61046);
+ script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2008-09-24 21:14:03 +0200 (Wed, 24 Sep 2008)");
  script_cve_id("CVE-2008-1102", "CVE-2008-1103");
- script_version ("$");
  script_tag(name:"cvss_base", value:"6.9");
  script_tag(name:"risk_factor", value:"High");
  name = "Gentoo Security Advisory GLSA 200805-12 (blender)";
@@ -47,10 +49,8 @@
     # emerge --ask --oneshot --verbose '>=media-gfx/blender-2.43-r2'
 
 http://www.securityspace.com/smysecure/catid.html?in=GLSA%20200805-12
-http://bugs.gentoo.org/show_bug.cgi?id=219008
+http://bugs.gentoo.org/show_bug.cgi?id=219008";
 
-Risk factor : High";
-
  script_description(desc);
 
  summary = "Gentoo Security Advisory GLSA 200805-12 (blender)";


Property changes on: trunk/openvas-plugins/scripts/glsa_200805_12.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/glsa_200807_14.nasl
===================================================================
--- trunk/openvas-plugins/scripts/glsa_200807_14.nasl	2011-11-09 16:10:49 UTC (rev 12074)
+++ trunk/openvas-plugins/scripts/glsa_200807_14.nasl	2011-11-09 16:18:42 UTC (rev 12075)
@@ -27,8 +27,10 @@
 if(description)
 {
  script_id(61389);
+ script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2008-09-24 21:14:03 +0200 (Wed, 24 Sep 2008)");
  script_cve_id("CVE-2008-1628");
- script_version ("$");
  script_tag(name:"cvss_base", value:"4.1");
  script_tag(name:"risk_factor", value:"Medium");
  name = "Gentoo Security Advisory GLSA 200807-14 (audit)";
@@ -47,10 +49,8 @@
     # emerge --ask --oneshot --verbose '>=sys-process/audit-1.7.3'
 
 http://www.securityspace.com/smysecure/catid.html?in=GLSA%20200807-14
-http://bugs.gentoo.org/show_bug.cgi?id=215705
+http://bugs.gentoo.org/show_bug.cgi?id=215705";
 
-Risk factor : Medium";
-
  script_description(desc);
 
  summary = "Gentoo Security Advisory GLSA 200807-14 (audit)";


Property changes on: trunk/openvas-plugins/scripts/glsa_200807_14.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/glsa_200809_02.nasl
===================================================================
--- trunk/openvas-plugins/scripts/glsa_200809_02.nasl	2011-11-09 16:10:49 UTC (rev 12074)
+++ trunk/openvas-plugins/scripts/glsa_200809_02.nasl	2011-11-09 16:18:42 UTC (rev 12075)
@@ -27,8 +27,10 @@
 if(description)
 {
  script_id(61597);
+ script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2008-09-24 21:14:03 +0200 (Wed, 24 Sep 2008)");
  script_cve_id("CVE-2008-3350", "CVE-2008-1447");
- script_version ("$");
  script_tag(name:"cvss_base", value:"6.4");
  script_tag(name:"risk_factor", value:"High");
  name = "Gentoo Security Advisory GLSA 200809-02 (dnsmasq)";
@@ -48,10 +50,8 @@
 
 http://www.securityspace.com/smysecure/catid.html?in=GLSA%20200809-02
 http://bugs.gentoo.org/show_bug.cgi?id=231282
-http://bugs.gentoo.org/show_bug.cgi?id=232523
+http://bugs.gentoo.org/show_bug.cgi?id=232523";
 
-Risk factor : High";
-
  script_description(desc);
 
  summary = "Gentoo Security Advisory GLSA 200809-02 (dnsmasq)";


Property changes on: trunk/openvas-plugins/scripts/glsa_200809_02.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/glsa_200809_17.nasl
===================================================================
--- trunk/openvas-plugins/scripts/glsa_200809_17.nasl	2011-11-09 16:10:49 UTC (rev 12074)
+++ trunk/openvas-plugins/scripts/glsa_200809_17.nasl	2011-11-09 16:18:42 UTC (rev 12075)
@@ -29,8 +29,10 @@
 if(description)
 {
  script_id(61682);
+ script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2008-09-28 06:42:28 +0200 (Sun, 28 Sep 2008)");
  script_cve_id("CVE-2008-3146", "CVE-2008-3932", "CVE-2008-3933", "CVE-2008-3934");
- script_version ("$");
  script_tag(name:"cvss_base", value:"10.0");
  script_tag(name:"risk_factor", value:"Critical");
  name = "Gentoo Security Advisory GLSA 200809-17 (wireshark)";
@@ -49,10 +51,8 @@
     # emerge --ask --oneshot --verbose '>=net-analyzer/wireshark-1.0.3'
 
 http://www.securityspace.com/smysecure/catid.html?in=GLSA%20200809-17
-http://bugs.gentoo.org/show_bug.cgi?id=236515
+http://bugs.gentoo.org/show_bug.cgi?id=236515";
 
-Risk factor: Critical";
-
  script_description(desc);
 
  summary = "Gentoo Security Advisory GLSA 200809-17 (wireshark)";


Property changes on: trunk/openvas-plugins/scripts/glsa_200809_17.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/glsa_200810_03.nasl
===================================================================
--- trunk/openvas-plugins/scripts/glsa_200810_03.nasl	2011-11-09 16:10:49 UTC (rev 12074)
+++ trunk/openvas-plugins/scripts/glsa_200810_03.nasl	2011-11-09 16:18:42 UTC (rev 12075)
@@ -29,8 +29,10 @@
 if(description)
 {
  script_id(61786);
+ script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2008-11-01 01:55:10 +0100 (Sat, 01 Nov 2008)");
  script_cve_id("CVE-2008-2469");
- script_version ("$");
  script_tag(name:"cvss_base", value:"10.0");
  script_tag(name:"risk_factor", value:"Critical");
  name = "Gentoo Security Advisory GLSA 200810-03 (libspf2)";
@@ -49,10 +51,8 @@
     # emerge --ask --oneshot --verbose '>=mail-filter/libspf2-1.2.8'
 
 http://www.securityspace.com/smysecure/catid.html?in=GLSA%20200810-03
-http://bugs.gentoo.org/show_bug.cgi?id=242254
+http://bugs.gentoo.org/show_bug.cgi?id=242254";
 
-Risk factor: Critical";
-
  script_description(desc);
 
  summary = "Gentoo Security Advisory GLSA 200810-03 (libspf2)";


Property changes on: trunk/openvas-plugins/scripts/glsa_200810_03.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/glsa_200812_23.nasl
===================================================================
--- trunk/openvas-plugins/scripts/glsa_200812_23.nasl	2011-11-09 16:10:49 UTC (rev 12074)
+++ trunk/openvas-plugins/scripts/glsa_200812_23.nasl	2011-11-09 16:18:42 UTC (rev 12075)
@@ -29,8 +29,10 @@
 if(description)
 {
  script_id(63068);
+ script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2008-12-29 22:42:24 +0100 (Mon, 29 Dec 2008)");
  script_cve_id("CVE-2008-5187");
- script_version ("$");
  script_tag(name:"cvss_base", value:"7.5");
  script_tag(name:"risk_factor", value:"High");
  name = "Gentoo Security Advisory GLSA 200812-23 (imlib2)";
@@ -48,10 +50,8 @@
     # emerge --ask --oneshot --verbose '>=media-libs/imlib2-1.4.2-r1'
 
 http://www.securityspace.com/smysecure/catid.html?in=GLSA%20200812-23
-http://bugs.gentoo.org/show_bug.cgi?id=248057
+http://bugs.gentoo.org/show_bug.cgi?id=248057";
 
-Risk factor: High";
-
  script_description(desc);
 
  summary = "Gentoo Security Advisory GLSA 200812-23 (imlib2)";


Property changes on: trunk/openvas-plugins/scripts/glsa_200812_23.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/glsa_200904_06.nasl
===================================================================
--- trunk/openvas-plugins/scripts/glsa_200904_06.nasl	2011-11-09 16:10:49 UTC (rev 12074)
+++ trunk/openvas-plugins/scripts/glsa_200904_06.nasl	2011-11-09 16:18:42 UTC (rev 12075)
@@ -30,8 +30,10 @@
 if(description)
 {
  script_id(63800);
+ script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2009-04-15 22:11:00 +0200 (Wed, 15 Apr 2009)");
  script_cve_id("CVE-2008-5983", "CVE-2008-5987");
- script_version ("$");
  script_tag(name:"cvss_base", value:"6.9");
  script_tag(name:"risk_factor", value:"High");
  name = "Gentoo Security Advisory GLSA 200904-06 (eog)";
@@ -50,10 +52,8 @@
     # emerge --ask --oneshot --verbose '>=media-gfx/eog-2.22.3-r3'
 
 http://www.securityspace.com/smysecure/catid.html?in=GLSA%20200904-06
-http://bugs.gentoo.org/show_bug.cgi?id=257002
+http://bugs.gentoo.org/show_bug.cgi?id=257002";
 
-Risk factor: High";
-
  script_description(desc);
 
  summary = "Gentoo Security Advisory GLSA 200904-06 (eog)";


