[Openvas-commits] r11560 - in trunk/openvas-plugins: . scripts

scm-commit@wald.intevation.org scm-commit at wald.intevation.org
Mon Sep 5 19:17:09 CEST 2011


Author: reinke
Date: 2011-09-05 19:14:52 +0200 (Mon, 05 Sep 2011)
New Revision: 11560

Modified:
   trunk/openvas-plugins/ChangeLog
   trunk/openvas-plugins/scripts/secpod_adobe_prdts_mult_vuln_apr10_lin.nasl
   trunk/openvas-plugins/scripts/secpod_adobe_prdts_mult_vuln_apr10_win.nasl
   trunk/openvas-plugins/scripts/secpod_adobe_prdts_mult_vuln_jun10_lin.nasl
   trunk/openvas-plugins/scripts/secpod_adobe_prdts_mult_vuln_jun10_win.nasl
   trunk/openvas-plugins/scripts/secpod_adobe_presenter_xss_vuln_900110.nasl
   trunk/openvas-plugins/scripts/secpod_anzio_web_print_obj_bof_vuln_900115.nasl
   trunk/openvas-plugins/scripts/secpod_apache_mod_proxy_ftp_xss_vuln_900107.nasl
   trunk/openvas-plugins/scripts/secpod_apache_tomcat_sec_bypass_vuln.nasl
   trunk/openvas-plugins/scripts/secpod_apache_tomcat_xss_n_bypass_vuln_900021.nasl
   trunk/openvas-plugins/scripts/secpod_apple_itunes_prv_esc_vuln_900122.nasl
   trunk/openvas-plugins/scripts/secpod_apple_quicktime_mult_vuln_900121.nasl
   trunk/openvas-plugins/scripts/secpod_apple_safari_mult_vuln.nasl
   trunk/openvas-plugins/scripts/secpod_apple_safari_mult_vuln_july08_900002.nasl
   trunk/openvas-plugins/scripts/secpod_atlassian_jira_mult_xss_n_priv_esc_vuln.nasl
   trunk/openvas-plugins/scripts/secpod_avg_antivirus_dos_vuln_900017.nasl
   trunk/openvas-plugins/scripts/secpod_blue_coat_k9_web_prot_bof_vuln_900103.nasl
   trunk/openvas-plugins/scripts/secpod_brekeke_pbx_csrf_vuln.nasl
   trunk/openvas-plugins/scripts/secpod_bugtracker_dotnet_xss_n_sql_injection_vuln.nasl
   trunk/openvas-plugins/scripts/secpod_ca_prdts_mult_vuln_900202.nasl
   trunk/openvas-plugins/scripts/secpod_clamav_invalid_mem_access_dos_vuln_900117.nasl
   trunk/openvas-plugins/scripts/secpod_clamav_mult_dos_vuln_win.nasl
   trunk/openvas-plugins/scripts/secpod_datatrack_system_mult_vuln.nasl
   trunk/openvas-plugins/scripts/secpod_dotproject_mult_xss_n_sql_inj_vuln_900116.nasl
   trunk/openvas-plugins/scripts/secpod_eset_smart_sec_local_prv_esc_vuln_900114.nasl
   trunk/openvas-plugins/scripts/secpod_event_horizon_xss_n_sql_inj_vuln.nasl
   trunk/openvas-plugins/scripts/secpod_f-prot_av_mult_vuln_900018.nasl
   trunk/openvas-plugins/scripts/secpod_firefox_javascript_sec_bypass_vuln_win.nasl
   trunk/openvas-plugins/scripts/secpod_firefox_mult_dos_vuln_win.nasl
   trunk/openvas-plugins/scripts/secpod_firefox_mult_vuln_mar10_lin.nasl
   trunk/openvas-plugins/scripts/secpod_firefox_mult_vuln_mar10_win.nasl
   trunk/openvas-plugins/scripts/secpod_firefox_unspecified_vuln.nasl
   trunk/openvas-plugins/scripts/secpod_firefox_unspecified_vuln_mar10_lin.nasl
   trunk/openvas-plugins/scripts/secpod_firefox_unspecified_vuln_mar10_win.nasl
   trunk/openvas-plugins/scripts/secpod_flashget_ftp_pwd_bof_vuln_900203.nasl
   trunk/openvas-plugins/scripts/secpod_freetype_mult_dos_vuln_win.nasl
   trunk/openvas-plugins/scripts/secpod_google_chrome_iframe_dos_vuln.nasl
   trunk/openvas-plugins/scripts/secpod_google_chrome_mult_vuln_900214.nasl
   trunk/openvas-plugins/scripts/secpod_google_chrome_mult_vuln_aug10.nasl
   trunk/openvas-plugins/scripts/secpod_google_chrome_mult_vuln_lin01_sep10.nasl
   trunk/openvas-plugins/scripts/secpod_google_chrome_mult_vuln_may11_lin.nasl
   trunk/openvas-plugins/scripts/secpod_google_chrome_mult_vuln_may11_win.nasl
   trunk/openvas-plugins/scripts/secpod_google_chrome_mult_vuln_win_jun10.nasl
   trunk/openvas-plugins/scripts/secpod_habari_mult_vuln.nasl
   trunk/openvas-plugins/scripts/secpod_hmailserver_imap_dos_vuln_900109.nasl
   trunk/openvas-plugins/scripts/secpod_hp_data_protector_manager_rds_dos_vuln.nasl
   trunk/openvas-plugins/scripts/secpod_hp_openview_nnm_mult_vuln.nasl
   trunk/openvas-plugins/scripts/secpod_hp_smh_mult_vuln_apr11.nasl
   trunk/openvas-plugins/scripts/secpod_hp_smh_unspecified_xss_vuln_900150.nasl
   trunk/openvas-plugins/scripts/secpod_hummingbird_deployment_activex_cntl_mul_vuln_900161.nasl
   trunk/openvas-plugins/scripts/secpod_ibm_db2_8_udb_mult_vuln_lin_900216.nasl
   trunk/openvas-plugins/scripts/secpod_ibm_db2_8_udb_mult_vuln_win_900215.nasl
   trunk/openvas-plugins/scripts/secpod_ibm_db2_mult_sec_bypass_vuln.nasl
   trunk/openvas-plugins/scripts/secpod_ibm_lotus_notes_code_exec_vuln_win.nasl
   trunk/openvas-plugins/scripts/secpod_ibmhttpserver_mod_proxy_dos_900222.nasl
   trunk/openvas-plugins/scripts/secpod_ida_pro_mult_vuln.nasl
   trunk/openvas-plugins/scripts/secpod_itunes_mult_vuln_macosx.nasl
   trunk/openvas-plugins/scripts/secpod_joomla_artforms_mult_vuln.nasl
   trunk/openvas-plugins/scripts/secpod_justsystems_ichitaro_code_exec_vuln_900207.nasl
   trunk/openvas-plugins/scripts/secpod_livezilla_track_module_xss_vuln.nasl
   trunk/openvas-plugins/scripts/secpod_macosx_java_10_5_upd_9.nasl
   trunk/openvas-plugins/scripts/secpod_macosx_java_10_6_upd_4.nasl
   trunk/openvas-plugins/scripts/secpod_macosx_su11-001.nasl
   trunk/openvas-plugins/scripts/secpod_mahara_xss_n_csrf_vuln.nasl
   trunk/openvas-plugins/scripts/secpod_mailenable_imap_dos_vuln_900104.nasl
   trunk/openvas-plugins/scripts/secpod_mcafee_encrypt_usb_mngr_sec_bypass_vuln_900026.nasl
   trunk/openvas-plugins/scripts/secpod_microworld_mailscan_mult_vuln_900204.nasl
   trunk/openvas-plugins/scripts/secpod_movable_type_mult_vuln.nasl
   trunk/openvas-plugins/scripts/secpod_mozilla_prdts_iframe_dos_vuln_win.nasl
   trunk/openvas-plugins/scripts/secpod_mozilla_prdts_mult_vuln_mar10_lin.nasl
   trunk/openvas-plugins/scripts/secpod_mozilla_prdts_mult_vuln_mar10_win.nasl
   trunk/openvas-plugins/scripts/secpod_mozilla_prdts_mult_vuln_win01_jun10.nasl
   trunk/openvas-plugins/scripts/secpod_ms08-037_900005.nasl
   trunk/openvas-plugins/scripts/secpod_ms08-039_900007.nasl
   trunk/openvas-plugins/scripts/secpod_ms08-043_900028.nasl
   trunk/openvas-plugins/scripts/secpod_ms08-044_900029.nasl
   trunk/openvas-plugins/scripts/secpod_ms08-045_900030.nasl
   trunk/openvas-plugins/scripts/secpod_ms08-048_900031.nasl
   trunk/openvas-plugins/scripts/secpod_ms08-049_900035.nasl
   trunk/openvas-plugins/scripts/secpod_ms08-050_900034.nasl
   trunk/openvas-plugins/scripts/secpod_ms08-051_900033.nasl
   trunk/openvas-plugins/scripts/secpod_ms09-034.nasl
   trunk/openvas-plugins/scripts/secpod_ms09-037.nasl
   trunk/openvas-plugins/scripts/secpod_ms09-048.nasl
   trunk/openvas-plugins/scripts/secpod_ms09-050-remote.nasl
   trunk/openvas-plugins/scripts/secpod_ms09-053.nasl
   trunk/openvas-plugins/scripts/secpod_ms09-056.nasl
   trunk/openvas-plugins/scripts/secpod_ms09-058.nasl
   trunk/openvas-plugins/scripts/secpod_ms09-065.nasl
   trunk/openvas-plugins/scripts/secpod_ms09-070.nasl
   trunk/openvas-plugins/scripts/secpod_ms10-002.nasl
   trunk/openvas-plugins/scripts/secpod_ms10-012-remote.nasl
   trunk/openvas-plugins/scripts/secpod_ms10-012.nasl
   trunk/openvas-plugins/scripts/secpod_ms10-021.nasl
   trunk/openvas-plugins/scripts/secpod_ms10-032.nasl
   trunk/openvas-plugins/scripts/secpod_ms10-033.nasl
   trunk/openvas-plugins/scripts/secpod_ms10-035.nasl
   trunk/openvas-plugins/scripts/secpod_ms10-036.nasl
   trunk/openvas-plugins/scripts/secpod_ms10-037.nasl
   trunk/openvas-plugins/scripts/secpod_ms10-038.nasl
   trunk/openvas-plugins/scripts/secpod_ms10-039.nasl
   trunk/openvas-plugins/scripts/secpod_ms10-040.nasl
   trunk/openvas-plugins/scripts/secpod_ms10-045.nasl
   trunk/openvas-plugins/scripts/secpod_ms10-047.nasl
   trunk/openvas-plugins/scripts/secpod_ms10-048.nasl
   trunk/openvas-plugins/scripts/secpod_ms10-049.nasl
   trunk/openvas-plugins/scripts/secpod_ms10-053.nasl
   trunk/openvas-plugins/scripts/secpod_ms10-057.nasl
   trunk/openvas-plugins/scripts/secpod_ms10-058.nasl
   trunk/openvas-plugins/scripts/secpod_ms10-059.nasl
   trunk/openvas-plugins/scripts/secpod_ms10-061.nasl
   trunk/openvas-plugins/scripts/secpod_ms10-062.nasl
   trunk/openvas-plugins/scripts/secpod_ms10-065.nasl
   trunk/openvas-plugins/scripts/secpod_ms10-066.nasl
   trunk/openvas-plugins/scripts/secpod_ms10-068.nasl
   trunk/openvas-plugins/scripts/secpod_ms10-069.nasl
   trunk/openvas-plugins/scripts/secpod_ms10-073.nasl
   trunk/openvas-plugins/scripts/secpod_ms10-074.nasl
   trunk/openvas-plugins/scripts/secpod_ms10-075.nasl
   trunk/openvas-plugins/scripts/secpod_ms10-076.nasl
   trunk/openvas-plugins/scripts/secpod_ms10-078.nasl
   trunk/openvas-plugins/scripts/secpod_ms10-080.nasl
   trunk/openvas-plugins/scripts/secpod_ms10-081.nasl
   trunk/openvas-plugins/scripts/secpod_ms10-083.nasl
   trunk/openvas-plugins/scripts/secpod_ms10-084.nasl
   trunk/openvas-plugins/scripts/secpod_ms10-088.nasl
   trunk/openvas-plugins/scripts/secpod_ms10-091.nasl
   trunk/openvas-plugins/scripts/secpod_ms10-092.nasl
   trunk/openvas-plugins/scripts/secpod_ms10-094.nasl
   trunk/openvas-plugins/scripts/secpod_ms10-095.nasl
   trunk/openvas-plugins/scripts/secpod_ms10-098.nasl
   trunk/openvas-plugins/scripts/secpod_ms10-099.nasl
   trunk/openvas-plugins/scripts/secpod_ms10-100.nasl
   trunk/openvas-plugins/scripts/secpod_ms10-101.nasl
   trunk/openvas-plugins/scripts/secpod_ms11-005.nasl
   trunk/openvas-plugins/scripts/secpod_ms11-008.nasl
   trunk/openvas-plugins/scripts/secpod_ms11-009.nasl
   trunk/openvas-plugins/scripts/secpod_ms11-010.nasl
   trunk/openvas-plugins/scripts/secpod_ms11-012.nasl
   trunk/openvas-plugins/scripts/secpod_ms11-013.nasl
   trunk/openvas-plugins/scripts/secpod_ms11-014.nasl
   trunk/openvas-plugins/scripts/secpod_ms11-017.nasl
   trunk/openvas-plugins/scripts/secpod_ms11-018.nasl
   trunk/openvas-plugins/scripts/secpod_ms11-021.nasl
   trunk/openvas-plugins/scripts/secpod_ms11-022.nasl
   trunk/openvas-plugins/scripts/secpod_ms11-024.nasl
   trunk/openvas-plugins/scripts/secpod_ms11-026.nasl
   trunk/openvas-plugins/scripts/secpod_ms11-029.nasl
   trunk/openvas-plugins/scripts/secpod_ms11-030.nasl
   trunk/openvas-plugins/scripts/secpod_ms11-034.nasl
   trunk/openvas-plugins/scripts/secpod_ms11-035.nasl
   trunk/openvas-plugins/scripts/secpod_ms11-036.nasl
   trunk/openvas-plugins/scripts/secpod_ms11-037.nasl
   trunk/openvas-plugins/scripts/secpod_ms11-038.nasl
   trunk/openvas-plugins/scripts/secpod_ms11-044.nasl
   trunk/openvas-plugins/scripts/secpod_ms11-045.nasl
   trunk/openvas-plugins/scripts/secpod_ms11-046.nasl
   trunk/openvas-plugins/scripts/secpod_ms11-048.nasl
   trunk/openvas-plugins/scripts/secpod_ms11-050.nasl
   trunk/openvas-plugins/scripts/secpod_ms11-051.nasl
   trunk/openvas-plugins/scripts/secpod_ms11-052.nasl
   trunk/openvas-plugins/scripts/secpod_ms11-054.nasl
   trunk/openvas-plugins/scripts/secpod_ms11-055.nasl
   trunk/openvas-plugins/scripts/secpod_ms11-056.nasl
   trunk/openvas-plugins/scripts/secpod_ms_access_snapshot_viewer_actvx_vuln_900004.nasl
   trunk/openvas-plugins/scripts/secpod_ms_ie_dos_vuln_mar10.nasl
   trunk/openvas-plugins/scripts/secpod_ms_ie_iframe_dos_vuln.nasl
   trunk/openvas-plugins/scripts/secpod_ms_ie_mhtml_info_disc_vuln.nasl
   trunk/openvas-plugins/scripts/secpod_ms_iexplorer_dos_vuln_900131.nasl
   trunk/openvas-plugins/scripts/secpod_ms_org_chart_remote_code_exe_vuln_900120.nasl
   trunk/openvas-plugins/scripts/secpod_ms_sharepoint_layouts_xss_vuln.nasl
   trunk/openvas-plugins/scripts/secpod_ms_sql_server_2000_activex_bof_vuln_900125.nasl
   trunk/openvas-plugins/scripts/secpod_ms_word_code_exec_vuln_900006.nasl
   trunk/openvas-plugins/scripts/secpod_mysql_dos_vuln_900221.nasl
   trunk/openvas-plugins/scripts/secpod_nms_dvd_burning_sdk_actvx_vuln_900132.nasl
   trunk/openvas-plugins/scripts/secpod_noticeware_email_svr_dos_vuln_900027.nasl
   trunk/openvas-plugins/scripts/secpod_novell_iprint_client_actvx_bof_vuln_dec10.nasl
   trunk/openvas-plugins/scripts/secpod_novell_iprint_client_actvx_mult_vuln_900040.nasl
   trunk/openvas-plugins/scripts/secpod_novell_iprint_client_mult_vuln_win.nasl
   trunk/openvas-plugins/scripts/secpod_ocs_inventory_ng_mult_sql_inj_vuln_may10.nasl
   trunk/openvas-plugins/scripts/secpod_openoffice_code_exec_vuln_lin_900043.nasl
   trunk/openvas-plugins/scripts/secpod_openoffice_code_exec_vuln_win_900042.nasl
   trunk/openvas-plugins/scripts/secpod_openoffice_mult_vuln_win.nasl
   trunk/openvas-plugins/scripts/secpod_openoffice_soffice_dir_traversal_vuln_win.nasl
   trunk/openvas-plugins/scripts/secpod_openvpn_client_code_exec_vuln_900024.nasl
   trunk/openvas-plugins/scripts/secpod_opera_mult_dos_vuln_win.nasl
   trunk/openvas-plugins/scripts/secpod_opera_mult_vuln_aug08_lin_900039.nasl
   trunk/openvas-plugins/scripts/secpod_opera_mult_vuln_aug08_win_900038.nasl
   trunk/openvas-plugins/scripts/secpod_opera_mult_vuln_july08_900001.nasl
   trunk/openvas-plugins/scripts/secpod_oracle_java_mult_code_exec_vuln_win.nasl
   trunk/openvas-plugins/scripts/secpod_oracle_java_mult_unspecified_vuln_win.nasl
   trunk/openvas-plugins/scripts/secpod_oracle_java_mult_unspecified_vuln_win01_jun11.nasl
   trunk/openvas-plugins/scripts/secpod_oracle_java_mult_unspecified_vuln_win_feb11.nasl
   trunk/openvas-plugins/scripts/secpod_personal_ftp_server_dos_vuln_900127.nasl
   trunk/openvas-plugins/scripts/secpod_php_bof_vuln_win.nasl
   trunk/openvas-plugins/scripts/secpod_php_format_string_vuln.nasl
   trunk/openvas-plugins/scripts/secpod_phpmyadmin_remote_command_exe_vuln_900130.nasl
   trunk/openvas-plugins/scripts/secpod_pidgin_intgr_overflow_lin_900009.nasl
   trunk/openvas-plugins/scripts/secpod_pidgin_intgr_overflow_win_900008.nasl
   trunk/openvas-plugins/scripts/secpod_proftpd_cmd_handling_sec_vuln_900133.nasl
   trunk/openvas-plugins/scripts/secpod_python_mult_vuln_lin_900106.nasl
   trunk/openvas-plugins/scripts/secpod_python_mult_vuln_win_900105.nasl
   trunk/openvas-plugins/scripts/secpod_realplayer_swf_bof_vuln_900015.nasl
   trunk/openvas-plugins/scripts/secpod_realvnc_dos_vuln_win_900019.nasl
   trunk/openvas-plugins/scripts/secpod_ruby_rails_sec_bypass_n_sql_inj_vuln.nasl
   trunk/openvas-plugins/scripts/secpod_simple_machines_forum_sec_bypass_vuln_900118.nasl
   trunk/openvas-plugins/scripts/secpod_softalk_mail_serv_imap_dos_vuln_900119.nasl
   trunk/openvas-plugins/scripts/secpod_sun_java_jdk_mult_vuln_win_apr10.nasl
   trunk/openvas-plugins/scripts/secpod_sun_java_jre_mult_vuln_lin_apr10.nasl
   trunk/openvas-plugins/scripts/secpod_syncback_freeware_bof_vuln.nasl
   trunk/openvas-plugins/scripts/secpod_titan_ftp_server_cmd_processing_dos_vuln_900160.nasl
   trunk/openvas-plugins/scripts/secpod_trellian_ftp_bof_vuln.nasl
   trunk/openvas-plugins/scripts/secpod_trendmicro_officescan_auth_bypass_vuln_900205.nasl
   trunk/openvas-plugins/scripts/secpod_trendmicro_officescan_bof_vuln_900016.nasl
   trunk/openvas-plugins/scripts/secpod_trendmicro_officescan_bof_vuln_sept08_900220.nasl
   trunk/openvas-plugins/scripts/secpod_ttwm_sql_inj_vuln.nasl
   trunk/openvas-plugins/scripts/secpod_ultra_office_activex_control_mult_vuln_900208.nasl
   trunk/openvas-plugins/scripts/secpod_vlc_media_player_bof_vuln_feb11_lin.nasl
   trunk/openvas-plugins/scripts/secpod_vlc_media_player_bof_vuln_feb11_win.nasl
   trunk/openvas-plugins/scripts/secpod_vlc_media_player_intgr_overflow_vuln_900112.nasl
   trunk/openvas-plugins/scripts/secpod_vmware_prdts_dos_vuln_win_apr10.nasl
   trunk/openvas-plugins/scripts/secpod_vmware_prdts_sec_bypass_vuln_lin_sep10.nasl
   trunk/openvas-plugins/scripts/secpod_vmware_prdts_sec_bypass_vuln_win_sep10.nasl
   trunk/openvas-plugins/scripts/secpod_win_nslookup_remote_code_exe_vuln_900108.nasl
   trunk/openvas-plugins/scripts/secpod_wingate_imap_dos_vuln_900201.nasl
   trunk/openvas-plugins/scripts/secpod_wireshark_mult_vuln_july08_lin_900011.nasl
   trunk/openvas-plugins/scripts/secpod_wireshark_mult_vuln_july08_win_900010.nasl
   trunk/openvas-plugins/scripts/secpod_wireshark_mult_vuln_sept08_lin_900213.nasl
   trunk/openvas-plugins/scripts/secpod_wireshark_mult_vuln_sept08_win_900212.nasl
   trunk/openvas-plugins/scripts/secpod_wordpress_mult_vuln_900219.nasl
   trunk/openvas-plugins/scripts/secpod_wsftp_client_format_string_vuln_900206.nasl
   trunk/openvas-plugins/scripts/secpod_xampp_mult_xss_vuln_900023.nasl
   trunk/openvas-plugins/scripts/secpod_xine-lib_mult_code_exe_dos_vuln_900111.nasl
   trunk/openvas-plugins/scripts/secpod_zonealarm_net_sec_suite_bof_vuln_900126.nasl
   trunk/openvas-plugins/scripts/sendmail_header.nasl
   trunk/openvas-plugins/scripts/servletExec_DoS.nasl
   trunk/openvas-plugins/scripts/sles10_MozillaFirefox.nasl
   trunk/openvas-plugins/scripts/sles10_MozillaFirefox0.nasl
   trunk/openvas-plugins/scripts/sles10_MozillaFirefox2.nasl
   trunk/openvas-plugins/scripts/sles10_MozillaFirefox4.nasl
   trunk/openvas-plugins/scripts/sles10_MozillaFirefox6.nasl
   trunk/openvas-plugins/scripts/sles10_MozillaFirefox7.nasl
   trunk/openvas-plugins/scripts/sles10_NetworkManager-0.nasl
   trunk/openvas-plugins/scripts/sles10_NetworkManager.nasl
   trunk/openvas-plugins/scripts/sles10_apache2-mod_php0.nasl
   trunk/openvas-plugins/scripts/sles10_apache21.nasl
   trunk/openvas-plugins/scripts/sles10_clamav.nasl
   trunk/openvas-plugins/scripts/sles10_compat-openssl02.nasl
   trunk/openvas-plugins/scripts/sles10_cups0.nasl
   trunk/openvas-plugins/scripts/sles10_cups3.nasl
   trunk/openvas-plugins/scripts/sles10_cups4.nasl
   trunk/openvas-plugins/scripts/sles10_epiphany.nasl
   trunk/openvas-plugins/scripts/sles10_ethereal.nasl
   trunk/openvas-plugins/scripts/sles10_ethereal0.nasl
   trunk/openvas-plugins/scripts/sles10_ethereal2.nasl
   trunk/openvas-plugins/scripts/sles10_gd.nasl
   trunk/openvas-plugins/scripts/sles10_gecko-sdk.nasl
   trunk/openvas-plugins/scripts/sles10_gecko-sdk0.nasl
   trunk/openvas-plugins/scripts/sles10_icu0.nasl
   trunk/openvas-plugins/scripts/sles10_ipsec-tools0.nasl
   trunk/openvas-plugins/scripts/sles10_jasper.nasl
   trunk/openvas-plugins/scripts/sles10_java-1_4_2-ibm.nasl
   trunk/openvas-plugins/scripts/sles10_java-1_4_2-ibm0.nasl
   trunk/openvas-plugins/scripts/sles10_java-1_4_2-ibm2.nasl
   trunk/openvas-plugins/scripts/sles10_java-1_4_2-ibm3.nasl
   trunk/openvas-plugins/scripts/sles10_java-1_4_2-sun.nasl
   trunk/openvas-plugins/scripts/sles10_java-1_4_2-sun0.nasl
   trunk/openvas-plugins/scripts/sles10_java-1_4_2-sun1.nasl
   trunk/openvas-plugins/scripts/sles10_java-1_5_0-ibm1.nasl
   trunk/openvas-plugins/scripts/sles10_java-1_5_0-ibm2.nasl
   trunk/openvas-plugins/scripts/sles10_java-1_5_0-ibm3.nasl
   trunk/openvas-plugins/scripts/sles10_java-1_5_0-ibm4.nasl
   trunk/openvas-plugins/scripts/sles10_kdegraphics3-pd.nasl
   trunk/openvas-plugins/scripts/sles10_kdegraphics3.nasl
   trunk/openvas-plugins/scripts/sles10_kernel1.nasl
   trunk/openvas-plugins/scripts/sles10_kernel2.nasl
   trunk/openvas-plugins/scripts/sles10_kernel3.nasl
   trunk/openvas-plugins/scripts/sles10_kernel4.nasl
   trunk/openvas-plugins/scripts/sles10_kernel6.nasl
   trunk/openvas-plugins/scripts/sles10_kernel7.nasl
   trunk/openvas-plugins/scripts/sles10_kernel8.nasl
   trunk/openvas-plugins/scripts/sles10_kernel9.nasl
   trunk/openvas-plugins/scripts/sles10_krb5.nasl
   trunk/openvas-plugins/scripts/sles10_libexif.nasl
   trunk/openvas-plugins/scripts/sles10_libvorbis.nasl
   trunk/openvas-plugins/scripts/sles10_libxml2.nasl
   trunk/openvas-plugins/scripts/sles10_mozilla-xulrunn.nasl
   trunk/openvas-plugins/scripts/sles10_mozilla-xulrunn0.nasl
   trunk/openvas-plugins/scripts/sles10_multipath-tools.nasl
   trunk/openvas-plugins/scripts/sles10_mysql0.nasl
   trunk/openvas-plugins/scripts/sles10_net-snmp1.nasl
   trunk/openvas-plugins/scripts/sles10_openssl3.nasl
   trunk/openvas-plugins/scripts/sles10_poppler.nasl
   trunk/openvas-plugins/scripts/sles10_postgresql0.nasl
   trunk/openvas-plugins/scripts/sles10_postgresql1.nasl
   trunk/openvas-plugins/scripts/sles10_python.nasl
   trunk/openvas-plugins/scripts/sles10_python0.nasl
   trunk/openvas-plugins/scripts/sles10_rsync.nasl
   trunk/openvas-plugins/scripts/sles10_xorg-x11-Xnest.nasl
   trunk/openvas-plugins/scripts/sles10_xpdf1.nasl
   trunk/openvas-plugins/scripts/sles11_MozillaFirefox1.nasl
   trunk/openvas-plugins/scripts/sles11_MozillaFirefox5.nasl
   trunk/openvas-plugins/scripts/sles11_MozillaFirefox7.nasl
   trunk/openvas-plugins/scripts/sles11_NetworkManager.nasl
   trunk/openvas-plugins/scripts/sles11_apache2.nasl
   trunk/openvas-plugins/scripts/sles11_bind0.nasl
   trunk/openvas-plugins/scripts/sles11_ext4dev-kmp-def.nasl
   trunk/openvas-plugins/scripts/sles11_ext4dev-kmp-def1.nasl
   trunk/openvas-plugins/scripts/sles11_ext4dev-kmp-def2.nasl
   trunk/openvas-plugins/scripts/sles11_ext4dev-kmp-def4.nasl
   trunk/openvas-plugins/scripts/sles11_java-1_4_2-ibm.nasl
   trunk/openvas-plugins/scripts/sles11_java-1_4_2-ibm0.nasl
   trunk/openvas-plugins/scripts/sles11_java-1_6_0-ibm.nasl
   trunk/openvas-plugins/scripts/sles11_java-1_6_0-ibm0.nasl
   trunk/openvas-plugins/scripts/sles11_java-1_6_0-ibm1.nasl
   trunk/openvas-plugins/scripts/sles11_krb5.nasl
   trunk/openvas-plugins/scripts/sles11_libopenssl0_9_82.nasl
   trunk/openvas-plugins/scripts/sles11_libpoppler4.nasl
   trunk/openvas-plugins/scripts/sles11_mozilla-xulrunn.nasl
   trunk/openvas-plugins/scripts/sles11_mozilla-xulrunn1.nasl
   trunk/openvas-plugins/scripts/sles11_postgresql0.nasl
   trunk/openvas-plugins/scripts/sles11_ruby.nasl
   trunk/openvas-plugins/scripts/sles11_wireshark.nasl
   trunk/openvas-plugins/scripts/sles11_wireshark1.nasl
   trunk/openvas-plugins/scripts/sles9p5009131.nasl
   trunk/openvas-plugins/scripts/sles9p5009158.nasl
   trunk/openvas-plugins/scripts/sles9p5009300.nasl
   trunk/openvas-plugins/scripts/sles9p5009301.nasl
   trunk/openvas-plugins/scripts/sles9p5009598.nasl
   trunk/openvas-plugins/scripts/sles9p5009713.nasl
   trunk/openvas-plugins/scripts/sles9p5010460.nasl
   trunk/openvas-plugins/scripts/sles9p5010771.nasl
   trunk/openvas-plugins/scripts/sles9p5010939.nasl
   trunk/openvas-plugins/scripts/sles9p5010966.nasl
   trunk/openvas-plugins/scripts/sles9p5010972.nasl
   trunk/openvas-plugins/scripts/sles9p5011006.nasl
   trunk/openvas-plugins/scripts/sles9p5011022.nasl
   trunk/openvas-plugins/scripts/sles9p5011171.nasl
   trunk/openvas-plugins/scripts/sles9p5011429.nasl
   trunk/openvas-plugins/scripts/sles9p5011436.nasl
   trunk/openvas-plugins/scripts/sles9p5011912.nasl
   trunk/openvas-plugins/scripts/sles9p5012004.nasl
   trunk/openvas-plugins/scripts/sles9p5012110.nasl
   trunk/openvas-plugins/scripts/sles9p5012115.nasl
   trunk/openvas-plugins/scripts/sles9p5012138.nasl
   trunk/openvas-plugins/scripts/sles9p5012225.nasl
   trunk/openvas-plugins/scripts/sles9p5012483.nasl
   trunk/openvas-plugins/scripts/sles9p5012650.nasl
   trunk/openvas-plugins/scripts/sles9p5012664.nasl
   trunk/openvas-plugins/scripts/sles9p5012702.nasl
   trunk/openvas-plugins/scripts/sles9p5012976.nasl
   trunk/openvas-plugins/scripts/sles9p5013177.nasl
   trunk/openvas-plugins/scripts/sles9p5013194.nasl
   trunk/openvas-plugins/scripts/sles9p5013279.nasl
   trunk/openvas-plugins/scripts/sles9p5013454.nasl
   trunk/openvas-plugins/scripts/sles9p5013481.nasl
   trunk/openvas-plugins/scripts/sles9p5014050.nasl
   trunk/openvas-plugins/scripts/sles9p5014064.nasl
   trunk/openvas-plugins/scripts/sles9p5014078.nasl
   trunk/openvas-plugins/scripts/sles9p5014847.nasl
   trunk/openvas-plugins/scripts/sles9p5014967.nasl
   trunk/openvas-plugins/scripts/sles9p5015546.nasl
   trunk/openvas-plugins/scripts/sles9p5015565.nasl
   trunk/openvas-plugins/scripts/sles9p5015608.nasl
   trunk/openvas-plugins/scripts/sles9p5015662.nasl
   trunk/openvas-plugins/scripts/sles9p5015723.nasl
   trunk/openvas-plugins/scripts/sles9p5015871.nasl
   trunk/openvas-plugins/scripts/sles9p5015996.nasl
   trunk/openvas-plugins/scripts/sles9p5016282.nasl
   trunk/openvas-plugins/scripts/sles9p5016317.nasl
   trunk/openvas-plugins/scripts/sles9p5016546.nasl
   trunk/openvas-plugins/scripts/sles9p5016608.nasl
   trunk/openvas-plugins/scripts/sles9p5016846.nasl
   trunk/openvas-plugins/scripts/sles9p5017209.nasl
   trunk/openvas-plugins/scripts/sles9p5017544.nasl
   trunk/openvas-plugins/scripts/sles9p5017742.nasl
   trunk/openvas-plugins/scripts/sles9p5018289.nasl
   trunk/openvas-plugins/scripts/sles9p5018527.nasl
   trunk/openvas-plugins/scripts/sles9p5018586.nasl
   trunk/openvas-plugins/scripts/sles9p5018750.nasl
   trunk/openvas-plugins/scripts/sles9p5018824.nasl
   trunk/openvas-plugins/scripts/sles9p5019053.nasl
   trunk/openvas-plugins/scripts/sles9p5019327.nasl
   trunk/openvas-plugins/scripts/sles9p5019431.nasl
   trunk/openvas-plugins/scripts/sles9p5019505.nasl
   trunk/openvas-plugins/scripts/sles9p5019559.nasl
   trunk/openvas-plugins/scripts/sles9p5019905.nasl
   trunk/openvas-plugins/scripts/sles9p5019909.nasl
   trunk/openvas-plugins/scripts/sles9p5019924.nasl
   trunk/openvas-plugins/scripts/sles9p5020045.nasl
   trunk/openvas-plugins/scripts/sles9p5020427.nasl
   trunk/openvas-plugins/scripts/sles9p5020521.nasl
   trunk/openvas-plugins/scripts/sles9p5020541.nasl
   trunk/openvas-plugins/scripts/sles9p5020714.nasl
   trunk/openvas-plugins/scripts/sles9p5020865.nasl
   trunk/openvas-plugins/scripts/sles9p5020876.nasl
   trunk/openvas-plugins/scripts/sles9p5020914.nasl
   trunk/openvas-plugins/scripts/sles9p5021116.nasl
   trunk/openvas-plugins/scripts/sles9p5021388.nasl
   trunk/openvas-plugins/scripts/sles9p5021652.nasl
   trunk/openvas-plugins/scripts/sles9p5021746.nasl
   trunk/openvas-plugins/scripts/sles9p5021793.nasl
   trunk/openvas-plugins/scripts/sles9p5021809.nasl
   trunk/openvas-plugins/scripts/sles9p5021818.nasl
   trunk/openvas-plugins/scripts/sles9p5021882.nasl
   trunk/openvas-plugins/scripts/sles9p5021982.nasl
   trunk/openvas-plugins/scripts/sles9p5022953.nasl
   trunk/openvas-plugins/scripts/sles9p5023036.nasl
   trunk/openvas-plugins/scripts/sles9p5023078.nasl
   trunk/openvas-plugins/scripts/sles9p5023300.nasl
   trunk/openvas-plugins/scripts/sles9p5023460.nasl
   trunk/openvas-plugins/scripts/sles9p5023603.nasl
   trunk/openvas-plugins/scripts/sles9p5026120.nasl
   trunk/openvas-plugins/scripts/sles9p5027942.nasl
   trunk/openvas-plugins/scripts/sles9p5028577.nasl
   trunk/openvas-plugins/scripts/sles9p5031860.nasl
   trunk/openvas-plugins/scripts/sles9p5032900.nasl
   trunk/openvas-plugins/scripts/sles9p5033480.nasl
   trunk/openvas-plugins/scripts/sles9p5033740.nasl
   trunk/openvas-plugins/scripts/sles9p5033780.nasl
   trunk/openvas-plugins/scripts/sles9p5034680.nasl
   trunk/openvas-plugins/scripts/sles9p5035180.nasl
   trunk/openvas-plugins/scripts/sles9p5035420.nasl
   trunk/openvas-plugins/scripts/sles9p5035440.nasl
   trunk/openvas-plugins/scripts/sles9p5036146.nasl
   trunk/openvas-plugins/scripts/sles9p5036560.nasl
   trunk/openvas-plugins/scripts/sles9p5036604.nasl
   trunk/openvas-plugins/scripts/sles9p5037740.nasl
   trunk/openvas-plugins/scripts/sles9p5038720.nasl
   trunk/openvas-plugins/scripts/sles9p5039274.nasl
   trunk/openvas-plugins/scripts/sles9p5039700.nasl
   trunk/openvas-plugins/scripts/sles9p5040200.nasl
   trunk/openvas-plugins/scripts/sles9p5040565.nasl
   trunk/openvas-plugins/scripts/sles9p5040780.nasl
   trunk/openvas-plugins/scripts/sles9p5040940.nasl
   trunk/openvas-plugins/scripts/sles9p5041763.nasl
   trunk/openvas-plugins/scripts/sles9p5046186.nasl
   trunk/openvas-plugins/scripts/sles9p5046302.nasl
   trunk/openvas-plugins/scripts/sles9p5046860.nasl
   trunk/openvas-plugins/scripts/sles9p5047860.nasl
   trunk/openvas-plugins/scripts/sles9p5050060.nasl
   trunk/openvas-plugins/scripts/sles9p5050540.nasl
   trunk/openvas-plugins/scripts/sles9p5051763.nasl
   trunk/openvas-plugins/scripts/sles9p5053737.nasl
   trunk/openvas-plugins/scripts/sles9p5055991.nasl
   trunk/openvas-plugins/scripts/sles9p5059340.nasl
   trunk/openvas-plugins/scripts/sles9p5059500.nasl
   trunk/openvas-plugins/scripts/sles9p5059920.nasl
   trunk/openvas-plugins/scripts/sles9p5060942.nasl
   trunk/openvas-plugins/scripts/sles9p5062456.nasl
   trunk/openvas-plugins/scripts/sles9p5062661.nasl
   trunk/openvas-plugins/scripts/smb_nt_ms02-005.nasl
   trunk/openvas-plugins/scripts/smb_nt_ms02-006.nasl
   trunk/openvas-plugins/scripts/smb_reg_service_pack_XP.nasl
   trunk/openvas-plugins/scripts/smbcl_flash_player_CB-A08-0059.nasl
   trunk/openvas-plugins/scripts/smtp_relay2.nasl
   trunk/openvas-plugins/scripts/spip_sql_injection.nasl
   trunk/openvas-plugins/scripts/squirrelmail_144.nasl
   trunk/openvas-plugins/scripts/squirremail_cross_site_scripting.nasl
   trunk/openvas-plugins/scripts/sugarcrm_remote_file_inclusion.nasl
   trunk/openvas-plugins/scripts/suse_sa_2009_001.nasl
   trunk/openvas-plugins/scripts/suse_sa_2009_003.nasl
   trunk/openvas-plugins/scripts/suse_sa_2009_004.nasl
   trunk/openvas-plugins/scripts/suse_sa_2009_010.nasl
   trunk/openvas-plugins/scripts/suse_sa_2009_012.nasl
   trunk/openvas-plugins/scripts/suse_sa_2009_013.nasl
   trunk/openvas-plugins/scripts/suse_sa_2009_014.nasl
   trunk/openvas-plugins/scripts/suse_sa_2009_016.nasl
   trunk/openvas-plugins/scripts/suse_sa_2009_019.nasl
   trunk/openvas-plugins/scripts/suse_sa_2009_021.nasl
   trunk/openvas-plugins/scripts/suse_sa_2009_023.nasl
   trunk/openvas-plugins/scripts/suse_sa_2009_024.nasl
   trunk/openvas-plugins/scripts/suse_sa_2009_030.nasl
   trunk/openvas-plugins/scripts/suse_sa_2009_031.nasl
   trunk/openvas-plugins/scripts/suse_sa_2009_032.nasl
   trunk/openvas-plugins/scripts/suse_sa_2009_039.nasl
   trunk/openvas-plugins/scripts/suse_sa_2009_041.nasl
   trunk/openvas-plugins/scripts/suse_sa_2009_043.nasl
   trunk/openvas-plugins/scripts/suse_sa_2009_048.nasl
   trunk/openvas-plugins/scripts/suse_sa_2009_049.nasl
   trunk/openvas-plugins/scripts/suse_sa_2009_050.nasl
   trunk/openvas-plugins/scripts/suse_sa_2009_057.nasl
   trunk/openvas-plugins/scripts/suse_sa_2009_058.nasl
   trunk/openvas-plugins/scripts/suse_sa_2009_059.nasl
   trunk/openvas-plugins/scripts/suse_sa_2009_060.nasl
   trunk/openvas-plugins/scripts/suse_sr_2009_001.nasl
   trunk/openvas-plugins/scripts/suse_sr_2009_001a.nasl
   trunk/openvas-plugins/scripts/suse_sr_2009_001b.nasl
   trunk/openvas-plugins/scripts/suse_sr_2009_002.nasl
   trunk/openvas-plugins/scripts/suse_sr_2009_003.nasl
   trunk/openvas-plugins/scripts/suse_sr_2009_004.nasl
   trunk/openvas-plugins/scripts/suse_sr_2009_006.nasl
   trunk/openvas-plugins/scripts/suse_sr_2009_007.nasl
   trunk/openvas-plugins/scripts/suse_sr_2009_008.nasl
   trunk/openvas-plugins/scripts/suse_sr_2009_009.nasl
   trunk/openvas-plugins/scripts/suse_sr_2009_010.nasl
   trunk/openvas-plugins/scripts/suse_sr_2009_011.nasl
   trunk/openvas-plugins/scripts/suse_sr_2009_012.nasl
   trunk/openvas-plugins/scripts/suse_sr_2009_013.nasl
   trunk/openvas-plugins/scripts/suse_sr_2009_014.nasl
   trunk/openvas-plugins/scripts/suse_sr_2009_015.nasl
   trunk/openvas-plugins/scripts/suse_sr_2009_016.nasl
   trunk/openvas-plugins/scripts/suse_sr_2009_017.nasl
   trunk/openvas-plugins/scripts/suse_sr_2009_018.nasl
   trunk/openvas-plugins/scripts/sympa_new_list_xss.nasl
Log:
Updated cvss scores, risk levels in tags and body