Property changes on: trunk/openvas-plugins/scripts/glsa_200904_06.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/glsa_201003_01.nasl
===================================================================
--- trunk/openvas-plugins/scripts/glsa_201003_01.nasl	2011-11-09 16:10:49 UTC (rev 12074)
+++ trunk/openvas-plugins/scripts/glsa_201003_01.nasl	2011-11-09 16:18:42 UTC (rev 12075)
@@ -30,8 +30,10 @@
 if(description)
 {
  script_id(67041);
+ script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2010-03-16 17:25:39 +0100 (Tue, 16 Mar 2010)");
  script_cve_id("CVE-2010-0426", "CVE-2010-0427");
- script_version ("$Revision$");
  script_tag(name:"cvss_base", value:"6.9");
  script_tag(name:"risk_factor", value:"High");
  script_name("Gentoo Security Advisory GLSA 201003-01 (sudo)");
@@ -49,10 +51,8 @@
     # emerge --ask --oneshot --verbose '>=app-admin/sudo-1.7.2_p4'
 
 http://www.securityspace.com/smysecure/catid.html?in=GLSA%20201003-01
-http://bugs.gentoo.org/show_bug.cgi?id=306865
+http://bugs.gentoo.org/show_bug.cgi?id=306865";
 
-Risk factor : High";
-
  script_description(desc);
 
  script_summary("Gentoo Security Advisory GLSA 201003-01 (sudo)");


Property changes on: trunk/openvas-plugins/scripts/glsa_201003_01.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/healthd_detect.nasl
===================================================================
--- trunk/openvas-plugins/scripts/healthd_detect.nasl	2011-11-09 16:10:49 UTC (rev 12074)
+++ trunk/openvas-plugins/scripts/healthd_detect.nasl	2011-11-09 16:18:42 UTC (rev 12075)
@@ -29,7 +29,9 @@
 if(description)
 {
  script_id(10731); 
- script_version ("$Revision$");
+ script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2005-11-03 14:08:04 +0100 (Thu, 03 Nov 2005)");
  script_tag(name:"risk_factor", value:"Low");
  
  name = "HealthD detection";
@@ -44,10 +46,8 @@
 it is recommended that you do not allow access to this service from the 
 network.
 
-Solution: Configure your firewall to block access to this port.
+Solution: Configure your firewall to block access to this port.";
 
-Risk factor : Low";
-
  script_description(desc);
  
  summary = "HealthD detection";

Modified: trunk/openvas-plugins/scripts/kerio_firewall_admin_port.nasl
===================================================================
--- trunk/openvas-plugins/scripts/kerio_firewall_admin_port.nasl	2011-11-09 16:10:49 UTC (rev 12074)
+++ trunk/openvas-plugins/scripts/kerio_firewall_admin_port.nasl	2011-11-09 16:18:42 UTC (rev 12075)
@@ -26,9 +26,11 @@
 if(description)
 {
  script_id(18183);
+ script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2005-11-03 14:08:04 +0100 (Thu, 03 Nov 2005)");
  script_bugtraq_id(13458);
  script_cve_id("CVE-2005-1062", "CVE-2005-1063");
- script_version("$Revision$");
  script_tag(name:"cvss_base", value:"7.5");
  script_tag(name:"risk_factor", value:"High");
 
@@ -54,10 +56,8 @@
 Solution :
 
 If this service is not needed, disable it or filter incoming traffic
-to this port.
+to this port.";
 
-Risk factor: High";
-
  script_description(desc);
 
  summary = "Determines if Kerio Personal Firewall is installed";

Modified: trunk/openvas-plugins/scripts/lotus_domino_xss.nasl
===================================================================
--- trunk/openvas-plugins/scripts/lotus_domino_xss.nasl	2011-11-09 16:10:49 UTC (rev 12074)
+++ trunk/openvas-plugins/scripts/lotus_domino_xss.nasl	2011-11-09 16:18:42 UTC (rev 12075)
@@ -25,9 +25,11 @@
 if(description)
 {
   script_id(19764);
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2006-03-26 17:55:15 +0200 (Sun, 26 Mar 2006)");
   script_cve_id("CVE-2005-3015");
   script_bugtraq_id(14845, 14846);
-  script_version("$Revision$");
   script_tag(name:"cvss_base", value:"4.3");
   script_tag(name:"risk_factor", value:"Medium");
   

Modified: trunk/openvas-plugins/scripts/mdksa_2009_012.nasl
===================================================================
--- trunk/openvas-plugins/scripts/mdksa_2009_012.nasl	2011-11-09 16:10:49 UTC (rev 12074)
+++ trunk/openvas-plugins/scripts/mdksa_2009_012.nasl	2011-11-09 16:18:42 UTC (rev 12075)
@@ -28,8 +28,10 @@
 if(description)
 {
  script_id(63199);
+ script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2009-01-20 22:42:09 +0100 (Tue, 20 Jan 2009)");
  script_cve_id("CVE-2008-5500", "CVE-2008-5503", "CVE-2008-5506", "CVE-2008-5507", "CVE-2008-5508", "CVE-2008-5510", "CVE-2008-5511", "CVE-2008-5512");
- script_version ("$");
  script_tag(name:"cvss_base", value:"10.0");
  script_tag(name:"risk_factor", value:"Critical");
  name = "Mandrake Security Advisory MDVSA-2009:012 (mozilla-thunderbird)";
@@ -52,10 +54,8 @@
 of md5 checksums and GPG signatures is performed automatically for you.
 
 https://secure1.securityspace.com/smysecure/catid.html?in=MDVSA-2009:012
-http://www.mozilla.org/security/known-vulnerabilities/thunderbird20.html
+http://www.mozilla.org/security/known-vulnerabilities/thunderbird20.html";
 
-Risk factor: Critical";
-
  script_description(desc);
 
  summary = "Mandrake Security Advisory MDVSA-2009:012 (mozilla-thunderbird)";


Property changes on: trunk/openvas-plugins/scripts/mdksa_2009_012.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/mdksa_2009_039.nasl
===================================================================
--- trunk/openvas-plugins/scripts/mdksa_2009_039.nasl	2011-11-09 16:10:49 UTC (rev 12074)
+++ trunk/openvas-plugins/scripts/mdksa_2009_039.nasl	2011-11-09 16:18:42 UTC (rev 12075)
@@ -28,8 +28,10 @@
 if(description)
 {
  script_id(63402);
+ script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2009-02-18 23:13:28 +0100 (Wed, 18 Feb 2009)");
  script_cve_id("CVE-2009-0314");
- script_version ("$");
  script_tag(name:"cvss_base", value:"6.9");
  script_tag(name:"risk_factor", value:"High");
  name = "Mandrake Security Advisory MDVSA-2009:039 (gedit)";
@@ -52,10 +54,8 @@
 To upgrade automatically use MandrakeUpdate or urpmi.  The verification
 of md5 checksums and GPG signatures is performed automatically for you.
 
-https://secure1.securityspace.com/smysecure/catid.html?in=MDVSA-2009:039
+https://secure1.securityspace.com/smysecure/catid.html?in=MDVSA-2009:039";
 
-Risk factor : High";
-
  script_description(desc);
 
  summary = "Mandrake Security Advisory MDVSA-2009:039 (gedit)";


Property changes on: trunk/openvas-plugins/scripts/mdksa_2009_039.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/mdksa_2009_106_1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/mdksa_2009_106_1.nasl	2011-11-09 16:10:49 UTC (rev 12074)
+++ trunk/openvas-plugins/scripts/mdksa_2009_106_1.nasl	2011-11-09 16:18:42 UTC (rev 12075)
@@ -28,8 +28,10 @@
 if(description)
 {
  script_id(66365);
+ script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2009-12-10 00:23:54 +0100 (Thu, 10 Dec 2009)");
  script_cve_id("CVE-2009-1364");
- script_version ("$Revision$");
  script_tag(name:"cvss_base", value:"7.5");
  script_tag(name:"risk_factor", value:"High");
  script_name("Mandriva Security Advisory MDVSA-2009:106-1 (libwmf)");
@@ -55,10 +57,8 @@
 To upgrade automatically use MandrakeUpdate or urpmi.  The verification
 of md5 checksums and GPG signatures is performed automatically for you.
 
-https://secure1.securityspace.com/smysecure/catid.html?in=MDVSA-2009:106-1
+https://secure1.securityspace.com/smysecure/catid.html?in=MDVSA-2009:106-1";
 
-Risk factor : High";
-
  script_description(desc);
 
  script_summary("Mandriva Security Advisory MDVSA-2009:106-1 (libwmf)");


Property changes on: trunk/openvas-plugins/scripts/mdksa_2009_106_1.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/mdksa_2009_120.nasl
===================================================================
--- trunk/openvas-plugins/scripts/mdksa_2009_120.nasl	2011-11-09 16:10:49 UTC (rev 12074)
+++ trunk/openvas-plugins/scripts/mdksa_2009_120.nasl	2011-11-09 16:18:42 UTC (rev 12075)
@@ -28,8 +28,10 @@
 if(description)
 {
  script_id(64132);
+ script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2009-06-05 18:04:08 +0200 (Fri, 05 Jun 2009)");
  script_cve_id("CVE-2009-1377", "CVE-2009-1378");
- script_version ("$");
  script_tag(name:"cvss_base", value:"5.0");
  script_tag(name:"risk_factor", value:"Medium");
  name = "Mandrake Security Advisory MDVSA-2009:120 (openssl)";
@@ -62,10 +64,8 @@
 To upgrade automatically use MandrakeUpdate or urpmi.  The verification
 of md5 checksums and GPG signatures is performed automatically for you.
 