Modified: trunk/openvas-plugins/ChangeLog
===================================================================
--- trunk/openvas-plugins/ChangeLog	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/ChangeLog	2011-09-05 17:14:52 UTC (rev 11560)
@@ -1,3 +1,511 @@
+2011-09-05 Thomas Reinke <reinke at securityspace.com>
+
+	* scripts/secpod_adobe_prdts_mult_vuln_apr10_lin.nasl,
+	scripts/secpod_adobe_prdts_mult_vuln_apr10_win.nasl,
+	scripts/secpod_adobe_prdts_mult_vuln_jun10_lin.nasl,
+	scripts/secpod_adobe_prdts_mult_vuln_jun10_win.nasl,
+	scripts/secpod_adobe_presenter_xss_vuln_900110.nasl,
+	scripts/secpod_anzio_web_print_obj_bof_vuln_900115.nasl,
+	scripts/secpod_apache_mod_proxy_ftp_xss_vuln_900107.nasl,
+	scripts/secpod_apache_tomcat_sec_bypass_vuln.nasl,
+	scripts/secpod_apache_tomcat_xss_n_bypass_vuln_900021.nasl,
+	scripts/secpod_apple_itunes_prv_esc_vuln_900122.nasl,
+	scripts/secpod_apple_quicktime_mult_vuln_900121.nasl,
+	scripts/secpod_apple_safari_mult_vuln.nasl,
+	scripts/secpod_apple_safari_mult_vuln_july08_900002.nasl,
+	scripts/secpod_atlassian_jira_mult_xss_n_priv_esc_vuln.nasl,
+	scripts/secpod_avg_antivirus_dos_vuln_900017.nasl,
+	scripts/secpod_blue_coat_k9_web_prot_bof_vuln_900103.nasl,
+	scripts/secpod_brekeke_pbx_csrf_vuln.nasl,
+	scripts/secpod_bugtracker_dotnet_xss_n_sql_injection_vuln.nasl,
+	scripts/secpod_ca_prdts_mult_vuln_900202.nasl,
+	scripts/secpod_clamav_invalid_mem_access_dos_vuln_900117.nasl,
+	scripts/secpod_clamav_mult_dos_vuln_win.nasl,
+	scripts/secpod_datatrack_system_mult_vuln.nasl,
+	scripts/secpod_dotproject_mult_xss_n_sql_inj_vuln_900116.nasl,
+	scripts/secpod_eset_smart_sec_local_prv_esc_vuln_900114.nasl,
+	scripts/secpod_event_horizon_xss_n_sql_inj_vuln.nasl,
+	scripts/secpod_f-prot_av_mult_vuln_900018.nasl,
+	scripts/secpod_firefox_javascript_sec_bypass_vuln_win.nasl,
+	scripts/secpod_firefox_mult_dos_vuln_win.nasl,
+	scripts/secpod_firefox_mult_vuln_mar10_lin.nasl,
+	scripts/secpod_firefox_mult_vuln_mar10_win.nasl,
+	scripts/secpod_firefox_unspecified_vuln.nasl,
+	scripts/secpod_firefox_unspecified_vuln_mar10_lin.nasl,
+	scripts/secpod_firefox_unspecified_vuln_mar10_win.nasl,
+	scripts/secpod_flashget_ftp_pwd_bof_vuln_900203.nasl,
+	scripts/secpod_freetype_mult_dos_vuln_win.nasl,
+	scripts/secpod_google_chrome_iframe_dos_vuln.nasl,
+	scripts/secpod_google_chrome_mult_vuln_900214.nasl,
+	scripts/secpod_google_chrome_mult_vuln_aug10.nasl,
+	scripts/secpod_google_chrome_mult_vuln_lin01_sep10.nasl,
+	scripts/secpod_google_chrome_mult_vuln_may11_lin.nasl,
+	scripts/secpod_google_chrome_mult_vuln_may11_win.nasl,
+	scripts/secpod_google_chrome_mult_vuln_win_jun10.nasl,
+	scripts/secpod_habari_mult_vuln.nasl,
+	scripts/secpod_hmailserver_imap_dos_vuln_900109.nasl,
+	scripts/secpod_hp_data_protector_manager_rds_dos_vuln.nasl,
+	scripts/secpod_hp_openview_nnm_mult_vuln.nasl,
+	scripts/secpod_hp_smh_mult_vuln_apr11.nasl,
+	scripts/secpod_hp_smh_unspecified_xss_vuln_900150.nasl,
+	scripts/secpod_hummingbird_deployment_activex_cntl_mul_vuln_900161.nasl,
+	scripts/secpod_ibm_db2_8_udb_mult_vuln_lin_900216.nasl,
+	scripts/secpod_ibm_db2_8_udb_mult_vuln_win_900215.nasl,
+	scripts/secpod_ibm_db2_mult_sec_bypass_vuln.nasl,
+	scripts/secpod_ibm_lotus_notes_code_exec_vuln_win.nasl,
+	scripts/secpod_ibmhttpserver_mod_proxy_dos_900222.nasl,
+	scripts/secpod_ida_pro_mult_vuln.nasl,
+	scripts/secpod_itunes_mult_vuln_macosx.nasl,
+	scripts/secpod_joomla_artforms_mult_vuln.nasl,
+	scripts/secpod_justsystems_ichitaro_code_exec_vuln_900207.nasl,
+	scripts/secpod_livezilla_track_module_xss_vuln.nasl,
+	scripts/secpod_macosx_java_10_5_upd_9.nasl,
+	scripts/secpod_macosx_java_10_6_upd_4.nasl,
+	scripts/secpod_macosx_su11-001.nasl,
+	scripts/secpod_mahara_xss_n_csrf_vuln.nasl,
+	scripts/secpod_mailenable_imap_dos_vuln_900104.nasl,
+	scripts/secpod_mcafee_encrypt_usb_mngr_sec_bypass_vuln_900026.nasl,
+	scripts/secpod_microworld_mailscan_mult_vuln_900204.nasl,
+	scripts/secpod_movable_type_mult_vuln.nasl,
+	scripts/secpod_mozilla_prdts_iframe_dos_vuln_win.nasl,
+	scripts/secpod_mozilla_prdts_mult_vuln_mar10_lin.nasl,
+	scripts/secpod_mozilla_prdts_mult_vuln_mar10_win.nasl,
+	scripts/secpod_mozilla_prdts_mult_vuln_win01_jun10.nasl,
+	scripts/secpod_ms08-037_900005.nasl,
+	scripts/secpod_ms08-039_900007.nasl,
+	scripts/secpod_ms08-043_900028.nasl,
+	scripts/secpod_ms08-044_900029.nasl,
+	scripts/secpod_ms08-045_900030.nasl,
+	scripts/secpod_ms08-048_900031.nasl,
+	scripts/secpod_ms08-049_900035.nasl,
+	scripts/secpod_ms08-050_900034.nasl,
+	scripts/secpod_ms08-051_900033.nasl,
+	scripts/secpod_ms09-034.nasl,
+	scripts/secpod_ms09-037.nasl,
+	scripts/secpod_ms09-048.nasl,
+	scripts/secpod_ms09-050-remote.nasl,
+	scripts/secpod_ms09-053.nasl,
+	scripts/secpod_ms09-056.nasl,
+	scripts/secpod_ms09-058.nasl,
+	scripts/secpod_ms09-065.nasl,
+	scripts/secpod_ms09-070.nasl,
+	scripts/secpod_ms10-002.nasl,
+	scripts/secpod_ms10-012-remote.nasl,
+	scripts/secpod_ms10-012.nasl,
+	scripts/secpod_ms10-021.nasl,
+	scripts/secpod_ms10-032.nasl,
+	scripts/secpod_ms10-033.nasl,
+	scripts/secpod_ms10-035.nasl,
+	scripts/secpod_ms10-036.nasl,
+	scripts/secpod_ms10-037.nasl,
+	scripts/secpod_ms10-038.nasl,
+	scripts/secpod_ms10-039.nasl,
+	scripts/secpod_ms10-040.nasl,
+	scripts/secpod_ms10-045.nasl,
+	scripts/secpod_ms10-047.nasl,
+	scripts/secpod_ms10-048.nasl,
+	scripts/secpod_ms10-049.nasl,
+	scripts/secpod_ms10-053.nasl,
+	scripts/secpod_ms10-057.nasl,
+	scripts/secpod_ms10-058.nasl,
+	scripts/secpod_ms10-059.nasl,
+	scripts/secpod_ms10-061.nasl,
+	scripts/secpod_ms10-062.nasl,
+	scripts/secpod_ms10-065.nasl,
+	scripts/secpod_ms10-066.nasl,
+	scripts/secpod_ms10-068.nasl,
+	scripts/secpod_ms10-069.nasl,
+	scripts/secpod_ms10-073.nasl,
+	scripts/secpod_ms10-074.nasl,
+	scripts/secpod_ms10-075.nasl,
+	scripts/secpod_ms10-076.nasl,
+	scripts/secpod_ms10-078.nasl,
+	scripts/secpod_ms10-080.nasl,
+	scripts/secpod_ms10-081.nasl,
+	scripts/secpod_ms10-083.nasl,
+	scripts/secpod_ms10-084.nasl,
+	scripts/secpod_ms10-088.nasl,
+	scripts/secpod_ms10-091.nasl,
+	scripts/secpod_ms10-092.nasl,
+	scripts/secpod_ms10-094.nasl,
+	scripts/secpod_ms10-095.nasl,
+	scripts/secpod_ms10-098.nasl,
+	scripts/secpod_ms10-099.nasl,
+	scripts/secpod_ms10-100.nasl,
+	scripts/secpod_ms10-101.nasl,
+	scripts/secpod_ms11-005.nasl,
+	scripts/secpod_ms11-008.nasl,
+	scripts/secpod_ms11-009.nasl,
+	scripts/secpod_ms11-010.nasl,
+	scripts/secpod_ms11-012.nasl,
+	scripts/secpod_ms11-013.nasl,
+	scripts/secpod_ms11-014.nasl,
+	scripts/secpod_ms11-017.nasl,
+	scripts/secpod_ms11-018.nasl,
+	scripts/secpod_ms11-021.nasl,
+	scripts/secpod_ms11-022.nasl,
+	scripts/secpod_ms11-024.nasl,
+	scripts/secpod_ms11-026.nasl,
+	scripts/secpod_ms11-029.nasl,
+	scripts/secpod_ms11-030.nasl,
+	scripts/secpod_ms11-034.nasl,
+	scripts/secpod_ms11-035.nasl,
+	scripts/secpod_ms11-036.nasl,
+	scripts/secpod_ms11-037.nasl,
+	scripts/secpod_ms11-038.nasl,
+	scripts/secpod_ms11-044.nasl,
+	scripts/secpod_ms11-045.nasl,
+	scripts/secpod_ms11-046.nasl,
+	scripts/secpod_ms11-048.nasl,
+	scripts/secpod_ms11-050.nasl,
+	scripts/secpod_ms11-051.nasl,
+	scripts/secpod_ms11-052.nasl,
+	scripts/secpod_ms11-054.nasl,
+	scripts/secpod_ms11-055.nasl,
+	scripts/secpod_ms11-056.nasl,
+	scripts/secpod_ms_access_snapshot_viewer_actvx_vuln_900004.nasl,
+	scripts/secpod_ms_ie_dos_vuln_mar10.nasl,
+	scripts/secpod_ms_ie_iframe_dos_vuln.nasl,
+	scripts/secpod_ms_ie_mhtml_info_disc_vuln.nasl,
+	scripts/secpod_ms_iexplorer_dos_vuln_900131.nasl,
+	scripts/secpod_ms_org_chart_remote_code_exe_vuln_900120.nasl,
+	scripts/secpod_ms_sharepoint_layouts_xss_vuln.nasl,
+	scripts/secpod_ms_sql_server_2000_activex_bof_vuln_900125.nasl,
+	scripts/secpod_ms_word_code_exec_vuln_900006.nasl,
+	scripts/secpod_mysql_dos_vuln_900221.nasl,
+	scripts/secpod_nms_dvd_burning_sdk_actvx_vuln_900132.nasl,
+	scripts/secpod_noticeware_email_svr_dos_vuln_900027.nasl,
+	scripts/secpod_novell_iprint_client_actvx_bof_vuln_dec10.nasl,
+	scripts/secpod_novell_iprint_client_actvx_mult_vuln_900040.nasl,
+	scripts/secpod_novell_iprint_client_mult_vuln_win.nasl,
+	scripts/secpod_ocs_inventory_ng_mult_sql_inj_vuln_may10.nasl,
+	scripts/secpod_openoffice_code_exec_vuln_lin_900043.nasl,
+	scripts/secpod_openoffice_code_exec_vuln_win_900042.nasl,
+	scripts/secpod_openoffice_mult_vuln_win.nasl,
+	scripts/secpod_openoffice_soffice_dir_traversal_vuln_win.nasl,
+	scripts/secpod_openvpn_client_code_exec_vuln_900024.nasl,
+	scripts/secpod_opera_mult_dos_vuln_win.nasl,
+	scripts/secpod_opera_mult_vuln_aug08_lin_900039.nasl,
+	scripts/secpod_opera_mult_vuln_aug08_win_900038.nasl,
+	scripts/secpod_opera_mult_vuln_july08_900001.nasl,
+	scripts/secpod_oracle_java_mult_code_exec_vuln_win.nasl,
+	scripts/secpod_oracle_java_mult_unspecified_vuln_win.nasl,
+	scripts/secpod_oracle_java_mult_unspecified_vuln_win01_jun11.nasl,
+	scripts/secpod_oracle_java_mult_unspecified_vuln_win_feb11.nasl,
+	scripts/secpod_personal_ftp_server_dos_vuln_900127.nasl,
+	scripts/secpod_php_bof_vuln_win.nasl,
+	scripts/secpod_php_format_string_vuln.nasl,
+	scripts/secpod_phpmyadmin_remote_command_exe_vuln_900130.nasl,
+	scripts/secpod_pidgin_intgr_overflow_lin_900009.nasl,
+	scripts/secpod_pidgin_intgr_overflow_win_900008.nasl,
+	scripts/secpod_proftpd_cmd_handling_sec_vuln_900133.nasl,
+	scripts/secpod_python_mult_vuln_lin_900106.nasl,
+	scripts/secpod_python_mult_vuln_win_900105.nasl,
+	scripts/secpod_realplayer_swf_bof_vuln_900015.nasl,
+	scripts/secpod_realvnc_dos_vuln_win_900019.nasl,
+	scripts/secpod_ruby_rails_sec_bypass_n_sql_inj_vuln.nasl,
+	scripts/secpod_simple_machines_forum_sec_bypass_vuln_900118.nasl,
+	scripts/secpod_softalk_mail_serv_imap_dos_vuln_900119.nasl,
+	scripts/secpod_sun_java_jdk_mult_vuln_win_apr10.nasl,
+	scripts/secpod_sun_java_jre_mult_vuln_lin_apr10.nasl,
+	scripts/secpod_syncback_freeware_bof_vuln.nasl,
+	scripts/secpod_titan_ftp_server_cmd_processing_dos_vuln_900160.nasl,
+	scripts/secpod_trellian_ftp_bof_vuln.nasl,
+	scripts/secpod_trendmicro_officescan_auth_bypass_vuln_900205.nasl,
+	scripts/secpod_trendmicro_officescan_bof_vuln_900016.nasl,
+	scripts/secpod_trendmicro_officescan_bof_vuln_sept08_900220.nasl,
+	scripts/secpod_ttwm_sql_inj_vuln.nasl,
+	scripts/secpod_ultra_office_activex_control_mult_vuln_900208.nasl,
+	scripts/secpod_vlc_media_player_bof_vuln_feb11_lin.nasl,
+	scripts/secpod_vlc_media_player_bof_vuln_feb11_win.nasl,
+	scripts/secpod_vlc_media_player_intgr_overflow_vuln_900112.nasl,
+	scripts/secpod_vmware_prdts_dos_vuln_win_apr10.nasl,
+	scripts/secpod_vmware_prdts_sec_bypass_vuln_lin_sep10.nasl,
+	scripts/secpod_vmware_prdts_sec_bypass_vuln_win_sep10.nasl,
+	scripts/secpod_win_nslookup_remote_code_exe_vuln_900108.nasl,
+	scripts/secpod_wingate_imap_dos_vuln_900201.nasl,
+	scripts/secpod_wireshark_mult_vuln_july08_lin_900011.nasl,
+	scripts/secpod_wireshark_mult_vuln_july08_win_900010.nasl,
+	scripts/secpod_wireshark_mult_vuln_sept08_lin_900213.nasl,
+	scripts/secpod_wireshark_mult_vuln_sept08_win_900212.nasl,
+	scripts/secpod_wordpress_mult_vuln_900219.nasl,
+	scripts/secpod_wsftp_client_format_string_vuln_900206.nasl,
+	scripts/secpod_xampp_mult_xss_vuln_900023.nasl,
+	scripts/secpod_xine-lib_mult_code_exe_dos_vuln_900111.nasl,
+	scripts/secpod_zonealarm_net_sec_suite_bof_vuln_900126.nasl,
+	scripts/sendmail_header.nasl,
+	scripts/servletExec_DoS.nasl,
+	scripts/sles10_MozillaFirefox.nasl,
+	scripts/sles10_MozillaFirefox0.nasl,
+	scripts/sles10_MozillaFirefox2.nasl,
+	scripts/sles10_MozillaFirefox4.nasl,
+	scripts/sles10_MozillaFirefox6.nasl,
+	scripts/sles10_MozillaFirefox7.nasl,
+	scripts/sles10_NetworkManager-0.nasl,
+	scripts/sles10_NetworkManager.nasl,
+	scripts/sles10_apache2-mod_php0.nasl,
+	scripts/sles10_apache21.nasl,
+	scripts/sles10_clamav.nasl,
+	scripts/sles10_compat-openssl02.nasl,
+	scripts/sles10_cups0.nasl,
+	scripts/sles10_cups3.nasl,
+	scripts/sles10_cups4.nasl,
+	scripts/sles10_epiphany.nasl,
+	scripts/sles10_ethereal.nasl,
+	scripts/sles10_ethereal0.nasl,
+	scripts/sles10_ethereal2.nasl,
+	scripts/sles10_gd.nasl,
+	scripts/sles10_gecko-sdk.nasl,
+	scripts/sles10_gecko-sdk0.nasl,
+	scripts/sles10_icu0.nasl,
+	scripts/sles10_ipsec-tools0.nasl,
+	scripts/sles10_jasper.nasl,
+	scripts/sles10_java-1_4_2-ibm.nasl,
+	scripts/sles10_java-1_4_2-ibm0.nasl,
+	scripts/sles10_java-1_4_2-ibm2.nasl,
+	scripts/sles10_java-1_4_2-ibm3.nasl,
+	scripts/sles10_java-1_4_2-sun.nasl,
+	scripts/sles10_java-1_4_2-sun0.nasl,
+	scripts/sles10_java-1_4_2-sun1.nasl,
+	scripts/sles10_java-1_5_0-ibm1.nasl,
+	scripts/sles10_java-1_5_0-ibm2.nasl,
+	scripts/sles10_java-1_5_0-ibm3.nasl,
+	scripts/sles10_java-1_5_0-ibm4.nasl,
+	scripts/sles10_kdegraphics3-pd.nasl,
+	scripts/sles10_kdegraphics3.nasl,
+	scripts/sles10_kernel1.nasl,
+	scripts/sles10_kernel2.nasl,
+	scripts/sles10_kernel3.nasl,
+	scripts/sles10_kernel4.nasl,
+	scripts/sles10_kernel6.nasl,
+	scripts/sles10_kernel7.nasl,
+	scripts/sles10_kernel8.nasl,
+	scripts/sles10_kernel9.nasl,
+	scripts/sles10_krb5.nasl,
+	scripts/sles10_libexif.nasl,
+	scripts/sles10_libvorbis.nasl,
+	scripts/sles10_libxml2.nasl,
+	scripts/sles10_mozilla-xulrunn.nasl,
+	scripts/sles10_mozilla-xulrunn0.nasl,
+	scripts/sles10_multipath-tools.nasl,
+	scripts/sles10_mysql0.nasl,
+	scripts/sles10_net-snmp1.nasl,
+	scripts/sles10_openssl3.nasl,
+	scripts/sles10_poppler.nasl,
+	scripts/sles10_postgresql0.nasl,
+	scripts/sles10_postgresql1.nasl,
+	scripts/sles10_python.nasl,
+	scripts/sles10_python0.nasl,
+	scripts/sles10_rsync.nasl,
+	scripts/sles10_xorg-x11-Xnest.nasl,
+	scripts/sles10_xpdf1.nasl,
+	scripts/sles11_MozillaFirefox1.nasl,
+	scripts/sles11_MozillaFirefox5.nasl,
+	scripts/sles11_MozillaFirefox7.nasl,
+	scripts/sles11_NetworkManager.nasl,
+	scripts/sles11_apache2.nasl,
+	scripts/sles11_bind0.nasl,
+	scripts/sles11_ext4dev-kmp-def.nasl,
+	scripts/sles11_ext4dev-kmp-def1.nasl,
+	scripts/sles11_ext4dev-kmp-def2.nasl,
+	scripts/sles11_ext4dev-kmp-def4.nasl,
+	scripts/sles11_java-1_4_2-ibm.nasl,
+	scripts/sles11_java-1_4_2-ibm0.nasl,
+	scripts/sles11_java-1_6_0-ibm.nasl,
+	scripts/sles11_java-1_6_0-ibm0.nasl,
+	scripts/sles11_java-1_6_0-ibm1.nasl,
+	scripts/sles11_krb5.nasl,
+	scripts/sles11_libopenssl0_9_82.nasl,
+	scripts/sles11_libpoppler4.nasl,
+	scripts/sles11_mozilla-xulrunn.nasl,
+	scripts/sles11_mozilla-xulrunn1.nasl,
+	scripts/sles11_postgresql0.nasl,
+	scripts/sles11_ruby.nasl,
+	scripts/sles11_wireshark.nasl,
+	scripts/sles11_wireshark1.nasl,
+	scripts/sles9p5009131.nasl,
+	scripts/sles9p5009158.nasl,
+	scripts/sles9p5009300.nasl,
+	scripts/sles9p5009301.nasl,
+	scripts/sles9p5009598.nasl,
+	scripts/sles9p5009713.nasl,
+	scripts/sles9p5010460.nasl,
+	scripts/sles9p5010771.nasl,
+	scripts/sles9p5010939.nasl,
+	scripts/sles9p5010966.nasl,
+	scripts/sles9p5010972.nasl,
+	scripts/sles9p5011006.nasl,
+	scripts/sles9p5011022.nasl,
+	scripts/sles9p5011171.nasl,
+	scripts/sles9p5011429.nasl,
+	scripts/sles9p5011436.nasl,
+	scripts/sles9p5011912.nasl,
+	scripts/sles9p5012004.nasl,
+	scripts/sles9p5012110.nasl,
+	scripts/sles9p5012115.nasl,
+	scripts/sles9p5012138.nasl,
+	scripts/sles9p5012225.nasl,
+	scripts/sles9p5012483.nasl,
+	scripts/sles9p5012650.nasl,
+	scripts/sles9p5012664.nasl,
+	scripts/sles9p5012702.nasl,
+	scripts/sles9p5012976.nasl,
+	scripts/sles9p5013177.nasl,
+	scripts/sles9p5013194.nasl,
+	scripts/sles9p5013279.nasl,
+	scripts/sles9p5013454.nasl,
+	scripts/sles9p5013481.nasl,
+	scripts/sles9p5014050.nasl,
+	scripts/sles9p5014064.nasl,
+	scripts/sles9p5014078.nasl,
+	scripts/sles9p5014847.nasl,
+	scripts/sles9p5014967.nasl,
+	scripts/sles9p5015546.nasl,
+	scripts/sles9p5015565.nasl,
+	scripts/sles9p5015608.nasl,
+	scripts/sles9p5015662.nasl,
+	scripts/sles9p5015723.nasl,
+	scripts/sles9p5015871.nasl,
+	scripts/sles9p5015996.nasl,
+	scripts/sles9p5016282.nasl,
+	scripts/sles9p5016317.nasl,
+	scripts/sles9p5016546.nasl,
+	scripts/sles9p5016608.nasl,
+	scripts/sles9p5016846.nasl,
+	scripts/sles9p5017209.nasl,
+	scripts/sles9p5017544.nasl,
+	scripts/sles9p5017742.nasl,
+	scripts/sles9p5018289.nasl,
+	scripts/sles9p5018527.nasl,
+	scripts/sles9p5018586.nasl,
+	scripts/sles9p5018750.nasl,
+	scripts/sles9p5018824.nasl,
+	scripts/sles9p5019053.nasl,
+	scripts/sles9p5019327.nasl,
+	scripts/sles9p5019431.nasl,
+	scripts/sles9p5019505.nasl,
+	scripts/sles9p5019559.nasl,
+	scripts/sles9p5019905.nasl,
+	scripts/sles9p5019909.nasl,
+	scripts/sles9p5019924.nasl,
+	scripts/sles9p5020045.nasl,
+	scripts/sles9p5020427.nasl,
+	scripts/sles9p5020521.nasl,
+	scripts/sles9p5020541.nasl,
+	scripts/sles9p5020714.nasl,
+	scripts/sles9p5020865.nasl,
+	scripts/sles9p5020876.nasl,
+	scripts/sles9p5020914.nasl,
+	scripts/sles9p5021116.nasl,
+	scripts/sles9p5021388.nasl,
+	scripts/sles9p5021652.nasl,
+	scripts/sles9p5021746.nasl,
+	scripts/sles9p5021793.nasl,
+	scripts/sles9p5021809.nasl,
+	scripts/sles9p5021818.nasl,
+	scripts/sles9p5021882.nasl,
+	scripts/sles9p5021982.nasl,
+	scripts/sles9p5022953.nasl,
+	scripts/sles9p5023036.nasl,
+	scripts/sles9p5023078.nasl,
+	scripts/sles9p5023300.nasl,
+	scripts/sles9p5023460.nasl,
+	scripts/sles9p5023603.nasl,
+	scripts/sles9p5026120.nasl,
+	scripts/sles9p5027942.nasl,
+	scripts/sles9p5028577.nasl,
+	scripts/sles9p5031860.nasl,
+	scripts/sles9p5032900.nasl,
+	scripts/sles9p5033480.nasl,
+	scripts/sles9p5033740.nasl,
+	scripts/sles9p5033780.nasl,
+	scripts/sles9p5034680.nasl,
+	scripts/sles9p5035180.nasl,
+	scripts/sles9p5035420.nasl,
+	scripts/sles9p5035440.nasl,
+	scripts/sles9p5036146.nasl,
+	scripts/sles9p5036560.nasl,
+	scripts/sles9p5036604.nasl,
+	scripts/sles9p5037740.nasl,
+	scripts/sles9p5038720.nasl,
+	scripts/sles9p5039274.nasl,
+	scripts/sles9p5039700.nasl,
+	scripts/sles9p5040200.nasl,
+	scripts/sles9p5040565.nasl,
+	scripts/sles9p5040780.nasl,
+	scripts/sles9p5040940.nasl,
+	scripts/sles9p5041763.nasl,
+	scripts/sles9p5046186.nasl,
+	scripts/sles9p5046302.nasl,
+	scripts/sles9p5046860.nasl,
+	scripts/sles9p5047860.nasl,
+	scripts/sles9p5050060.nasl,
+	scripts/sles9p5050540.nasl,
+	scripts/sles9p5051763.nasl,
+	scripts/sles9p5053737.nasl,
+	scripts/sles9p5055991.nasl,
+	scripts/sles9p5059340.nasl,
+	scripts/sles9p5059500.nasl,
+	scripts/sles9p5059920.nasl,
+	scripts/sles9p5060942.nasl,
+	scripts/sles9p5062456.nasl,
+	scripts/sles9p5062661.nasl,
+	scripts/smb_nt_ms02-005.nasl,
+	scripts/smb_nt_ms02-006.nasl,
+	scripts/smb_reg_service_pack_XP.nasl,
+	scripts/smbcl_flash_player_CB-A08-0059.nasl,
+	scripts/smtp_relay2.nasl,
+	scripts/spip_sql_injection.nasl,
+	scripts/squirrelmail_144.nasl,
+	scripts/squirremail_cross_site_scripting.nasl,
+	scripts/sugarcrm_remote_file_inclusion.nasl,
+	scripts/suse_sa_2009_001.nasl,
+	scripts/suse_sa_2009_003.nasl,
+	scripts/suse_sa_2009_004.nasl,
+	scripts/suse_sa_2009_010.nasl,
+	scripts/suse_sa_2009_012.nasl,
+	scripts/suse_sa_2009_013.nasl,
+	scripts/suse_sa_2009_014.nasl,
+	scripts/suse_sa_2009_016.nasl,
+	scripts/suse_sa_2009_019.nasl,
+	scripts/suse_sa_2009_021.nasl,
+	scripts/suse_sa_2009_023.nasl,
+	scripts/suse_sa_2009_024.nasl,
+	scripts/suse_sa_2009_030.nasl,
+	scripts/suse_sa_2009_031.nasl,
+	scripts/suse_sa_2009_032.nasl,
+	scripts/suse_sa_2009_039.nasl,
+	scripts/suse_sa_2009_041.nasl,
+	scripts/suse_sa_2009_043.nasl,
+	scripts/suse_sa_2009_048.nasl,
+	scripts/suse_sa_2009_049.nasl,
+	scripts/suse_sa_2009_050.nasl,
+	scripts/suse_sa_2009_057.nasl,
+	scripts/suse_sa_2009_058.nasl,
+	scripts/suse_sa_2009_059.nasl,
+	scripts/suse_sa_2009_060.nasl,
+	scripts/suse_sr_2009_001.nasl,
+	scripts/suse_sr_2009_001a.nasl,
+	scripts/suse_sr_2009_001b.nasl,
+	scripts/suse_sr_2009_002.nasl,
+	scripts/suse_sr_2009_003.nasl,
+	scripts/suse_sr_2009_004.nasl,
+	scripts/suse_sr_2009_006.nasl,
+	scripts/suse_sr_2009_007.nasl,
+	scripts/suse_sr_2009_008.nasl,
+	scripts/suse_sr_2009_009.nasl,
+	scripts/suse_sr_2009_010.nasl,
+	scripts/suse_sr_2009_011.nasl,
+	scripts/suse_sr_2009_012.nasl,
+	scripts/suse_sr_2009_013.nasl,
+	scripts/suse_sr_2009_014.nasl,
+	scripts/suse_sr_2009_015.nasl,
+	scripts/suse_sr_2009_016.nasl,
+	scripts/suse_sr_2009_017.nasl,
+	scripts/suse_sr_2009_018.nasl,
+	scripts/sympa_new_list_xss.nasl:
+	Updated cvss scoring information, risk values in tags and body
+
 2011-09-04 Thomas Reinke <reinke at securityspace.com>
 