-https://secure1.securityspace.com/smysecure/catid.html?in=MDVSA-2009:120
+https://secure1.securityspace.com/smysecure/catid.html?in=MDVSA-2009:120";
 
-Risk factor: Medium";
-
  script_description(desc);
 
  summary = "Mandrake Security Advisory MDVSA-2009:120 (openssl)";


Property changes on: trunk/openvas-plugins/scripts/mdksa_2009_120.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/mdksa_2009_127.nasl
===================================================================
--- trunk/openvas-plugins/scripts/mdksa_2009_127.nasl	2011-11-09 16:10:49 UTC (rev 12074)
+++ trunk/openvas-plugins/scripts/mdksa_2009_127.nasl	2011-11-09 16:18:42 UTC (rev 12075)
@@ -28,8 +28,10 @@
 if(description)
 {
  script_id(64071);
+ script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2009-06-05 18:04:08 +0200 (Fri, 05 Jun 2009)");
  script_cve_id("CVE-2008-2927");
- script_version ("$");
  script_tag(name:"cvss_base", value:"6.8");
  script_tag(name:"risk_factor", value:"High");
  name = "Mandrake Security Advisory MDVSA-2009:127 (gaim)";
@@ -49,10 +51,8 @@
 To upgrade automatically use MandrakeUpdate or urpmi.  The verification
 of md5 checksums and GPG signatures is performed automatically for you.
 
-https://secure1.securityspace.com/smysecure/catid.html?in=MDVSA-2009:127
+https://secure1.securityspace.com/smysecure/catid.html?in=MDVSA-2009:127";
 
-Risk factor : High";
-
  script_description(desc);
 
  summary = "Mandrake Security Advisory MDVSA-2009:127 (gaim)";


Property changes on: trunk/openvas-plugins/scripts/mdksa_2009_127.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/mdksa_2009_141.nasl
===================================================================
--- trunk/openvas-plugins/scripts/mdksa_2009_141.nasl	2011-11-09 16:10:49 UTC (rev 12074)
+++ trunk/openvas-plugins/scripts/mdksa_2009_141.nasl	2011-11-09 16:18:42 UTC (rev 12075)
@@ -28,8 +28,10 @@
 if(description)
 {
  script_id(64287);
+ script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2009-06-30 00:29:55 +0200 (Tue, 30 Jun 2009)");
  script_cve_id("CVE-2009-1302", "CVE-2009-1303", "CVE-2009-1304", "CVE-2009-1305", "CVE-2009-1306", "CVE-2009-1307", "CVE-2009-1308", "CVE-2009-1309", "CVE-2009-2210", "CVE-2009-1392", "CVE-2009-1832", "CVE-2009-1833", "CVE-2009-1838", "CVE-2009-1836", "CVE-2009-1840", "CVE-2009-1841");
- script_version ("$");
  script_tag(name:"cvss_base", value:"9.3");
  script_tag(name:"risk_factor", value:"Critical");
  name = "Mandrake Security Advisory MDVSA-2009:141 (mozilla-thunderbird)";
@@ -54,10 +56,8 @@
 of md5 checksums and GPG signatures is performed automatically for you.
 
 https://secure1.securityspace.com/smysecure/catid.html?in=MDVSA-2009:141
-http://www.mozilla.org/security/known-vulnerabilities/thunderbird20.html#thunderbird2.0.0.21
+http://www.mozilla.org/security/known-vulnerabilities/thunderbird20.html#thunderbird2.0.0.21";
 
-Risk factor : Critical";
-
  script_description(desc);
 
  summary = "Mandrake Security Advisory MDVSA-2009:141 (mozilla-thunderbird)";


Property changes on: trunk/openvas-plugins/scripts/mdksa_2009_141.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/mdksa_2009_178.nasl
===================================================================
--- trunk/openvas-plugins/scripts/mdksa_2009_178.nasl	2011-11-09 16:10:49 UTC (rev 12074)
+++ trunk/openvas-plugins/scripts/mdksa_2009_178.nasl	2011-11-09 16:18:42 UTC (rev 12075)
@@ -28,7 +28,9 @@
 if(description)
 {
  script_id(64521);
- script_version ("$");
+ script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2009-08-17 16:54:45 +0200 (Mon, 17 Aug 2009)");
  script_tag(name:"risk_factor", value:"High");
  script_name("Mandrake Security Advisory MDVSA-2009:178 (squid)");
 
@@ -53,10 +55,8 @@
 of md5 checksums and GPG signatures is performed automatically for you.
 
 https://secure1.securityspace.com/smysecure/catid.html?in=MDVSA-2009:178
-http://www.squid-cache.org/Advisories/SQUID-2009_2.txt
+http://www.squid-cache.org/Advisories/SQUID-2009_2.txt";
 
-Risk factor : High";
-
  script_description(desc);
 
  script_summary("Mandrake Security Advisory MDVSA-2009:178 (squid)");


Property changes on: trunk/openvas-plugins/scripts/mdksa_2009_178.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/mdksa_2009_192.nasl
===================================================================
--- trunk/openvas-plugins/scripts/mdksa_2009_192.nasl	2011-11-09 16:10:49 UTC (rev 12074)
+++ trunk/openvas-plugins/scripts/mdksa_2009_192.nasl	2011-11-09 16:18:42 UTC (rev 12075)
@@ -28,8 +28,10 @@
 if(description)
 {
  script_id(64535);
+ script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2009-08-17 16:54:45 +0200 (Mon, 17 Aug 2009)");
  script_cve_id("CVE-2009-2284");
- script_version ("$");
  script_tag(name:"cvss_base", value:"4.3");
  script_tag(name:"risk_factor", value:"Medium");
  script_name("Mandrake Security Advisory MDVSA-2009:192 (phpmyadmin)");
@@ -53,10 +55,8 @@
 of md5 checksums and GPG signatures is performed automatically for you.
 
 https://secure1.securityspace.com/smysecure/catid.html?in=MDVSA-2009:192
-http://www.phpmyadmin.net/home_page/security/PMASA-2009-5.php
+http://www.phpmyadmin.net/home_page/security/PMASA-2009-5.php";
 
-Risk factor: Medium";
-
  script_description(desc);
 
  script_summary("Mandrake Security Advisory MDVSA-2009:192 (phpmyadmin)");


Property changes on: trunk/openvas-plugins/scripts/mdksa_2009_192.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/mdksa_2009_195.nasl
===================================================================
--- trunk/openvas-plugins/scripts/mdksa_2009_195.nasl	2011-11-09 16:10:49 UTC (rev 12074)
+++ trunk/openvas-plugins/scripts/mdksa_2009_195.nasl	2011-11-09 16:18:42 UTC (rev 12075)
@@ -28,8 +28,10 @@
 if(description)
 {
  script_id(64601);
+ script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2009-08-17 16:54:45 +0200 (Mon, 17 Aug 2009)");
  script_cve_id("CVE-2009-2412");
- script_version ("$Revision$");
  script_tag(name:"cvss_base", value:"10.0");
  script_tag(name:"risk_factor", value:"Critical");
  script_name("Mandrake Security Advisory MDVSA-2009:195 (apr)");
@@ -52,10 +54,8 @@
 To upgrade automatically use MandrakeUpdate or urpmi.  The verification
 of md5 checksums and GPG signatures is performed automatically for you.
 
-https://secure1.securityspace.com/smysecure/catid.html?in=MDVSA-2009:195
+https://secure1.securityspace.com/smysecure/catid.html?in=MDVSA-2009:195";
 
-Risk factor: Critical";
-
  script_description(desc);
 
  script_summary("Mandrake Security Advisory MDVSA-2009:195 (apr)");


Property changes on: trunk/openvas-plugins/scripts/mdksa_2009_195.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/mdksa_2009_311.nasl
===================================================================
--- trunk/openvas-plugins/scripts/mdksa_2009_311.nasl	2011-11-09 16:10:49 UTC (rev 12074)
+++ trunk/openvas-plugins/scripts/mdksa_2009_311.nasl	2011-11-09 16:18:42 UTC (rev 12075)
@@ -28,8 +28,10 @@
 if(description)
 {
  script_id(66380);
+ script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2009-12-10 00:23:54 +0100 (Thu, 10 Dec 2009)");
  script_cve_id("CVE-2007-6725", "CVE-2008-6679", "CVE-2009-0583", "CVE-2009-0584", "CVE-2009-0792", "CVE-2009-0196", "CVE-2008-3520", "CVE-2008-3522");
- script_version ("$Revision$");
  script_tag(name:"cvss_base", value:"10.0");
  script_tag(name:"risk_factor", value:"Critical");
  script_name("Mandriva Security Advisory MDVSA-2009:311 (ghostscript)");
@@ -51,10 +53,8 @@
 To upgrade automatically use MandrakeUpdate or urpmi.  The verification
 of md5 checksums and GPG signatures is performed automatically for you.
 