 	* scripts/gb_JBoss_enterprise_aplication_server_45148.nasl,

Modified: trunk/openvas-plugins/scripts/secpod_adobe_prdts_mult_vuln_apr10_lin.nasl
===================================================================
--- trunk/openvas-plugins/scripts/secpod_adobe_prdts_mult_vuln_apr10_lin.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/secpod_adobe_prdts_mult_vuln_apr10_lin.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -33,8 +33,8 @@
                 "CVE-2010-0198", "CVE-2010-0199", "CVE-2010-0201", "CVE-2010-0202",
                 "CVE-2010-0203", "CVE-2010-0204", "CVE-2010-1241");
   script_bugtraq_id(39329);
-  script_tag(name:"cvss_base", value:"9.3");
-  script_tag(name:"risk_factor", value:"Critical");
+  script_tag(name:"cvss_base", value:"4.3");
+  script_tag(name:"risk_factor", value:"Medium");
   script_name("Adobe Acrobat and Reader PDF Handling Multiple Vulnerabilities (Linux)");
   desc = "
   Overview: This host is installed with Adobe Reader and is prone to

Modified: trunk/openvas-plugins/scripts/secpod_adobe_prdts_mult_vuln_apr10_win.nasl
===================================================================
--- trunk/openvas-plugins/scripts/secpod_adobe_prdts_mult_vuln_apr10_win.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/secpod_adobe_prdts_mult_vuln_apr10_win.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -33,8 +33,8 @@
                 "CVE-2010-0198", "CVE-2010-0199", "CVE-2010-0201", "CVE-2010-0202",
                 "CVE-2010-0203", "CVE-2010-0204", "CVE-2010-1241");
   script_bugtraq_id(39329);
-  script_tag(name:"cvss_base", value:"9.3");
-  script_tag(name:"risk_factor", value:"Critical");
+  script_tag(name:"cvss_base", value:"4.3");
+  script_tag(name:"risk_factor", value:"Medium");
   script_name("Adobe Acrobat and Reader PDF Handling Multiple Vulnerabilities (Windows)");
   desc = "
   Overview: This host is installed with Adobe Reader/Acrobat and is prone to

Modified: trunk/openvas-plugins/scripts/secpod_adobe_prdts_mult_vuln_jun10_lin.nasl
===================================================================
--- trunk/openvas-plugins/scripts/secpod_adobe_prdts_mult_vuln_jun10_lin.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/secpod_adobe_prdts_mult_vuln_jun10_lin.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -37,8 +37,8 @@
                 "CVE-2010-2182", "CVE-2010-2183", "CVE-2010-2184", "CVE-2010-2185",
                 "CVE-2010-2186", "CVE-2010-2187", "CVE-2010-2188", "CVE-2010-2189");
   script_bugtraq_id(40759);
-  script_tag(name:"cvss_base", value:"9.3");
-  script_tag(name:"risk_factor", value:"Critical");
+  script_tag(name:"cvss_base", value:"4.3");
+  script_tag(name:"risk_factor", value:"Medium");
   script_name("Adobe Flash Player/Air Multiple Vulnerabilities - June10 (Linux)");
   desc = "
   Overview: This host is installed with Adobe Flash Player/Air and is prone to

Modified: trunk/openvas-plugins/scripts/secpod_adobe_prdts_mult_vuln_jun10_win.nasl
===================================================================
--- trunk/openvas-plugins/scripts/secpod_adobe_prdts_mult_vuln_jun10_win.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/secpod_adobe_prdts_mult_vuln_jun10_win.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -37,8 +37,8 @@
                 "CVE-2010-2183", "CVE-2010-2184", "CVE-2010-2185", "CVE-2010-2186",
                 "CVE-2010-2187", "CVE-2010-2188", "CVE-2010-2189");
   script_bugtraq_id(40759);
-  script_tag(name:"cvss_base", value:"9.3");
-  script_tag(name:"risk_factor", value:"Critical");
+  script_tag(name:"cvss_base", value:"4.3");
+  script_tag(name:"risk_factor", value:"Medium");
   script_name("Adobe Flash Player/Air Multiple Vulnerabilities - June10 (Win)");
   desc = "
   Overview: This host is installed with Adobe Flash Player/Air and is prone to

Modified: trunk/openvas-plugins/scripts/secpod_adobe_presenter_xss_vuln_900110.nasl
===================================================================
--- trunk/openvas-plugins/scripts/secpod_adobe_presenter_xss_vuln_900110.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/secpod_adobe_presenter_xss_vuln_900110.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -31,8 +31,8 @@
  script_cve_id("CVE-2008-3515","CVE-2008-3516");
  script_copyright("Copyright (C) 2008 SecPod");
  script_version("$Revision: 1.1 $");
- script_tag(name:"cvss_base", value:"5.8");
- script_tag(name:"risk_factor", value:"High");
+ script_tag(name:"cvss_base", value:"4.3");
+ script_tag(name:"risk_factor", value:"Medium");
  script_category(ACT_GATHER_INFO);
  script_family("Web application abuses");			
  script_name("Adobe Presenter viewer.swf and loadflash.js XSS Vulnerability");

Modified: trunk/openvas-plugins/scripts/secpod_anzio_web_print_obj_bof_vuln_900115.nasl
===================================================================
--- trunk/openvas-plugins/scripts/secpod_anzio_web_print_obj_bof_vuln_900115.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/secpod_anzio_web_print_obj_bof_vuln_900115.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -31,8 +31,8 @@
  script_cve_id("CVE-2008-3480");
  script_copyright("Copyright (C) 2008 SecPod");
  script_version("Revision: 1.1 ");
- script_tag(name:"cvss_base", value:"6.8");
- script_tag(name:"risk_factor", value:"High");
+ script_tag(name:"cvss_base", value:"9.3");
+ script_tag(name:"risk_factor", value:"Critical");
  script_category(ACT_GATHER_INFO);
  script_family("Buffer overflow");
  script_name("Anzio Web Print Object ActiveX Control Remote BOF Vulnerability");
@@ -65,7 +65,7 @@
  CVSS Score :
         CVSS Base Score     : 6.8 (AV:N/AC:M/Au:NR/C:P/I:P/A:P)
         CVSS Temporal Score : 5.3
- Risk factor : High"; 
+ Risk factor : Critical"; 
 
  script_description(desc);
  script_dependencies("secpod_reg_enum.nasl");

Modified: trunk/openvas-plugins/scripts/secpod_apache_mod_proxy_ftp_xss_vuln_900107.nasl
===================================================================
--- trunk/openvas-plugins/scripts/secpod_apache_mod_proxy_ftp_xss_vuln_900107.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/secpod_apache_mod_proxy_ftp_xss_vuln_900107.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -31,8 +31,8 @@
  script_cve_id("CVE-2008-2939");
  script_copyright("Copyright (C) 2008 SecPod");
  script_version("$Revision: 1.1 $");
- script_tag(name:"cvss_base", value:"5.8");
- script_tag(name:"risk_factor", value:"High");
+ script_tag(name:"cvss_base", value:"4.3");
+ script_tag(name:"risk_factor", value:"Medium");
  script_category(ACT_GATHER_INFO);
  script_family("Web application abuses");
  script_name("Apache mod_proxy_ftp Wildcard Characters XSS Vulnerability");

Modified: trunk/openvas-plugins/scripts/secpod_apache_tomcat_sec_bypass_vuln.nasl
===================================================================
--- trunk/openvas-plugins/scripts/secpod_apache_tomcat_sec_bypass_vuln.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/secpod_apache_tomcat_sec_bypass_vuln.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -30,7 +30,7 @@
   script_version("$Revision$: 1.0");
   script_cve_id("CVE-2010-1157");
   script_bugtraq_id(39635);
-  script_tag(name:"cvss_base", value:"5.0");
+  script_tag(name:"cvss_base", value:"2.6");
   script_tag(name:"risk_factor", value:"Medium");
   script_name("Apache Tomcat Security bypass vulnerability");
   desc = "