-https://secure1.securityspace.com/smysecure/catid.html?in=MDVSA-2009:311
+https://secure1.securityspace.com/smysecure/catid.html?in=MDVSA-2009:311";
 
-Risk factor : Critical";
-
  script_description(desc);
 
  script_summary("Mandriva Security Advisory MDVSA-2009:311 (ghostscript)");


Property changes on: trunk/openvas-plugins/scripts/mdksa_2009_311.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/mediahouse_statistics_web_server.nasl
===================================================================
--- trunk/openvas-plugins/scripts/mediahouse_statistics_web_server.nasl	2011-11-09 16:10:49 UTC (rev 12074)
+++ trunk/openvas-plugins/scripts/mediahouse_statistics_web_server.nasl	2011-11-09 16:18:42 UTC (rev 12075)
@@ -31,8 +31,10 @@
 if(description)
 {
  script_id(10748);
+ script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2005-11-03 14:08:04 +0100 (Thu, 03 Nov 2005)");
  script_bugtraq_id(1568);
- script_version ("$Revision$");
  script_tag(name:"cvss_base", value:"7.5");
  script_tag(name:"risk_factor", value:"High");
  script_cve_id("CVE-2000-0776");
@@ -53,10 +55,8 @@
 to overflow an internal buffer causing it to execute arbitrary code.
 
 Solution: Block the web server's port number on your Firewall, and 
-upgrade to the latest version if necessary.
+upgrade to the latest version if necessary.";
 
-Risk factor : High";
-
  script_description(desc);
 
  summary = "Mediahouse Statistics Web Server Detection";

Modified: trunk/openvas-plugins/scripts/opera_favicon_address_bar_spoofing.nasl
===================================================================
--- trunk/openvas-plugins/scripts/opera_favicon_address_bar_spoofing.nasl	2011-11-09 16:10:49 UTC (rev 12074)
+++ trunk/openvas-plugins/scripts/opera_favicon_address_bar_spoofing.nasl	2011-11-09 16:18:42 UTC (rev 12075)
@@ -29,9 +29,11 @@
 if(description)
 {
   script_id(14245);
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2005-11-03 14:08:04 +0100 (Thu, 03 Nov 2005)");
   script_cve_id("CVE-2004-0537");
   script_bugtraq_id(10452);
-  script_version("$Revision$");
   script_tag(name:"cvss_base", value:"5.0");
   script_tag(name:"risk_factor", value:"Medium");
   script_name("Opera web browser address bar spoofing weakness (2)");

Modified: trunk/openvas-plugins/scripts/ovcesa2009_0012.nasl
===================================================================
--- trunk/openvas-plugins/scripts/ovcesa2009_0012.nasl	2011-11-09 16:10:49 UTC (rev 12074)
+++ trunk/openvas-plugins/scripts/ovcesa2009_0012.nasl	2011-11-09 16:18:42 UTC (rev 12075)
@@ -26,8 +26,10 @@
 if(description)
 {
  script_id(63366);
+ script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2009-02-13 20:43:17 +0100 (Fri, 13 Feb 2009)");
  script_cve_id("CVE-2007-2721", "CVE-2008-3520");
- script_version ("$");
  script_tag(name:"cvss_base", value:"9.3");
  script_tag(name:"risk_factor", value:"Critical");
  name = "CentOS Security Advisory CESA-2009:0012 (netpbm)";
@@ -44,10 +46,8 @@
 
 http://www.securityspace.com/smysecure/catid.html?in=CESA-2009:0012
 http://www.securityspace.com/smysecure/catid.html?in=RHSA-2009:0012
-https://rhn.redhat.com/errata/RHSA-2009-0012.html
+https://rhn.redhat.com/errata/RHSA-2009-0012.html";
 
-Risk factor : Critical";
-
  script_description(desc);
 
  summary = "CentOS Security Advisory CESA-2009:0012 (netpbm)";


Property changes on: trunk/openvas-plugins/scripts/ovcesa2009_0012.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/ovcesa2009_0275.nasl
===================================================================
--- trunk/openvas-plugins/scripts/ovcesa2009_0275.nasl	2011-11-09 16:10:49 UTC (rev 12074)
+++ trunk/openvas-plugins/scripts/ovcesa2009_0275.nasl	2011-11-09 16:18:42 UTC (rev 12075)
@@ -26,8 +26,10 @@
 if(description)
 {
  script_id(63432);
+ script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2009-02-23 21:31:14 +0100 (Mon, 23 Feb 2009)");
  script_cve_id("CVE-2008-5005");
- script_version ("$");
  script_tag(name:"cvss_base", value:"10.0");
  script_tag(name:"risk_factor", value:"Critical");
  name = "CentOS Security Advisory CESA-2009:0275 (imap)";
@@ -44,10 +46,8 @@
 
 http://www.securityspace.com/smysecure/catid.html?in=CESA-2009:0275
 http://www.securityspace.com/smysecure/catid.html?in=RHSA-2009:0275
-https://rhn.redhat.com/errata/RHSA-2009-0275.html
+https://rhn.redhat.com/errata/RHSA-2009-0275.html";
 
-Risk factor: Critical";
-
  script_description(desc);
 
  summary = "CentOS Security Advisory CESA-2009:0275 (imap)";


Property changes on: trunk/openvas-plugins/scripts/ovcesa2009_0275.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/record_route.nasl
===================================================================
--- trunk/openvas-plugins/scripts/record_route.nasl	2011-11-09 16:10:49 UTC (rev 12074)
+++ trunk/openvas-plugins/scripts/record_route.nasl	2011-11-09 16:18:42 UTC (rev 12075)
@@ -30,6 +30,8 @@
 {
  script_id(12264);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2005-11-03 14:08:04 +0100 (Thu, 03 Nov 2005)");
  script_tag(name:"risk_factor", value:"None");
  
  name = "Record route";
@@ -37,11 +39,9 @@
  
  desc = "
 This plugin sends packets with the 'Record Route' option. 
-It is a complement to traceroute.
+It is a complement to traceroute.";
 
-Risk factor : None";
 
-
  script_description(desc);
  
  summary = "Ping target with Record Route option";

Modified: trunk/openvas-plugins/scripts/secpod_apache_apr-utils_xml_dos_vuln.nasl
===================================================================
--- trunk/openvas-plugins/scripts/secpod_apache_apr-utils_xml_dos_vuln.nasl	2011-11-09 16:10:49 UTC (rev 12074)
+++ trunk/openvas-plugins/scripts/secpod_apache_apr-utils_xml_dos_vuln.nasl	2011-11-09 16:18:42 UTC (rev 12075)
@@ -1,6 +1,6 @@
 ###############################################################################
 # OpenVAS Vulnerability Test
-# $Id: secpod_apache_apr-utils_xml_dos_vuln.nasl 2745 2009-06-23 17:14:22Z jun $
+# $Id$
 #
 # Apache APR-Utils XML Parser Denial of Service Vulnerability
 #
@@ -27,7 +27,9 @@
 if(description)
 {
   script_id(900573);
-  script_version("$ Revision:1.1 $");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2009-06-24 07:17:25 +0200 (Wed, 24 Jun 2009)");
   script_tag(name:"cvss_base", value:"5.0");
   script_tag(name:"risk_factor", value:"Medium");
   script_cve_id("CVE-2009-1955");
@@ -61,8 +63,7 @@
 
   CVSS Score:
     CVSS Base Score     : 5.0 (AV:N/AC:L/Au:NR/C:N/I:N/A:P)
-    CVSS Temporal Score : 3.9
-  Risk factor: Medium";
+    CVSS Temporal Score : 3.9";
 
   script_description(desc);
   script_summary("Check for the version of Apache APR-Utils");


Property changes on: trunk/openvas-plugins/scripts/secpod_apache_apr-utils_xml_dos_vuln.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/secpod_apache_mod_proxy_ftp_xss_vuln_900107.nasl
===================================================================
--- trunk/openvas-plugins/scripts/secpod_apache_mod_proxy_ftp_xss_vuln_900107.nasl	2011-11-09 16:10:49 UTC (rev 12074)
+++ trunk/openvas-plugins/scripts/secpod_apache_mod_proxy_ftp_xss_vuln_900107.nasl	2011-11-09 16:18:42 UTC (rev 12075)
@@ -27,10 +27,12 @@
 if(description)
 {
  script_id(900107);
+ script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2008-08-22 10:29:01 +0200 (Fri, 22 Aug 2008)");
  script_bugtraq_id(30560);
  script_cve_id("CVE-2008-2939");
  script_copyright("Copyright (C) 2008 SecPod");
- script_version("$Revision: 1.1 $");
  script_tag(name:"cvss_base", value:"4.3");
  script_tag(name:"risk_factor", value:"Medium");
  script_category(ACT_GATHER_INFO);
@@ -70,8 +72,7 @@
 
  CVSS Score :
         CVSS Base Score     : 5.8 (AV:N/AC:M/Au:NR/C:P/I:P/A:N)
-        CVSS Temporal Score : 4.5
- Risk factor : Medium";
+        CVSS Temporal Score : 4.5";
  script_description(desc);
  exit(0);
 }