Modified: trunk/openvas-plugins/scripts/secpod_apache_tomcat_xss_n_bypass_vuln_900021.nasl
===================================================================
--- trunk/openvas-plugins/scripts/secpod_apache_tomcat_xss_n_bypass_vuln_900021.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/secpod_apache_tomcat_xss_n_bypass_vuln_900021.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -30,8 +30,8 @@
  script_cve_id("CVE-2008-1232", "CVE-2008-2370");
  script_copyright("Copyright (C) 2008 SecPod");
  script_version("$Revision: 1.1 $");
-  script_tag(name:"cvss_base", value:"5.8");
-  script_tag(name:"risk_factor", value:"High");
+  script_tag(name:"cvss_base", value:"4.3");
+  script_tag(name:"risk_factor", value:"Medium");
  script_category(ACT_GATHER_INFO);
  script_family("Web application abuses");
  script_name("Apache Tomcat Cross-Site Scripting and Security Bypass Vulnerabilities");

Modified: trunk/openvas-plugins/scripts/secpod_apple_itunes_prv_esc_vuln_900122.nasl
===================================================================
--- trunk/openvas-plugins/scripts/secpod_apple_itunes_prv_esc_vuln_900122.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/secpod_apple_itunes_prv_esc_vuln_900122.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -31,7 +31,7 @@
  script_cve_id("CVE-2008-3636");
  script_copyright("Copyright (C) 2008 SecPod");
  script_version("Revision: 1.1 ");
- script_tag(name:"cvss_base", value:"6.6");
+ script_tag(name:"cvss_base", value:"7.2");
  script_tag(name:"risk_factor", value:"High");
  script_category(ACT_GATHER_INFO);
  script_family("Denial of Service");
@@ -63,7 +63,7 @@
  CVSS Score :
         CVSS Base Score     : 6.6 (AV:L/AC:M/Au:SI/C:C/I:C/A:C)
         CVSS Temporal Score : 4.9
- Risk factor : Medium";
+ Risk factor : High";
 
  script_description(desc);
  script_dependencies("secpod_reg_enum.nasl",

Modified: trunk/openvas-plugins/scripts/secpod_apple_quicktime_mult_vuln_900121.nasl
===================================================================
--- trunk/openvas-plugins/scripts/secpod_apple_quicktime_mult_vuln_900121.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/secpod_apple_quicktime_mult_vuln_900121.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -33,7 +33,7 @@
                "CVE-2008-3629");
  script_copyright("Copyright (C) 2008 SecPod");
  script_version("Revision: 1.1 ");
- script_tag(name:"cvss_base", value:"8.3");
+ script_tag(name:"cvss_base", value:"9.3");
  script_tag(name:"risk_factor", value:"Critical");
  script_category(ACT_GATHER_INFO);
  script_family("General");
@@ -79,7 +79,7 @@
  CVSS Score :
         CVSS Base Score     : 8.3 (AV:N/AC:M/Au:NR/C:P/I:P/A:C)
         CVSS Temporal Score : 6.1
- Risk factor : High"; 
+ Risk factor : Critical"; 
 
  script_description(desc);
  script_dependencies("secpod_reg_enum.nasl",

Modified: trunk/openvas-plugins/scripts/secpod_apple_safari_mult_vuln.nasl
===================================================================
--- trunk/openvas-plugins/scripts/secpod_apple_safari_mult_vuln.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/secpod_apple_safari_mult_vuln.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -33,8 +33,8 @@
   script_version("$Revision$:1.1");
   script_cve_id("CVE-2010-1029", "CVE-2010-1939", "CVE-2010-1939");
   script_bugtraq_id(38398, 39990);
-  script_tag(name:"cvss_base", value:"7.6");
-  script_tag(name:"risk_factor", value:"High");
+  script_tag(name:"cvss_base", value:"5.0");
+  script_tag(name:"risk_factor", value:"Medium");
   script_name("Apple Saferi multiple vulnerabilities (Mar10)");
   desc = "
   Overview: The host is running Apple Saferi and is prone to multiple

Modified: trunk/openvas-plugins/scripts/secpod_apple_safari_mult_vuln_july08_900002.nasl
===================================================================
--- trunk/openvas-plugins/scripts/secpod_apple_safari_mult_vuln_july08_900002.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/secpod_apple_safari_mult_vuln_july08_900002.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -31,8 +31,8 @@
  script_cve_id("CVE-2008-1573", "CVE-2008-2306", "CVE-2008-2307");
  script_copyright("Copyright 2008 SecPod");
  script_version("Revision: 1.2 ");
- script_tag(name:"cvss_base", value:"8.3");
- script_tag(name:"risk_factor", value:"Critical");
+ script_tag(name:"cvss_base", value:"7.1");
+ script_tag(name:"risk_factor", value:"High");
  script_category(ACT_GATHER_INFO);
  script_family("General");
  script_name("Apple Safari for Windows Multiple Vulnerabilities July-08");

Modified: trunk/openvas-plugins/scripts/secpod_atlassian_jira_mult_xss_n_priv_esc_vuln.nasl
===================================================================
--- trunk/openvas-plugins/scripts/secpod_atlassian_jira_mult_xss_n_priv_esc_vuln.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/secpod_atlassian_jira_mult_xss_n_priv_esc_vuln.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -30,8 +30,8 @@
   script_version("$Revision$: 1.0");
   script_bugtraq_id(39485);
   script_cve_id("CVE-2010-1164", "CVE-2010-1165");
-  script_tag(name:"cvss_base", value:"6.5");
-  script_tag(name:"risk_factor", value:"High");
+  script_tag(name:"cvss_base", value:"4.3");
+  script_tag(name:"risk_factor", value:"Medium");
   script_name("Atlassian JIRA Privilege Escalation and Multiple Cross Site Scripting Vulnerabilities");
   desc = "
   Overview: This host is running Atlassian JIRA and is prone to privilege

Modified: trunk/openvas-plugins/scripts/secpod_avg_antivirus_dos_vuln_900017.nasl
===================================================================
--- trunk/openvas-plugins/scripts/secpod_avg_antivirus_dos_vuln_900017.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/secpod_avg_antivirus_dos_vuln_900017.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -31,8 +31,8 @@
  script_bugtraq_id(30417);
  script_copyright("Copyright (C) 2008 SecPod");
  script_version("$Revision: 1.1 $");
- script_tag(name:"cvss_base", value:"7.1");
- script_tag(name:"risk_factor", value:"High");
+ script_tag(name:"cvss_base", value:"5.0");
+ script_tag(name:"risk_factor", value:"Medium");
  script_category(ACT_GATHER_INFO);
  script_family("Denial of Service");
  script_name("AVG Anti-Virus UPX Processing Denial of Service Vulnerability");
@@ -62,7 +62,7 @@
  CVSS Score :
         CVSS Base Score	    : 7.1 (AV:N/AC:M/Au:NR/C:N/I:N/A:C)
         CVSS Temporal Score : 5.3
- Risk factor : High";
+ Risk factor : Medium";
  script_description(desc);
  script_dependencies("secpod_reg_enum.nasl");
  script_require_keys("SMB/WindowsVersion");

Modified: trunk/openvas-plugins/scripts/secpod_blue_coat_k9_web_prot_bof_vuln_900103.nasl
===================================================================
--- trunk/openvas-plugins/scripts/secpod_blue_coat_k9_web_prot_bof_vuln_900103.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/secpod_blue_coat_k9_web_prot_bof_vuln_900103.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -31,8 +31,8 @@
  script_cve_id("CVE-2007-2752");
  script_copyright("Copyright (C) 2008 SecPod");
  script_version("$Revision: 1.1 $");
- script_tag(name:"cvss_base", value:"9.0");
- script_tag(name:"risk_factor", value:"Critical");
+ script_tag(name:"cvss_base", value:"6.4");
+ script_tag(name:"risk_factor", value:"High");
  script_category(ACT_GATHER_INFO);
  script_family("Buffer overflow");
  script_name("Blue Coat K9 Web Protection Multiple Buffer Overflow Vulnerabilities");

Modified: trunk/openvas-plugins/scripts/secpod_brekeke_pbx_csrf_vuln.nasl
===================================================================
--- trunk/openvas-plugins/scripts/secpod_brekeke_pbx_csrf_vuln.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/secpod_brekeke_pbx_csrf_vuln.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -29,8 +29,8 @@
   script_id(902066);
   script_version("$Revision$: 1.0");
   script_cve_id("CVE-2010-2114");
-  script_tag(name:"cvss_base", value:"6.0");
-  script_tag(name:"risk_factor", value:"High");
+  script_tag(name:"cvss_base", value:"2.6");
+  script_tag(name:"risk_factor", value:"Medium");
   script_name("Brekeke PBX Cross-Site Request Forgery Vulnerability");
   desc = "
   Overview: This host is running Brekeke PBX and is prone to Cross-Site Request

Modified: trunk/openvas-plugins/scripts/secpod_bugtracker_dotnet_xss_n_sql_injection_vuln.nasl
===================================================================
--- trunk/openvas-plugins/scripts/secpod_bugtracker_dotnet_xss_n_sql_injection_vuln.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/secpod_bugtracker_dotnet_xss_n_sql_injection_vuln.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -30,8 +30,8 @@
   script_version("$Revision: 1.0 $");
   script_bugtraq_id(45121);
   script_cve_id("CVE-2010-3266", "CVE-2010-3267");
-  script_tag(name:"cvss_base", value:"6.5");
-  script_tag(name:"risk_factor", value:"High");
+  script_tag(name:"cvss_base", value:"3.5");
+  script_tag(name:"risk_factor", value:"Medium");
   script_name("BugTracker.NET Cross-Site Scripting and SQL Injection Vulnerabilities");
   desc = "
   Overview: The host is running BugTracker.NET and is prone to cross-site

Modified: trunk/openvas-plugins/scripts/secpod_ca_prdts_mult_vuln_900202.nasl
===================================================================
--- trunk/openvas-plugins/scripts/secpod_ca_prdts_mult_vuln_900202.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/secpod_ca_prdts_mult_vuln_900202.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -31,8 +31,8 @@
  script_bugtraq_id(30651);
  script_copyright("Copyright (C) 2008 SecPod");
  script_version("Revision: 1.1 ");
- script_tag(name:"cvss_base", value:"8.3");
- script_tag(name:"risk_factor", value:"Critical");
+ script_tag(name:"cvss_base", value:"7.2");
+ script_tag(name:"risk_factor", value:"High");
  script_category(ACT_GATHER_INFO);
  script_family("Denial of Service");
  script_name("CA kmxfw.sys Code Execution and DoS Vulnerabilities");

Modified: trunk/openvas-plugins/scripts/secpod_clamav_invalid_mem_access_dos_vuln_900117.nasl
===================================================================
--- trunk/openvas-plugins/scripts/secpod_clamav_invalid_mem_access_dos_vuln_900117.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/secpod_clamav_invalid_mem_access_dos_vuln_900117.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -31,8 +31,8 @@
  script_cve_id("CVE-2008-1389");
  script_copyright("Copyright (C) 2008 SecPod");
  script_version("Revision: 1.2 ");
- script_tag(name:"cvss_base", value:"7.1");
- script_tag(name:"risk_factor", value:"High");
+ script_tag(name:"cvss_base", value:"5.0");
+ script_tag(name:"risk_factor", value:"Medium");
  script_category(ACT_GATHER_INFO);
  script_family("Denial of Service");
  script_name("ClamAV Invalid Memory Access Denial Of Service Vulnerability");
@@ -64,7 +64,7 @@
  CVSS Score :
         CVSS Base Score     : 7.1 (AV:N/AC:M/Au:NR/C:N/I:N/A:C)
         CVSS Temporal Score : 5.3
- Risk factor : High";
+ Risk factor : Medium";
 
  script_description(desc);
  script_dependencies("gather-package-list.nasl");

Modified: trunk/openvas-plugins/scripts/secpod_clamav_mult_dos_vuln_win.nasl
===================================================================
--- trunk/openvas-plugins/scripts/secpod_clamav_mult_dos_vuln_win.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/secpod_clamav_mult_dos_vuln_win.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -30,8 +30,8 @@
   script_version("$Revision$: 1.0");
   script_cve_id("CVE-2010-1639", "CVE-2010-1640");
   script_bugtraq_id(40318, 40317);
-  script_tag(name:"cvss_base", value:"9.0");
-  script_tag(name:"risk_factor", value:"Critical");
+  script_tag(name:"cvss_base", value:"4.3");
+  script_tag(name:"risk_factor", value:"Medium");
   script_name("ClamAV 'cli_pdf()' and 'cli_scanicon()' Denial of Service Vulnerabilities (Win");
   desc = "
   Overview: This host has ClamAV installed, and is prone to multiple Denial of Service

Modified: trunk/openvas-plugins/scripts/secpod_datatrack_system_mult_vuln.nasl
===================================================================
--- trunk/openvas-plugins/scripts/secpod_datatrack_system_mult_vuln.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/secpod_datatrack_system_mult_vuln.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -30,7 +30,7 @@
   script_version("$Revision$: 1.0");
   script_cve_id("CVE-2010-2043", "CVE-2010-2078", "CVE-2010-2079");
   script_bugtraq_id(40249);
-  script_tag(name:"cvss_base", value:"5.0");
+  script_tag(name:"cvss_base", value:"4.3");
   script_tag(name:"risk_factor", value:"Medium");
   script_name("DataTrack System Multiple Vulnerabilities");
   desc = "

Modified: trunk/openvas-plugins/scripts/secpod_dotproject_mult_xss_n_sql_inj_vuln_900116.nasl
===================================================================
--- trunk/openvas-plugins/scripts/secpod_dotproject_mult_xss_n_sql_inj_vuln_900116.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/secpod_dotproject_mult_xss_n_sql_inj_vuln_900116.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -30,8 +30,8 @@
  script_bugtraq_id(30924);
  script_copyright("Copyright (C) 2008 SecPod");
  script_version("Revision: 1.1 ");
- script_tag(name:"cvss_base", value:"7.1");
- script_tag(name:"risk_factor", value:"High");
+ script_tag(name:"cvss_base", value:"4.3");
+ script_tag(name:"risk_factor", value:"Medium");
  script_category(ACT_GATHER_INFO);
  script_family("Web application abuses");
  script_name("dotProject Multiple XSS and SQL Injection Vulnerabilities");
@@ -67,7 +67,7 @@
  CVSS Score :
         CVSS Base Score     : 7.1 (AV:N/AC:M/Au:NR/C:C/I:N/A:N)
         CVSS Temporal Score : 6.4
- Risk factor : High";
+ Risk factor : Medium";
 
  script_description(desc);
  script_dependencies("http_version.nasl");

Modified: trunk/openvas-plugins/scripts/secpod_eset_smart_sec_local_prv_esc_vuln_900114.nasl
===================================================================
--- trunk/openvas-plugins/scripts/secpod_eset_smart_sec_local_prv_esc_vuln_900114.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/secpod_eset_smart_sec_local_prv_esc_vuln_900114.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -31,7 +31,7 @@
  script_bugtraq_id(30719);
  script_copyright("Copyright (C) 2008 SecPod");
  script_version("Revision: 1.1 ");
- script_tag(name:"cvss_base", value:"6.6");
+ script_tag(name:"cvss_base", value:"7.2");
  script_tag(name:"risk_factor", value:"High");
  script_category(ACT_GATHER_INFO);
  script_family("Privilege escalation");

Modified: trunk/openvas-plugins/scripts/secpod_event_horizon_xss_n_sql_inj_vuln.nasl
===================================================================
--- trunk/openvas-plugins/scripts/secpod_event_horizon_xss_n_sql_inj_vuln.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/secpod_event_horizon_xss_n_sql_inj_vuln.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -30,8 +30,8 @@
   script_version("$Revision$: 1.0");
   script_bugtraq_id(41580);
   script_cve_id("CVE-2010-2854", "CVE-2010-2855");
-  script_tag(name:"cvss_base", value:"6.8");
-  script_tag(name:"risk_factor", value:"High");
+  script_tag(name:"cvss_base", value:"2.6");
+  script_tag(name:"risk_factor", value:"Medium");
   script_name("Event Horizon 'modfile.php' Cross Site Scripting and SQL Injection Vulnerabilities");
   desc = "
   Overview: This host is running Event Horizon and is prone cross site

Modified: trunk/openvas-plugins/scripts/secpod_f-prot_av_mult_vuln_900018.nasl
===================================================================
--- trunk/openvas-plugins/scripts/secpod_f-prot_av_mult_vuln_900018.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/secpod_f-prot_av_mult_vuln_900018.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -31,8 +31,8 @@
  script_bugtraq_id(30253, 30258);
  script_copyright("Copyright (C) 2008 SecPod");
  script_version("$Revision: 1.1 $");
- script_tag(name:"cvss_base", value:"7.1");
- script_tag(name:"risk_factor", value:"High");
+ script_tag(name:"cvss_base", value:"4.3");
+ script_tag(name:"risk_factor", value:"Medium");
  script_category(ACT_GATHER_INFO);
  script_family("Denial of Service");
  script_name("F-PROT Antivirus Multiple Vulnerabilities");
@@ -65,7 +65,7 @@
  CVSS Score :
         CVSS Base Score	    : 7.1 (AV:N/AC:M/Au:NR/C:N/I:N/A:C)
         CVSS Temporal Score : 5.3
- Risk factor : High";
+ Risk factor : Medium";
  script_description(desc);
  script_dependencies("secpod_reg_enum.nasl");
  script_require_keys("SMB/WindowsVersion");

Modified: trunk/openvas-plugins/scripts/secpod_firefox_javascript_sec_bypass_vuln_win.nasl
===================================================================
--- trunk/openvas-plugins/scripts/secpod_firefox_javascript_sec_bypass_vuln_win.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/secpod_firefox_javascript_sec_bypass_vuln_win.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -29,8 +29,8 @@
   script_id(902152);
   script_version("$Revision$: 1.0");
   script_cve_id("CVE-2010-1125");
-  script_tag(name:"cvss_base", value:"4.3");
-  script_tag(name:"risk_factor", value:"Medium");
+  script_tag(name:"cvss_base", value:"5.8");
+  script_tag(name:"risk_factor", value:"High");
   script_name("Mozilla Firefox 'JavaScript' Security Bypass Vulnerability");
   desc = "
   Overview: The host is installed with firefox browser and is prone to security

Modified: trunk/openvas-plugins/scripts/secpod_firefox_mult_dos_vuln_win.nasl
===================================================================
--- trunk/openvas-plugins/scripts/secpod_firefox_mult_dos_vuln_win.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/secpod_firefox_mult_dos_vuln_win.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -29,7 +29,7 @@
   script_id(902186);
   script_version("$Revision$: 1.0");
   script_cve_id("CVE-2010-1986", "CVE-2010-1987", "CVE-2010-1988");
-  script_tag(name:"cvss_base", value:"4.3");
+  script_tag(name:"cvss_base", value:"5.0");
   script_tag(name:"risk_factor", value:"Medium");
   script_name("Mozilla Firefox Multiple Denial Of Service vulnerabilities (Windows)");
   desc = "

Modified: trunk/openvas-plugins/scripts/secpod_firefox_mult_vuln_mar10_lin.nasl
===================================================================
--- trunk/openvas-plugins/scripts/secpod_firefox_mult_vuln_mar10_lin.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/secpod_firefox_mult_vuln_mar10_lin.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -30,8 +30,8 @@
   script_version("$Revision$: 1.0");
   script_cve_id("CVE-2010-0164", "CVE-2010-0165", "CVE-2010-0170", "CVE-2010-0172");
   script_bugtraq_id(38918);
-  script_tag(name:"cvss_base", value:"4.3");
-  script_tag(name:"risk_factor", value:"Medium");
+  script_tag(name:"cvss_base", value:"9.3");
+  script_tag(name:"risk_factor", value:"Critical");
   script_name("Firefox Multiple Vulnerabilities Mar-10 (Linux)");
   desc = "
   Overview: The host is installed with firefox browser and is prone to multiple

Modified: trunk/openvas-plugins/scripts/secpod_firefox_mult_vuln_mar10_win.nasl
===================================================================
--- trunk/openvas-plugins/scripts/secpod_firefox_mult_vuln_mar10_win.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/secpod_firefox_mult_vuln_mar10_win.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -30,8 +30,8 @@
   script_version("$Revision$: 1.0");
   script_cve_id("CVE-2010-0164", "CVE-2010-0165", "CVE-2010-0170", "CVE-2010-0172");
   script_bugtraq_id(38918);
-  script_tag(name:"cvss_base", value:"4.3");
-  script_tag(name:"risk_factor", value:"Medium");
+  script_tag(name:"cvss_base", value:"9.3");
+  script_tag(name:"risk_factor", value:"Critical");
   script_name("Firefox Multiple Vulnerabilities Mar-10 (Win)");
   desc = "
   Overview: The host is installed with Firefox browser and is prone to multiple

Modified: trunk/openvas-plugins/scripts/secpod_firefox_unspecified_vuln.nasl
===================================================================
--- trunk/openvas-plugins/scripts/secpod_firefox_unspecified_vuln.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/secpod_firefox_unspecified_vuln.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -29,8 +29,8 @@
   script_id(902027);
   script_version("$Revision$:1.0");
   script_cve_id("CVE-2010-1028");
-  script_tag(name:"cvss_base", value:"7.2");
-  script_tag(name:"risk_factor", value:"High");
+  script_tag(name:"cvss_base", value:"9.3");
+  script_tag(name:"risk_factor", value:"Critical");
   script_name("Mozilla Firefox Unspecified Vulnerability (Windows)");
   desc = "
   Overview: The host is running Mozilla Firefox and is prone to unspecified

Modified: trunk/openvas-plugins/scripts/secpod_firefox_unspecified_vuln_mar10_lin.nasl
===================================================================
--- trunk/openvas-plugins/scripts/secpod_firefox_unspecified_vuln_mar10_lin.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/secpod_firefox_unspecified_vuln_mar10_lin.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -29,8 +29,8 @@
   script_id(902148);
   script_version("$Revision$:1.0");
   script_cve_id("CVE-2010-1122");
-  script_tag(name:"cvss_base", value:"7.2");
-  script_tag(name:"risk_factor", value:"High");
+  script_tag(name:"cvss_base", value:"10.0");
+  script_tag(name:"risk_factor", value:"Critical");
   script_name("Mozilla Firefox Unspecified Vulnerability Mar-10 (Linux)");
   desc = "
   Overview: The host is installed with mozilla Firefox and is prone to

Modified: trunk/openvas-plugins/scripts/secpod_firefox_unspecified_vuln_mar10_win.nasl
===================================================================
--- trunk/openvas-plugins/scripts/secpod_firefox_unspecified_vuln_mar10_win.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/secpod_firefox_unspecified_vuln_mar10_win.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -29,8 +29,8 @@
   script_id(902147);
   script_version("$Revision$:1.0");
   script_cve_id("CVE-2010-1122");
-  script_tag(name:"cvss_base", value:"7.2");
-  script_tag(name:"risk_factor", value:"High");
+  script_tag(name:"cvss_base", value:"10.0");
+  script_tag(name:"risk_factor", value:"Critical");
   script_name("Mozilla Firefox Unspecified Vulnerability Mar-10 (Windows)");
   desc = "
   Overview: The host is installed with mozilla firefox and is prone to

Modified: trunk/openvas-plugins/scripts/secpod_flashget_ftp_pwd_bof_vuln_900203.nasl
===================================================================
--- trunk/openvas-plugins/scripts/secpod_flashget_ftp_pwd_bof_vuln_900203.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/secpod_flashget_ftp_pwd_bof_vuln_900203.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -31,8 +31,8 @@
  script_bugtraq_id(30685);
  script_copyright("Copyright (C) 2008 SecPod");
  script_version("Revision: 1.1 ");
- script_tag(name:"cvss_base", value:"6.8");
- script_tag(name:"risk_factor", value:"High");
+ script_tag(name:"cvss_base", value:"9.3");
+ script_tag(name:"risk_factor", value:"Critical");
  script_category(ACT_GATHER_INFO);
  script_family("Denial of Service");
  script_name("FlashGet FTP PWD Response Remote Buffer Overflow Vulnerability");
@@ -62,7 +62,7 @@
  CVSS Score :
         CVSS Base Score     : 6.8 (AV:N/AC:M/Au:NR/C:P/I:P/A:P)
         CVSS Temporal Score : 6.1 
- Risk factor : High";
+ Risk factor : Critical";
 
  script_description(desc);
  script_dependencies("secpod_reg_enum.nasl");

Modified: trunk/openvas-plugins/scripts/secpod_freetype_mult_dos_vuln_win.nasl
===================================================================
--- trunk/openvas-plugins/scripts/secpod_freetype_mult_dos_vuln_win.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/secpod_freetype_mult_dos_vuln_win.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -31,8 +31,8 @@
   script_bugtraq_id(42285);
   script_cve_id("CVE-2010-3053", "CVE-2010-2808", "CVE-2010-2807",
                 "CVE-2010-2806", "CVE-2010-2805", "CVE-2010-2541");
-  script_tag(name:"cvss_base", value:"6.8");
-  script_tag(name:"risk_factor", value:"High");
+  script_tag(name:"cvss_base", value:"4.3");
+  script_tag(name:"risk_factor", value:"Medium");
   script_name("FreeType Multiple denial of service vulnerabilities (Windows)");
   desc = "
   Overview: This host is installed with FreeType and is prone to multiple Denial

Modified: trunk/openvas-plugins/scripts/secpod_google_chrome_iframe_dos_vuln.nasl
===================================================================
--- trunk/openvas-plugins/scripts/secpod_google_chrome_iframe_dos_vuln.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/secpod_google_chrome_iframe_dos_vuln.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -32,7 +32,7 @@
   script_id(902184);
   script_version("$Revision$");
   script_cve_id("CVE-2010-1992", "CVE-2010-2120");
-  script_tag(name:"cvss_base", value:"4.3");
+  script_tag(name:"cvss_base", value:"5.0");
   script_tag(name:"risk_factor", value:"Medium");
   script_name("Google Chrome 'IFRAME' Denial Of Service Vulnerability");
   desc = "

Modified: trunk/openvas-plugins/scripts/secpod_google_chrome_mult_vuln_900214.nasl
===================================================================
--- trunk/openvas-plugins/scripts/secpod_google_chrome_mult_vuln_900214.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/secpod_google_chrome_mult_vuln_900214.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -30,7 +30,7 @@
 {
   script_id(900214);
   script_version("Revision: 1.2 ");
-  script_tag(name:"cvss_base", value:"8.3");
+  script_tag(name:"cvss_base", value:"9.3");
   script_tag(name:"risk_factor", value:"Critical");
   script_cve_id("CVE-2008-6994", "CVE-2008-6995", "CVE-2008-6996",
                 "CVE-2008-6997", "CVE-2008-698");
@@ -68,7 +68,7 @@
   CVSS Score :
         CVSS Base Score     : 8.3 (AV:N/AC:M/Au:NR/C:P/I:P/A:C)
         CVSS Temporal Score : 6.5
-  Risk factor : High";
+  Risk factor : Critical";
 
   script_description(desc);
   script_summary("Check for the version of Google Chrome");

Modified: trunk/openvas-plugins/scripts/secpod_google_chrome_mult_vuln_aug10.nasl
===================================================================
--- trunk/openvas-plugins/scripts/secpod_google_chrome_mult_vuln_aug10.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/secpod_google_chrome_mult_vuln_aug10.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -31,7 +31,7 @@
   script_cve_id("CVE-2010-3120", "CVE-2010-3119", "CVE-2010-3118", "CVE-2010-3117",
                 "CVE-2010-3116", "CVE-2010-3115", "CVE-2010-3114", "CVE-2010-3113",
                 "CVE-2010-3112", "CVE-2010-3111");
-  script_tag(name:"cvss_base", value:"9.3");
+  script_tag(name:"cvss_base", value:"10.0");
   script_tag(name:"risk_factor", value:"Critical");
   script_name("Google Chrome multiple vulnerabilities - (Aug10)");
   desc = "

Modified: trunk/openvas-plugins/scripts/secpod_google_chrome_mult_vuln_lin01_sep10.nasl
===================================================================
--- trunk/openvas-plugins/scripts/secpod_google_chrome_mult_vuln_lin01_sep10.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/secpod_google_chrome_mult_vuln_lin01_sep10.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -31,8 +31,8 @@
   script_cve_id("CVE-2010-2304", "CVE-2010-2303", "CVE-2010-2302" ,"CVE-2010-2301",
                 "CVE-2010-2300", "CVE-2010-2299", "CVE-2010-2298", "CVE-2010-2297",
                 "CVE-2010-2296", "CVE-2010-2295", "CVE-2010-1772", "CVE-2010-1773");
-  script_tag(name:"cvss_base", value:"9.3");
-  script_tag(name:"risk_factor", value:"Critical");
+  script_tag(name:"cvss_base", value:"4.3");
+  script_tag(name:"risk_factor", value:"Medium");
   script_name("Google Chrome 'WebKit' Multiple Vulnerabilities (Linux) - Sep 10");
   desc = "
   Overview: This host is installed with Google Chrome and is prone to multiple

Modified: trunk/openvas-plugins/scripts/secpod_google_chrome_mult_vuln_may11_lin.nasl
===================================================================
--- trunk/openvas-plugins/scripts/secpod_google_chrome_mult_vuln_may11_lin.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/secpod_google_chrome_mult_vuln_may11_lin.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -29,8 +29,8 @@
   script_id(902383);
   script_version("$Revision$");
   script_cve_id("CVE-2011-1801", "CVE-2011-1804", "CVE-2011-1806", "CVE-2011-1807");
-  script_tag(name:"cvss_base", value:"10.0");
-  script_tag(name:"risk_factor", value:"Critical");
+  script_tag(name:"cvss_base", value:"5.0");
+  script_tag(name:"risk_factor", value:"Medium");
   script_name("Google Chrome Multiple Vulnerabilities May11 (Linux)");
   desc = "
   Overview: This host is installed with Google Chrome and is prone to multiple

Modified: trunk/openvas-plugins/scripts/secpod_google_chrome_mult_vuln_may11_win.nasl
===================================================================
--- trunk/openvas-plugins/scripts/secpod_google_chrome_mult_vuln_may11_win.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/secpod_google_chrome_mult_vuln_may11_win.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -29,8 +29,8 @@
   script_id(902382);
   script_version("$Revision$");
   script_cve_id("CVE-2011-1801", "CVE-2011-1804", "CVE-2011-1806", "CVE-2011-1807");
-  script_tag(name:"cvss_base", value:"10.0");
-  script_tag(name:"risk_factor", value:"Critical");
+  script_tag(name:"cvss_base", value:"5.0");
+  script_tag(name:"risk_factor", value:"Medium");
   script_name("Google Chrome Multiple Vulnerabilities May11 (Windows)");
   desc = "
   Overview: This host is installed with Google Chrome and is prone to multiple

Modified: trunk/openvas-plugins/scripts/secpod_google_chrome_mult_vuln_win_jun10.nasl
===================================================================
--- trunk/openvas-plugins/scripts/secpod_google_chrome_mult_vuln_win_jun10.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/secpod_google_chrome_mult_vuln_win_jun10.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -34,8 +34,8 @@
   script_cve_id("CVE-2010-2304", "CVE-2010-2303", "CVE-2010-2302" ,"CVE-2010-2301",
                 "CVE-2010-2300", "CVE-2010-2299", "CVE-2010-2297", "CVE-2010-2296",
                 "CVE-2010-2295", "CVE-2010-1772", "CVE-2010-1773");
-  script_tag(name:"cvss_base", value:"9.3");
-  script_tag(name:"risk_factor", value:"Critical");
+  script_tag(name:"cvss_base", value:"4.3");
+  script_tag(name:"risk_factor", value:"Medium");
   script_name("Google Chrome 'WebKit' Multiple Vulnerabilities (Windows) - June 10");
   desc = "
   Overview: This host is installed with Google Chrome and is prone to multiple

Modified: trunk/openvas-plugins/scripts/secpod_habari_mult_vuln.nasl
===================================================================
--- trunk/openvas-plugins/scripts/secpod_habari_mult_vuln.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/secpod_habari_mult_vuln.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -29,7 +29,7 @@
   script_id(902326);
   script_version("$Revision$: 1.0");
   script_cve_id("CVE-2010-4607", "CVE-2010-4608");
-  script_tag(name:"cvss_base", value:"4.3");
+  script_tag(name:"cvss_base", value:"2.6");
   script_tag(name:"risk_factor", value:"Medium");
   script_name("Habari Multiple Vulnerabilities");
   desc = "