Property changes on: trunk/openvas-plugins/scripts/secpod_apache_mod_proxy_ftp_xss_vuln_900107.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/secpod_campsite_detect.nasl
===================================================================
--- trunk/openvas-plugins/scripts/secpod_campsite_detect.nasl	2011-11-09 16:10:49 UTC (rev 12074)
+++ trunk/openvas-plugins/scripts/secpod_campsite_detect.nasl	2011-11-09 16:18:42 UTC (rev 12075)
@@ -1,6 +1,6 @@
 ##############################################################################
 # OpenVAS Vulnerability Test
-# $Id: secpod_campsite_detect.nasl 3105 2009-06-30 15:33:29Z jun $
+# $Id$
 #
 # Campsite Version Detection
 #
@@ -27,16 +27,16 @@
 if(description)
 {
   script_id(900384);
-  script_version("$Revision: 1.0 $");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2009-06-30 16:55:49 +0200 (Tue, 30 Jun 2009)");
   script_tag(name:"risk_factor", value:"None");
   script_name("Campsite Version Detection");
   desc = "
 
   Overview: This script detects the installed version of Campsite and
-  sets the result in KB.
+  sets the result in KB.";
 
-  Risk factor:None";
-
   script_description(desc);
   script_summary("Set KB for the Version of Campsite");
   script_category(ACT_GATHER_INFO);


Property changes on: trunk/openvas-plugins/scripts/secpod_campsite_detect.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/secpod_clamav_dos_vuln_win.nasl
===================================================================
--- trunk/openvas-plugins/scripts/secpod_clamav_dos_vuln_win.nasl	2011-11-09 16:10:49 UTC (rev 12074)
+++ trunk/openvas-plugins/scripts/secpod_clamav_dos_vuln_win.nasl	2011-11-09 16:18:42 UTC (rev 12075)
@@ -1,6 +1,6 @@
 ###############################################################################
 # OpenVAS Vulnerability Test
-# $Id: secpod_clamav_dos_vuln_win.nasl 1931 2009-04-28 13:19:22Z apr $
+# $Id$
 #
 # ClamAV Denial of Service Vulnerability (Win)
 #
@@ -27,7 +27,9 @@
 if(description)
 {
   script_id(900546);
-  script_version("$Revision: 1.0$");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2009-04-30 06:40:16 +0200 (Thu, 30 Apr 2009)");
   script_tag(name:"cvss_base", value:"10.0");
   script_tag(name:"risk_factor", value:"Critical");
   script_cve_id("CVE-2009-1371", "CVE-2009-1372");
@@ -62,8 +64,7 @@
 
   CVSS Score:
     CVSS Base Score     : 10.0 (AV:N/AC:L/Au:NR/C:C/I:C/A:C)
-    CVSS Temporal Score : 7.4
-  Risk factor: Critical";
+    CVSS Temporal Score : 7.4";
 
   script_description(desc);
   script_summary("Check for the Version of ClamAV");


Property changes on: trunk/openvas-plugins/scripts/secpod_clamav_dos_vuln_win.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/secpod_cybozu_office_auth_bypass_vuln_lin.nasl
===================================================================
--- trunk/openvas-plugins/scripts/secpod_cybozu_office_auth_bypass_vuln_lin.nasl	2011-11-09 16:10:49 UTC (rev 12074)
+++ trunk/openvas-plugins/scripts/secpod_cybozu_office_auth_bypass_vuln_lin.nasl	2011-11-09 16:18:42 UTC (rev 12075)
@@ -1,6 +1,6 @@
 ###############################################################################
 # OpenVAS Vulnerability Test
-# $Id: secpod_cybozu_office_auth_bypass_vuln_lin.nasl 9211 2010-05-28 17:35:24Z may $
+# $Id$
 #
 # Cybozu Office Authentication Bypass Vulnerability (Linux)
 #
@@ -27,7 +27,9 @@
 if(description)
 {
   script_id(902065);
-  script_version("$Revision$: 1.0");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2010-06-01 15:40:11 +0200 (Tue, 01 Jun 2010)");
   script_cve_id("CVE-2010-2029");
   script_tag(name:"cvss_base", value:"5.8");
   script_tag(name:"risk_factor", value:"High");


Property changes on: trunk/openvas-plugins/scripts/secpod_cybozu_office_auth_bypass_vuln_lin.nasl
___________________________________________________________________
Name: svn:keywords
   - Revision
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/secpod_firefox_javascript_sec_bypass_vuln_win.nasl
===================================================================
--- trunk/openvas-plugins/scripts/secpod_firefox_javascript_sec_bypass_vuln_win.nasl	2011-11-09 16:10:49 UTC (rev 12074)
+++ trunk/openvas-plugins/scripts/secpod_firefox_javascript_sec_bypass_vuln_win.nasl	2011-11-09 16:18:42 UTC (rev 12075)
@@ -1,6 +1,6 @@
 ###############################################################################
 # OpenVAS Vulnerability Test
-# $Id: secpod_firefox_javascript_sec_bypass_vuln_win.nasl 8012 2010-03-29 11:47:33Z mar $
+# $Id$
 #
 # Mozilla Firefox 'JavaScript' Security Bypass Vulnerability
 #
@@ -27,7 +27,9 @@
 if(description)
 {
   script_id(902152);
-  script_version("$Revision$: 1.0");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2010-03-30 16:15:33 +0200 (Tue, 30 Mar 2010)");
   script_cve_id("CVE-2010-1125");
   script_tag(name:"cvss_base", value:"5.8");
   script_tag(name:"risk_factor", value:"High");


Property changes on: trunk/openvas-plugins/scripts/secpod_firefox_javascript_sec_bypass_vuln_win.nasl
___________________________________________________________________
Name: svn:keywords
   - Revision
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/secpod_freeradius_detect.nasl
===================================================================
--- trunk/openvas-plugins/scripts/secpod_freeradius_detect.nasl	2011-11-09 16:10:49 UTC (rev 12074)
+++ trunk/openvas-plugins/scripts/secpod_freeradius_detect.nasl	2011-11-09 16:18:42 UTC (rev 12075)
@@ -1,6 +1,6 @@
 ###############################################################################
 # OpenVAS Vulnerability Test
-# $Id: secpod_freeradius_detect.nasl 4617 2009-09-22 21:25:29Z sep $
+# $Id$
 #
 # FreeRADIUS Version Detection
 #
@@ -27,15 +27,15 @@
 if(description)
 {
   script_id(900855);
-  script_version("$Revision: 1.0 $");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2009-09-23 08:37:26 +0200 (Wed, 23 Sep 2009)");
   script_tag(name:"risk_factor", value:"None");
   script_name("FreeRADIUS Version Detection");
   desc = "
   Overview: This script detects the installed version of FreeRADIUS and
-  sets the reuslt in KB.
+  sets the reuslt in KB.";
 
-  Risk Factor: None";
-
   script_description(desc);
   script_summary("Set KB for the version of FreeRADIUS");
   script_category(ACT_GATHER_INFO);


Property changes on: trunk/openvas-plugins/scripts/secpod_freeradius_detect.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/secpod_freeway_php_info_disc_vuln.nasl
===================================================================
--- trunk/openvas-plugins/scripts/secpod_freeway_php_info_disc_vuln.nasl	2011-11-09 16:10:49 UTC (rev 12074)
+++ trunk/openvas-plugins/scripts/secpod_freeway_php_info_disc_vuln.nasl	2011-11-09 16:18:42 UTC (rev 12075)
@@ -1,6 +1,6 @@
 ###############################################################################
 # OpenVAS Vulnerability Test
-# $Id: secpod_freeway_php_info_disc_vuln.nasl 17469 2011-09-27 13:35:33Z sep $
+# $Id$
 #
 # Freeway '.php' Files Information Disclosure Vulnerability
 #
@@ -27,7 +27,9 @@
 if(description)
 {
   script_id(902737);
-  script_version("$Revision: 1.0$");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2011-09-30 15:58:03 +0200 (Fri, 30 Sep 2011)");
   script_cve_id("CVE-2011-3739");
   script_tag(name:"cvss_base", value:"5.0");
   script_tag(name:"risk_factor", value:"Medium");


Property changes on: trunk/openvas-plugins/scripts/secpod_freeway_php_info_disc_vuln.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/secpod_google_chrome_use_after_free_vuln_lin.nasl
===================================================================
--- trunk/openvas-plugins/scripts/secpod_google_chrome_use_after_free_vuln_lin.nasl	2011-11-09 16:10:49 UTC (rev 12074)
+++ trunk/openvas-plugins/scripts/secpod_google_chrome_use_after_free_vuln_lin.nasl	2011-11-09 16:18:42 UTC (rev 12075)
@@ -1,6 +1,6 @@
 ###############################################################################
 # OpenVAS Vulnerability Test
-# $Id: secpod_google_chrome_use_after_free_vuln_lin.nasl 13990 2011-02-24 14:14:14 feb $
+# $Id$
 #
 # Google Chrome Use-After-Free Vulnerability (Linux)
 #
@@ -27,7 +27,9 @@
 if(description)
 {
   script_id(901191);
-  script_version("$Revision$: 1.0");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2011-02-28 11:12:07 +0100 (Mon, 28 Feb 2011)");
   script_cve_id("CVE-2011-1059");
   script_tag(name:"cvss_base", value:"4.3");
   script_tag(name:"risk_factor", value:"Medium");


Property changes on: trunk/openvas-plugins/scripts/secpod_google_chrome_use_after_free_vuln_lin.nasl
___________________________________________________________________
Name: svn:keywords
   - Revision
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/secpod_mailenable_imap_dos_vuln_900104.nasl
===================================================================
--- trunk/openvas-plugins/scripts/secpod_mailenable_imap_dos_vuln_900104.nasl	2011-11-09 16:10:49 UTC (rev 12074)
+++ trunk/openvas-plugins/scripts/secpod_mailenable_imap_dos_vuln_900104.nasl	2011-11-09 16:18:42 UTC (rev 12075)
@@ -27,10 +27,12 @@
 if(description)
 {
  script_id(900104);
+ script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2008-08-22 10:29:01 +0200 (Fri, 22 Aug 2008)");
  script_cve_id("CVE-2008-3449");
  script_bugtraq_id(30498);
  script_copyright("Copyright (C) 2008 SecPod");
- script_version("$Revision: 1.2 $");
  script_tag(name:"cvss_base", value:"5.0");
  script_tag(name:"risk_factor", value:"Medium");
  script_category(ACT_GATHER_INFO);
@@ -63,8 +65,7 @@
 
  CVSS Score :
         CVSS Base Score     : 6.3 (AV:N/AC:M/Au:SI/C:N/I:N/A:C) 
-        CVSS Temporal Score : 4.7
- Risk factor : Medium";
+        CVSS Temporal Score : 4.7";
  script_description(desc);
  script_dependencies("secpod_reg_enum.nasl");
  script_require_keys("SMB/WindowsVersion");


Property changes on: trunk/openvas-plugins/scripts/secpod_mailenable_imap_dos_vuln_900104.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/secpod_ms11-055.nasl
===================================================================
--- trunk/openvas-plugins/scripts/secpod_ms11-055.nasl	2011-11-09 16:10:49 UTC (rev 12074)
+++ trunk/openvas-plugins/scripts/secpod_ms11-055.nasl	2011-11-09 16:18:42 UTC (rev 12075)
@@ -1,6 +1,6 @@
 ###############################################################################
 # OpenVAS Vulnerability Test
-# $Id: secpod_ms11-055.nasl 16061 2011-07-13 15:26:22Z jul $
+# $Id$
 #
 # Microsoft Visio Remote Code Execution Vulnerability (2560847)
 #
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(902455);
-  script_version("$Revision: 1.0$");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2011-07-13 17:31:13 +0200 (Wed, 13 Jul 2011)");
   script_cve_id("CVE-2010-3148");
   script_bugtraq_id(42681);
   script_tag(name:"cvss_base", value:"9.3");


Property changes on: trunk/openvas-plugins/scripts/secpod_ms11-055.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/secpod_ms11-072.nasl
===================================================================
--- trunk/openvas-plugins/scripts/secpod_ms11-072.nasl	2011-11-09 16:10:49 UTC (rev 12074)
+++ trunk/openvas-plugins/scripts/secpod_ms11-072.nasl	2011-11-09 16:18:42 UTC (rev 12075)
@@ -1,6 +1,6 @@
 ###############################################################################
 # OpenVAS Vulnerability Test
-# $Id: secpod_ms11-072.nasl 17074 2011-09-14 10:10:09Z sep $
+# $Id$
 #
 # Microsoft Office Excel Remote Code Execution Vulnerabilities (2587505)
 #
@@ -27,7 +27,9 @@
 if(description)
 {
   script_id(902727);
-  script_version("$Revision: 1.0$");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2011-09-14 16:05:49 +0200 (Wed, 14 Sep 2011)");
   script_cve_id("CVE-2011-1986", "CVE-2011-1987", "CVE-2011-1988",
                 "CVE-2011-1989", "CVE-2011-1990");
   script_bugtraq_id(49476, 49477, 49478, 49518, 49517);


Property changes on: trunk/openvas-plugins/scripts/secpod_ms11-072.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/secpod_ms_dns_mem_corr_vuln.nasl
===================================================================
--- trunk/openvas-plugins/scripts/secpod_ms_dns_mem_corr_vuln.nasl	2011-11-09 16:10:49 UTC (rev 12074)
+++ trunk/openvas-plugins/scripts/secpod_ms_dns_mem_corr_vuln.nasl	2011-11-09 16:18:42 UTC (rev 12075)
@@ -1,6 +1,6 @@
 ###############################################################################
 # OpenVAS Vulnerability Test
-# $Id: secpod_ms_dns_mem_corr_vuln.nasl 1050 2009-03-03 15:00:29Z mar $
+# $Id$
 #
 # Microsoft Windows DNS Memory Corruption Vulnerability - Mar09
 #
@@ -28,6 +28,8 @@
 {
   script_id(900465);
   script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2009-03-05 06:25:55 +0100 (Thu, 05 Mar 2009)");
   script_tag(name:"cvss_base", value:"7.8");
   script_tag(name:"risk_factor", value:"High");
   script_cve_id("CVE-2008-6194");
@@ -62,8 +64,7 @@
 
   CVSS Score:
     CVSS Base Score     : 7.8 (AV:N/AC:L/Au:NR/C:N/I:N/A:C)
-    CVSS Temporal Score : 6.6
-  Risk factor: High";
+    CVSS Temporal Score : 6.6";
 
   script_description(desc);
   script_summary("Check for the version of DNS Executable");


Property changes on: trunk/openvas-plugins/scripts/secpod_ms_dns_mem_corr_vuln.nasl
___________________________________________________________________
Name: svn:keywords
   - Revision
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/secpod_noticeware_mail_server_dos_vuln.nasl
===================================================================
--- trunk/openvas-plugins/scripts/secpod_noticeware_mail_server_dos_vuln.nasl	2011-11-09 16:10:49 UTC (rev 12074)
+++ trunk/openvas-plugins/scripts/secpod_noticeware_mail_server_dos_vuln.nasl	2011-11-09 16:18:42 UTC (rev 12075)
@@ -1,6 +1,6 @@
 ###############################################################################
 # OpenVAS Vulnerability Test
-# $Id: secpod_noticeware_mail_server_dos_vuln.nasl 1045 2009-02-24 17:20:29Z feb $
+# $Id$
 #
 # NoticeWare Email Server Denial of Service Vulnerability
 #
@@ -27,7 +27,9 @@
 if(description)
 {
   script_id(900463);
-  script_version("$Revision: 1.0 $");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2009-02-26 05:27:20 +0100 (Thu, 26 Feb 2009)");
   script_tag(name:"cvss_base", value:"5.0");
   script_tag(name:"risk_factor", value:"Medium");
   script_bugtraq_id(31697);
@@ -61,8 +63,7 @@
 
   CVSS Score:
     CVSS Base Score     : 5.0 (AV:N/AC:L/Au:NR/C:N/I:N/A:P)
-    CVSS Temporal Score : 4.5
-  Risk factor: Medium";
+    CVSS Temporal Score : 4.5";
 
   script_description(desc);
   script_summary("Check for the version of NoticeWare Mail Server");


Property changes on: trunk/openvas-plugins/scripts/secpod_noticeware_mail_server_dos_vuln.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/secpod_sun_java_dir_server_detect_lin.nasl
===================================================================
--- trunk/openvas-plugins/scripts/secpod_sun_java_dir_server_detect_lin.nasl	2011-11-09 16:10:49 UTC (rev 12074)
+++ trunk/openvas-plugins/scripts/secpod_sun_java_dir_server_detect_lin.nasl	2011-11-09 16:18:42 UTC (rev 12075)
@@ -1,6 +1,6 @@
 ###############################################################################
 # OpenVAS Vulnerability Test
-# $Id: secpod_sun_java_dir_server_detect_lin.nasl 1828 2009-04-29 18:00:29Z apr $
+# $Id$
 #
 # Sun Java Directory Server Version Detection (Linux)
 #
@@ -27,16 +27,16 @@
 if(description)
 {
   script_id(900705);
-  script_version("$Revision: 1.0 $");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2009-04-30 06:40:16 +0200 (Thu, 30 Apr 2009)");
   script_tag(name:"risk_factor", value:"None");
   script_name("Sun Java Directory Server Version Detection (Linux)");
   desc = "
 
   Overview: This script detects the version of Directory Server and sets
-  the reuslt in KB.
+  the reuslt in KB.";
 
-  Risk Factor: None";
-
   script_description(desc);
   script_summary("Set KB for the version of Java Directory Server");
   script_category(ACT_GATHER_INFO);


Property changes on: trunk/openvas-plugins/scripts/secpod_sun_java_dir_server_detect_lin.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/secpod_tightvnc_detect_lin.nasl
===================================================================
--- trunk/openvas-plugins/scripts/secpod_tightvnc_detect_lin.nasl	2011-11-09 16:10:49 UTC (rev 12074)
+++ trunk/openvas-plugins/scripts/secpod_tightvnc_detect_lin.nasl	2011-11-09 16:18:42 UTC (rev 12075)
@@ -1,6 +1,6 @@
 ###############################################################################
 # OpenVAS Vulnerability Test
-# $Id: secpod_tightvnc_detect_lin.nasl 987 2009-02-27 13:25:36Z feb $
+# $Id$
 #
 # TightVNC Version Detection (Linux)
 #
@@ -27,15 +27,15 @@
 if(description)
 {
   script_id(900474);
-  script_version("Revision: 1.0 ");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2009-03-03 06:56:37 +0100 (Tue, 03 Mar 2009)");
   script_tag(name:"risk_factor", value:"None");
   script_name("TightVNC Version Detection (Linux)");
   desc = "
   Overview: This script finds the installed TightVNC version on Linux
-  and saves the version in KB.
+  and saves the version in KB.";
 
-  Risk factor: None";
-
   script_description(desc);
   script_summary("Set the Version of TightVNC in KB");
   script_category(ACT_GATHER_INFO);


Property changes on: trunk/openvas-plugins/scripts/secpod_tightvnc_detect_lin.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/sles10_dhcp.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles10_dhcp.nasl	2011-11-09 16:10:49 UTC (rev 12074)
+++ trunk/openvas-plugins/scripts/sles10_dhcp.nasl	2011-11-09 16:18:42 UTC (rev 12075)
@@ -29,8 +29,10 @@
 if(description)
 {
  script_id(65772);
+ script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2009-10-13 18:25:40 +0200 (Tue, 13 Oct 2009)");
  script_cve_id("CVE-2009-0692");
- script_version ("$Revision$");
  script_tag(name:"cvss_base", value:"10.0");
  script_tag(name:"risk_factor", value:"Critical");
  script_name("SLES10: Security update for dhclient");
@@ -52,10 +54,8 @@
 
 Solution:
 
-Please install the updates provided by SuSE.
+Please install the updates provided by SuSE.";
 
-Risk factor: Critical";
-
  script_description(desc);
 
  script_summary("SLES10: Security update for dhclient");


Property changes on: trunk/openvas-plugins/scripts/sles10_dhcp.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/sles10_libexif5.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles10_libexif5.nasl	2011-11-09 16:10:49 UTC (rev 12074)
+++ trunk/openvas-plugins/scripts/sles10_libexif5.nasl	2011-11-09 16:18:42 UTC (rev 12075)
@@ -29,8 +29,10 @@
 if(description)
 {
  script_id(65963);
+ script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2009-10-13 18:25:40 +0200 (Tue, 13 Oct 2009)");
  script_cve_id("CVE-2007-6352");
- script_version ("$Revision$");
  script_tag(name:"cvss_base", value:"6.8");
  script_tag(name:"risk_factor", value:"High");
  script_name("SLES10: Security update for libexif5");
@@ -48,10 +50,8 @@
 
 Solution:
 
-Please install the updates provided by SuSE.
+Please install the updates provided by SuSE.";
 
-Risk factor : High";
-
  script_description(desc);
 
  script_summary("SLES10: Security update for libexif5");


Property changes on: trunk/openvas-plugins/scripts/sles10_libexif5.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/sles10_postfix0.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles10_postfix0.nasl	2011-11-09 16:10:49 UTC (rev 12074)
+++ trunk/openvas-plugins/scripts/sles10_postfix0.nasl	2011-11-09 16:18:42 UTC (rev 12075)
@@ -29,7 +29,9 @@
 if(description)
 {
  script_id(65957);
- script_version ("$Revision$");
+ script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2009-10-13 18:25:40 +0200 (Tue, 13 Oct 2009)");
  script_tag(name:"risk_factor", value:"High");
  script_name("SLES10: Security update for Postfix");
 
@@ -45,10 +47,8 @@
 
 Solution:
 
-Please install the updates provided by SuSE.
+Please install the updates provided by SuSE.";
 
-Risk factor : High";
-
  script_description(desc);
 
  script_summary("SLES10: Security update for Postfix");


Property changes on: trunk/openvas-plugins/scripts/sles10_postfix0.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/sles9p5014116.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles9p5014116.nasl	2011-11-09 16:10:49 UTC (rev 12074)
+++ trunk/openvas-plugins/scripts/sles9p5014116.nasl	2011-11-09 16:18:42 UTC (rev 12075)
@@ -28,8 +28,10 @@
 if(description)
 {
  script_id(65568);
+ script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2009-10-10 16:11:46 +0200 (Sat, 10 Oct 2009)");
  script_cve_id("CVE-2004-0494", "CVE-2005-0706");
- script_version ("$Revision$");
  script_tag(name:"cvss_base", value:"7.5");
  script_tag(name:"risk_factor", value:"High");
  script_name("SLES9: Security update for gnome-vfs2,gnome-vfs2-doc");
@@ -50,10 +52,8 @@
 
 Solution:
 
-Please install the updates provided by SuSE.
+Please install the updates provided by SuSE.";
 
-Risk factor : High";
-
  script_description(desc);
 
  script_summary("SLES9: Security update for gnome-vfs2,gnome-vfs2-doc");


Property changes on: trunk/openvas-plugins/scripts/sles9p5014116.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/sles9p5014323.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles9p5014323.nasl	2011-11-09 16:10:49 UTC (rev 12074)
+++ trunk/openvas-plugins/scripts/sles9p5014323.nasl	2011-11-09 16:18:42 UTC (rev 12075)
@@ -28,8 +28,10 @@
 if(description)
 {
  script_id(65527);
+ script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2009-10-10 16:11:46 +0200 (Sat, 10 Oct 2009)");
  script_cve_id("CVE-2007-1536");
- script_version ("$Revision$");
  script_tag(name:"cvss_base", value:"9.3");
  script_tag(name:"risk_factor", value:"Critical");
  script_name("SLES9: Security update for file");
@@ -49,10 +51,8 @@
 
 Solution:
 
-Please install the updates provided by SuSE.
+Please install the updates provided by SuSE.";
 
-Risk factor: Critical";
-
  script_description(desc);
 
  script_summary("SLES9: Security update for file");


Property changes on: trunk/openvas-plugins/scripts/sles9p5014323.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/sles9p5017607.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles9p5017607.nasl	2011-11-09 16:10:49 UTC (rev 12074)
+++ trunk/openvas-plugins/scripts/sles9p5017607.nasl	2011-11-09 16:18:42 UTC (rev 12075)
@@ -28,7 +28,9 @@
 if(description)
 {
  script_id(65446);
- script_version ("$Revision$");
+ script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2009-10-10 16:11:46 +0200 (Sat, 10 Oct 2009)");
  script_tag(name:"risk_factor", value:"High");
  script_name("SLES9: Security update for Linux kernel");
 
@@ -53,10 +55,8 @@
 
 Solution:
 
-Please install the updates provided by SuSE.
+Please install the updates provided by SuSE.";
 
-Risk factor : High";
-
  script_description(desc);
 
  script_summary("SLES9: Security update for Linux kernel");


Property changes on: trunk/openvas-plugins/scripts/sles9p5017607.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/sles9p5018750.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles9p5018750.nasl	2011-11-09 16:10:49 UTC (rev 12074)
+++ trunk/openvas-plugins/scripts/sles9p5018750.nasl	2011-11-09 16:18:42 UTC (rev 12075)
@@ -28,8 +28,10 @@
 if(description)
 {
  script_id(65268);
+ script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2009-10-10 16:11:46 +0200 (Sat, 10 Oct 2009)");
  script_cve_id("CVE-2007-3472", "CVE-2007-3475", "CVE-2007-3476", "CVE-2007-3477", "CVE-2007-3478");
- script_version ("$Revision$");
  script_tag(name:"cvss_base", value:"5.0");
  script_tag(name:"risk_factor", value:"Medium");
  script_name("SLES9: Security update for gd");
@@ -50,10 +52,8 @@
 
 Solution:
 
-Please install the updates provided by SuSE.
+Please install the updates provided by SuSE.";
 
-Risk factor : Medium";
-
  script_description(desc);
 
  script_summary("SLES9: Security update for gd");


Property changes on: trunk/openvas-plugins/scripts/sles9p5018750.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/sles9p5021688.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles9p5021688.nasl	2011-11-09 16:10:49 UTC (rev 12074)
+++ trunk/openvas-plugins/scripts/sles9p5021688.nasl	2011-11-09 16:18:42 UTC (rev 12075)
@@ -28,8 +28,10 @@
 if(description)
 {
  script_id(65397);
+ script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2009-10-10 16:11:46 +0200 (Sat, 10 Oct 2009)");
  script_cve_id("CVE-2004-1019", "CVE-2004-1065", "CVE-2005-0524", "CVE-2005-0525", "CVE-2005-1042", "CVE-2005-1043", "CVE-2005-1921", "CVE-2005-2498", "CVE-2005-2491");
- script_version ("$Revision$");
  script_tag(name:"cvss_base", value:"10.0");
  script_tag(name:"risk_factor", value:"Critical");
  script_name("SLES9: Security update for PHP4");
@@ -62,10 +64,8 @@
 
 Solution:
 
-Please install the updates provided by SuSE.
+Please install the updates provided by SuSE.";
 
-Risk factor: Critical";
-
  script_description(desc);
 
  script_summary("SLES9: Security update for PHP4");


Property changes on: trunk/openvas-plugins/scripts/sles9p5021688.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/sles9p5039520.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles9p5039520.nasl	2011-11-09 16:10:49 UTC (rev 12074)
+++ trunk/openvas-plugins/scripts/sles9p5039520.nasl	2011-11-09 16:18:42 UTC (rev 12075)
@@ -28,7 +28,9 @@
 if(description)
 {
  script_id(65320);
- script_version ("$Revision$");
+ script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2009-10-10 16:11:46 +0200 (Sat, 10 Oct 2009)");
  script_tag(name:"risk_factor", value:"High");
  script_name("SLES9: Security update for rsh");
 
@@ -46,10 +48,8 @@
 
 Solution:
 
-Please install the updates provided by SuSE.
+Please install the updates provided by SuSE.";
 
-Risk factor : High";
-
  script_description(desc);
 
  script_summary("SLES9: Security update for rsh");


Property changes on: trunk/openvas-plugins/scripts/sles9p5039520.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/sles9p5050540.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles9p5050540.nasl	2011-11-09 16:10:49 UTC (rev 12074)
+++ trunk/openvas-plugins/scripts/sles9p5050540.nasl	2011-11-09 16:18:42 UTC (rev 12075)
@@ -28,8 +28,10 @@
 if(description)
 {
  script_id(65574);
+ script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2009-10-10 16:11:46 +0200 (Sat, 10 Oct 2009)");
  script_cve_id("CVE-2009-1269", "CVE-2009-1268", "CVE-2009-1267", "CVE-2009-1210", "CVE-2009-1266");
- script_version ("$Revision$");
  script_tag(name:"cvss_base", value:"10.0");
  script_tag(name:"risk_factor", value:"Critical");
  script_name("SLES9: Security update for ethereal");
@@ -49,10 +51,8 @@
 
 Solution:
 
-Please install the updates provided by SuSE.
+Please install the updates provided by SuSE.";
 
-Risk factor : Critical";
-
  script_description(desc);
 
  script_summary("SLES9: Security update for ethereal");


Property changes on: trunk/openvas-plugins/scripts/sles9p5050540.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/smb_mssql7.nasl
===================================================================
--- trunk/openvas-plugins/scripts/smb_mssql7.nasl	2011-11-09 16:10:49 UTC (rev 12074)
+++ trunk/openvas-plugins/scripts/smb_mssql7.nasl	2011-11-09 16:18:42 UTC (rev 12075)
@@ -30,8 +30,10 @@
 if(description)
 {
  script_id(10642);
+ script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2005-11-03 14:08:04 +0100 (Thu, 03 Nov 2005)");
  script_bugtraq_id(5205);
- script_version ("$Revision$");
  script_tag(name:"cvss_base", value:"7.2");
  script_tag(name:"risk_factor", value:"High");
  script_cve_id("CVE-2002-0642");
@@ -49,8 +51,7 @@
 
 Solution : http://support.microsoft.com/default.aspx?scid=kb;en-us;256052
 Reference : http://online.securityfocus.com/archive/1/285915
-Reference : http://online.securityfocus.com/advisories/4308
-Risk factor : High";
+Reference : http://online.securityfocus.com/advisories/4308";
 
 
  script_description(desc);

Modified: trunk/openvas-plugins/scripts/snitz_forums_2000_37637.nasl
===================================================================
--- trunk/openvas-plugins/scripts/snitz_forums_2000_37637.nasl	2011-11-09 16:10:49 UTC (rev 12074)
+++ trunk/openvas-plugins/scripts/snitz_forums_2000_37637.nasl	2011-11-09 16:18:42 UTC (rev 12075)
@@ -27,8 +27,10 @@
 if (description)
 {
  script_id(100431);
+ script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2010-01-06 18:07:55 +0100 (Wed, 06 Jan 2010)");
  script_bugtraq_id(37637);
- script_version ("1.0-$Revision$");
  script_tag(name:"risk_factor", value:"Medium");
 
  script_name("Snitz Forums 2000 'X-Forwarded-For' SQL Injection Vulnerability");
@@ -47,10 +49,8 @@
 
 References:
 http://www.securityfocus.com/bid/37637
-http://forum.snitz.com/
+http://forum.snitz.com/";
 
-Risk factor : Medium";
-
  script_description(desc);
  script_summary("Determine if Snitz Forums 2000 version is 3.4.07");
  script_category(ACT_GATHER_INFO);


Property changes on: trunk/openvas-plugins/scripts/snitz_forums_2000_37637.nasl
___________________________________________________________________
Name: svn:keywords
   - Id Revision
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/tiger_dms_34775.nasl
===================================================================
--- trunk/openvas-plugins/scripts/tiger_dms_34775.nasl	2011-11-09 16:10:49 UTC (rev 12074)
+++ trunk/openvas-plugins/scripts/tiger_dms_34775.nasl	2011-11-09 16:18:42 UTC (rev 12075)
@@ -27,9 +27,11 @@
 if (description)
 {
  script_id(100173);
+ script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2009-05-02 19:46:33 +0200 (Sat, 02 May 2009)");
  script_cve_id("CVE-2009-1503");
  script_bugtraq_id(34775);
- script_version ("1.0");
  script_tag(name:"cvss_base", value:"7.5");
  script_tag(name:"risk_factor", value:"High");
 
@@ -46,10 +48,8 @@
   vulnerabilities in the underlying database. 
 
  See also:
-  http://www.securityfocus.com/bid/34775
+  http://www.securityfocus.com/bid/34775";
 
- Risk factor: High";
-
  script_description(desc);
  script_summary("Determine if Tiger DMS is vulnerable to SQL Injection");
  script_category(ACT_GATHER_INFO);


Property changes on: trunk/openvas-plugins/scripts/tiger_dms_34775.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/ubuntu_734_1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/ubuntu_734_1.nasl	2011-11-09 16:10:49 UTC (rev 12074)
+++ trunk/openvas-plugins/scripts/ubuntu_734_1.nasl	2011-11-09 16:18:42 UTC (rev 12075)
@@ -28,8 +28,10 @@
 if(description)
 {
  script_id(63617);
+ script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2009-03-20 00:52:38 +0100 (Fri, 20 Mar 2009)");
  script_cve_id("CVE-2008-4610", "CVE-2008-4866", "CVE-2008-4867", "CVE-2009-0385", "CVE-2009-0587", "CVE-2008-4316");
- script_version ("$");
  script_tag(name:"cvss_base", value:"10.0");
  script_tag(name:"risk_factor", value:"Critical");
  name = "Ubuntu USN-734-1 (ffmpeg-debian)";
@@ -81,10 +83,8 @@
 In general, a standard system upgrade is sufficient to effect the
 necessary changes.
 
-https://secure1.securityspace.com/smysecure/catid.html?in=USN-734-1
+https://secure1.securityspace.com/smysecure/catid.html?in=USN-734-1";
 
-Risk factor : Critical";
-
  script_description(desc);
 
  summary = "Ubuntu USN-734-1 (ffmpeg-debian)";


Property changes on: trunk/openvas-plugins/scripts/ubuntu_734_1.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/ubuntu_755_1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/ubuntu_755_1.nasl	2011-11-09 16:10:49 UTC (rev 12074)
+++ trunk/openvas-plugins/scripts/ubuntu_755_1.nasl	2011-11-09 16:18:42 UTC (rev 12075)
@@ -28,8 +28,10 @@
 if(description)
 {
  script_id(63814);
+ script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2009-04-15 22:11:00 +0200 (Wed, 15 Apr 2009)");
  script_cve_id("CVE-2009-0844", "CVE-2009-0845", "CVE-2009-0846", "CVE-2009-0847");
- script_version ("$");
  script_tag(name:"cvss_base", value:"10.0");
  script_tag(name:"risk_factor", value:"Critical");
  name = "Ubuntu USN-755-1 (krb5)";
@@ -68,10 +70,8 @@
 After a standard system upgrade you need to restart any services using
 the Kerberos libraries to effect the necessary changes.
 
-https://secure1.securityspace.com/smysecure/catid.html?in=USN-755-1
+https://secure1.securityspace.com/smysecure/catid.html?in=USN-755-1";
 
-Risk factor : Critical";
-
  script_description(desc);
 
  summary = "Ubuntu USN-755-1 (krb5)";


Property changes on: trunk/openvas-plugins/scripts/ubuntu_755_1.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/www_infinite_request_DoS.nasl
===================================================================
--- trunk/openvas-plugins/scripts/www_infinite_request_DoS.nasl	2011-11-09 16:10:49 UTC (rev 12074)
+++ trunk/openvas-plugins/scripts/www_infinite_request_DoS.nasl	2011-11-09 16:18:42 UTC (rev 12075)
@@ -37,8 +37,10 @@
 if(description)
 {
  script_id(11084);
+ script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2005-11-03 14:08:04 +0100 (Thu, 03 Nov 2005)");
  script_bugtraq_id(2465);
- script_version ("$Revision$");
  script_tag(name:"risk_factor", value:"High");
  name = "Infinite HTTP request";
  script_name(name);
@@ -49,8 +51,7 @@
 A cracker may exploit this vulnerability to make your web server
 crash continually or even execute arbirtray code on your system.
 
-Solution : upgrade your software or protect it with a filtering reverse proxy
-Risk factor : High";
+Solution : upgrade your software or protect it with a filtering reverse proxy";
 
  script_description(desc);
  
@@ -121,8 +122,7 @@
 *** Note that OpenVAS was unable to crash the web server
 *** so this might be a false alert.
 
-Solution : upgrade your software or protect it with a filtering reverse proxy
-Risk factor : Medium";
+Solution : upgrade your software or protect it with a filtering reverse proxy";
 		security_warning(port: port, data: m); 
 		}
                 exit(0);



More information about the Openvas-commits mailing list