Modified: trunk/openvas-plugins/scripts/secpod_hmailserver_imap_dos_vuln_900109.nasl
===================================================================
--- trunk/openvas-plugins/scripts/secpod_hmailserver_imap_dos_vuln_900109.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/secpod_hmailserver_imap_dos_vuln_900109.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -31,8 +31,8 @@
  script_bugtraq_id(30663);
  script_copyright("Copyright (C) 2008 SecPod");
  script_version("$Revision: 1.1 $");
- script_tag(name:"cvss_base", value:"6.3");
- script_tag(name:"risk_factor", value:"High");
+ script_tag(name:"cvss_base", value:"4.3");
+ script_tag(name:"risk_factor", value:"Medium");
  script_category(ACT_GATHER_INFO);
  script_family("Denial of Service");
  script_name("hMailServer IMAP Denial of Service Vulnerability");

Modified: trunk/openvas-plugins/scripts/secpod_hp_data_protector_manager_rds_dos_vuln.nasl
===================================================================
--- trunk/openvas-plugins/scripts/secpod_hp_data_protector_manager_rds_dos_vuln.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/secpod_hp_data_protector_manager_rds_dos_vuln.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -29,8 +29,8 @@
   script_id(900291);
   script_version("$Revision: 1.0$");
   script_cve_id("CVE-2011-0514");
-  script_tag(name:"cvss_base", value:"8.5");
-  script_tag(name:"risk_factor", value:"Critical");
+  script_tag(name:"cvss_base", value:"7.8");
+  script_tag(name:"risk_factor", value:"High");
   script_name("HP Data Protector Manager RDS Service Denial of Service Vulnerability");
   desc = "
   Overview: This host is installed with HP Data Protector Manager and is prone

Modified: trunk/openvas-plugins/scripts/secpod_hp_openview_nnm_mult_vuln.nasl
===================================================================
--- trunk/openvas-plugins/scripts/secpod_hp_openview_nnm_mult_vuln.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/secpod_hp_openview_nnm_mult_vuln.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -33,8 +33,8 @@
   script_version("$Revision$: 1.0");
   script_cve_id("CVE-2010-1964", "CVE-2010-1961", "CVE-2010-1960", "CVE-2010-3285");
   script_bugtraq_id(40873, 40637, 40638);
-  script_tag(name:"cvss_base", value:"10.0");
-  script_tag(name:"risk_factor", value:"Critical");
+  script_tag(name:"cvss_base", value:"7.5");
+  script_tag(name:"risk_factor", value:"High");
   script_name("HP OpenView Network Node Manager Multiple Vulnerabilities");
   desc = "
   Overview: This host is running HP OpenView Network Node Manager and

Modified: trunk/openvas-plugins/scripts/secpod_hp_smh_mult_vuln_apr11.nasl
===================================================================
--- trunk/openvas-plugins/scripts/secpod_hp_smh_mult_vuln_apr11.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/secpod_hp_smh_mult_vuln_apr11.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -30,7 +30,7 @@
   script_version("$Revision : 1.0$");
   script_cve_id("CVE-2011-1540", "CVE-2011-1541");
   script_bugtraq_id(47507, 47512);
-  script_tag(name:"cvss_base", value:"10.0");
+  script_tag(name:"cvss_base", value:"9.0");
   script_tag(name:"risk_factor", value:"Critical");
   script_name("HP System Management Homepage Multiple Vulnerabilities");
   desc = "

Modified: trunk/openvas-plugins/scripts/secpod_hp_smh_unspecified_xss_vuln_900150.nasl
===================================================================
--- trunk/openvas-plugins/scripts/secpod_hp_smh_unspecified_xss_vuln_900150.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/secpod_hp_smh_unspecified_xss_vuln_900150.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -30,8 +30,8 @@
   script_cve_id("CVE-2008-4411");
   script_copyright("Copyright (C) 2008 SecPod");
   script_version("Revision: 1.1 ");
-  script_tag(name:"cvss_base", value:"6.4");
-  script_tag(name:"risk_factor", value:"High");
+  script_tag(name:"cvss_base", value:"4.3");
+  script_tag(name:"risk_factor", value:"Medium");
   script_category(ACT_GATHER_INFO);
   script_family("Web application abuses");
   script_name("HP System Management Homepage Unspecified XSS Vulnerability");

Modified: trunk/openvas-plugins/scripts/secpod_hummingbird_deployment_activex_cntl_mul_vuln_900161.nasl
===================================================================
--- trunk/openvas-plugins/scripts/secpod_hummingbird_deployment_activex_cntl_mul_vuln_900161.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/secpod_hummingbird_deployment_activex_cntl_mul_vuln_900161.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -30,8 +30,8 @@
  script_bugtraq_id(31799);
   script_copyright("Copyright (C) 2008 SecPod");
   script_version("Revision: 1.0");
-  script_tag(name:"cvss_base", value:"6.8");
-  script_tag(name:"risk_factor", value:"High");
+  script_tag(name:"cvss_base", value:"9.3");
+  script_tag(name:"risk_factor", value:"Critical");
   script_category(ACT_GATHER_INFO);
   script_family("Denial of Service");
   script_name("Hummingbird Deployment Wizard ActiveX Control Multiple Security Vulnerabilities");
@@ -62,7 +62,7 @@
   CVSS Score :
     CVSS Base Score     : 6.8 (AV:N/AC:M/Au:NR/C:P/I:P/A:P)
     CVSS Temporal Score : 6.1
-  Risk factor : High";
+  Risk factor : Critical";
 
   script_description(desc);
   script_dependencies("secpod_reg_enum.nasl");

Modified: trunk/openvas-plugins/scripts/secpod_ibm_db2_8_udb_mult_vuln_lin_900216.nasl
===================================================================
--- trunk/openvas-plugins/scripts/secpod_ibm_db2_8_udb_mult_vuln_lin_900216.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/secpod_ibm_db2_8_udb_mult_vuln_lin_900216.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -31,8 +31,8 @@
  script_cve_id("CVE-2008-2154", "CVE-2008-3958", "CVE-2008-3960");
  script_copyright("Copyright (C) 2008 SecPod");
  script_version("Revision: 1.1 ");
- script_tag(name:"cvss_base", value:"8.3");
- script_tag(name:"risk_factor", value:"Critical");
+ script_tag(name:"cvss_base", value:"6.0");
+ script_tag(name:"risk_factor", value:"High");
  script_category(ACT_GATHER_INFO);
  script_family("Denial of Service");
  script_name("IBM DB2 Universal Database Multiple Vulnerabilities - Sept08 (Linux)");

Modified: trunk/openvas-plugins/scripts/secpod_ibm_db2_8_udb_mult_vuln_win_900215.nasl
===================================================================
--- trunk/openvas-plugins/scripts/secpod_ibm_db2_8_udb_mult_vuln_win_900215.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/secpod_ibm_db2_8_udb_mult_vuln_win_900215.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -31,8 +31,8 @@
  script_cve_id("CVE-2008-2154", "CVE-2008-3958", "CVE-2008-3960");
  script_copyright("Copyright (C) 2008 SecPod");
  script_version("Revision: 1.1 ");
- script_tag(name:"cvss_base", value:"8.3");
- script_tag(name:"risk_factor", value:"Critical");
+ script_tag(name:"cvss_base", value:"6.0");
+ script_tag(name:"risk_factor", value:"High");
  script_category(ACT_GATHER_INFO);
  script_family("Denial of Service");
  script_name("IBM DB2 Universal Database Multiple Vulnerabilities - Sept08 (Win)");

Modified: trunk/openvas-plugins/scripts/secpod_ibm_db2_mult_sec_bypass_vuln.nasl
===================================================================
--- trunk/openvas-plugins/scripts/secpod_ibm_db2_mult_sec_bypass_vuln.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/secpod_ibm_db2_mult_sec_bypass_vuln.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -30,8 +30,8 @@
   script_version("$Revision$: 1.0");
   script_bugtraq_id(43291);
   script_cve_id("CVE-2010-3474","CVE-2010-3475");
-  script_tag(name:"cvss_base", value:"10.0");
-  script_tag(name:"risk_factor", value:"Critical");
+  script_tag(name:"cvss_base", value:"5.0");
+  script_tag(name:"risk_factor", value:"Medium");
   script_name("IBM DB2 Multiple Security Bypass Vulnerabilities");
   desc = "
   Overview: The host is running IBM DB2 and is prone to multiple security

Modified: trunk/openvas-plugins/scripts/secpod_ibm_lotus_notes_code_exec_vuln_win.nasl
===================================================================
--- trunk/openvas-plugins/scripts/secpod_ibm_lotus_notes_code_exec_vuln_win.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/secpod_ibm_lotus_notes_code_exec_vuln_win.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -29,7 +29,7 @@
   script_id(902298);
   script_version("$Revision:1.0 $");
   script_cve_id("CVE-2011-0912");
-  script_tag(name:"cvss_base", value:"10.0");
+  script_tag(name:"cvss_base", value:"9.3");
   script_tag(name:"risk_factor", value:"Critical");
   script_name("IBM Lotus Notes 'cai' URI and iCal Remote Code Execution Vulnerabilities (Win)");
   desc = "

Modified: trunk/openvas-plugins/scripts/secpod_ibmhttpserver_mod_proxy_dos_900222.nasl
===================================================================
--- trunk/openvas-plugins/scripts/secpod_ibmhttpserver_mod_proxy_dos_900222.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/secpod_ibmhttpserver_mod_proxy_dos_900222.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -31,8 +31,8 @@
  script_cve_id("CVE-2008-2364");
  script_copyright("Copyright (C) 2008 SecPod");
  script_version("$Revision: 1.1 $");
- script_tag(name:"cvss_base", value:"7.1");
- script_tag(name:"risk_factor", value:"High");
+ script_tag(name:"cvss_base", value:"5.0");
+ script_tag(name:"risk_factor", value:"Medium");
  script_category(ACT_GATHER_INFO);
  script_family("Denial of Service");
  script_name("IBM HTTP Server mod_proxy Interim Responses DoS Vulnerability");
@@ -70,7 +70,7 @@
  CVSS Score :
         CVSS Base Score     : 7.1 (AV:N/AC:M/Au:NR/C:N/I:N/A:C)
         CVSS Temporal Score : 5.3
- Risk factor : High";
+ Risk factor : Medium";
 
  script_description(desc);
  script_dependencies("http_version.nasl");

Modified: trunk/openvas-plugins/scripts/secpod_ida_pro_mult_vuln.nasl
===================================================================
--- trunk/openvas-plugins/scripts/secpod_ida_pro_mult_vuln.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/secpod_ida_pro_mult_vuln.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -30,8 +30,8 @@
   script_version("$Revision$: 1.0");
   script_cve_id("CVE-2011-1049", "CVE-2011-1050", "CVE-2011-1051",
                 "CVE-2011-1052", "CVE-2011-1053", "CVE-2011-1054");
-  script_tag(name:"cvss_base", value:"10.0");
-  script_tag(name:"risk_factor", value:"Critical");
+  script_tag(name:"cvss_base", value:"6.8");
+  script_tag(name:"risk_factor", value:"High");
   script_name("Hex-Rays IDA Pro Multiple Vulnerabilities");
   desc = "
   Overview: This host is installed with Hex-Rays IDA Pro and is prone to

Modified: trunk/openvas-plugins/scripts/secpod_itunes_mult_vuln_macosx.nasl
===================================================================
--- trunk/openvas-plugins/scripts/secpod_itunes_mult_vuln_macosx.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/secpod_itunes_mult_vuln_macosx.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -30,7 +30,7 @@
   script_version("$Revision: 1.0$");
   script_cve_id("CVE-2010-1205", "CVE-2010-2249", "CVE-2011-0170");
   script_bugtraq_id(41174);
-  script_tag(name:"cvss_base", value:"6.8");
+  script_tag(name:"cvss_base", value:"7.5");
   script_tag(name:"risk_factor", value:"High");
   script_name("Apple iTunes Multiple Vulnerabilities (Mac OS X)");
   desc = "

Modified: trunk/openvas-plugins/scripts/secpod_joomla_artforms_mult_vuln.nasl
===================================================================
--- trunk/openvas-plugins/scripts/secpod_joomla_artforms_mult_vuln.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/secpod_joomla_artforms_mult_vuln.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -30,8 +30,8 @@
   script_version("$Revision$: 1.0");
   script_bugtraq_id(41457);
   script_cve_id("CVE-2010-2846", "CVE-2010-2848", "CVE-2010-2847");
-  script_tag(name:"cvss_base", value:"7.5");
-  script_tag(name:"risk_factor", value:"High");
+  script_tag(name:"cvss_base", value:"4.3");
+  script_tag(name:"risk_factor", value:"Medium");
   script_name("Joomla! ArtForms Component Multiple Vulnerabilities");
   desc = "
   Overview: This host is running Joomla and is prone to multiple

Modified: trunk/openvas-plugins/scripts/secpod_justsystems_ichitaro_code_exec_vuln_900207.nasl
===================================================================
--- trunk/openvas-plugins/scripts/secpod_justsystems_ichitaro_code_exec_vuln_900207.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/secpod_justsystems_ichitaro_code_exec_vuln_900207.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -31,8 +31,8 @@
  script_bugtraq_id(30828);
  script_copyright("Copyright (C) 2008 SecPod");
  script_version("Revision: 1.1");
- script_tag(name:"cvss_base", value:"7.5");
- script_tag(name:"risk_factor", value:"High");
+ script_tag(name:"cvss_base", value:"9.3");
+ script_tag(name:"risk_factor", value:"Critical");
  script_category(ACT_GATHER_INFO);
  script_family("General");
  script_name("Ichitaro Document Handling Unspecified Code Execution Vulnerability");
@@ -64,7 +64,7 @@
  CVSS Score :
         CVSS Base Score     : 7.5 (AV:N/AC:L/Au:NR/C:P/I:P/A:P)
         CVSS Temporal Score : 6.4
- Risk factor : Medium";
+ Risk factor : Critical";
 
  script_description(desc);
  script_dependencies("secpod_reg_enum.nasl");

Modified: trunk/openvas-plugins/scripts/secpod_livezilla_track_module_xss_vuln.nasl
===================================================================
--- trunk/openvas-plugins/scripts/secpod_livezilla_track_module_xss_vuln.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/secpod_livezilla_track_module_xss_vuln.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -30,8 +30,8 @@
   script_version("$Revision$: 1.0");
   script_cve_id("CVE-2010-4276");
   script_bugtraq_id(45586);
-  script_tag(name:"cvss_base", value:"6.4");
-  script_tag(name:"risk_factor", value:"High");
+  script_tag(name:"cvss_base", value:"4.3");
+  script_tag(name:"risk_factor", value:"Medium");
   script_name("LiveZilla 'Track' Module 'server.php' Cross Site Scripting Vulnerability");
   desc = "
   Overview: The host is running LiveZilla and is prone to Cross-Site Scripting

Modified: trunk/openvas-plugins/scripts/secpod_macosx_java_10_5_upd_9.nasl
===================================================================
--- trunk/openvas-plugins/scripts/secpod_macosx_java_10_5_upd_9.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/secpod_macosx_java_10_5_upd_9.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -34,8 +34,8 @@
                 "CVE-2010-4471", "CVE-2010-4472", "CVE-2010-4473", "CVE-2010-4476");
   script_bugtraq_id(46091, 46386, 46387, 46391, 46393, 46394, 46395, 46397,
                     46398, 46399, 46400, 46402, 46403, 46404, 46406, 46409);
-  script_tag(name:"cvss_base", value:"10.0");
-  script_tag(name:"risk_factor", value:"Critical");
+  script_tag(name:"cvss_base", value:"7.6");
+  script_tag(name:"risk_factor", value:"High");
   script_name("Java for Mac OS X 10.5 Update 9");
   desc = "
   Overview: This host has important security update missing according to

Modified: trunk/openvas-plugins/scripts/secpod_macosx_java_10_6_upd_4.nasl
===================================================================
--- trunk/openvas-plugins/scripts/secpod_macosx_java_10_6_upd_4.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/secpod_macosx_java_10_6_upd_4.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -34,8 +34,8 @@
                 "CVE-2010-4471", "CVE-2010-4472", "CVE-2010-4473", "CVE-2010-4476");
   script_bugtraq_id(46091, 46386, 46387, 46391, 46393, 46394, 46395, 46397,
                     46398, 46399, 46400, 46402, 46403, 46404, 46406, 46409);
-  script_tag(name:"cvss_base", value:"10.0");
-  script_tag(name:"risk_factor", value:"Critical");
+  script_tag(name:"cvss_base", value:"7.6");
+  script_tag(name:"risk_factor", value:"High");
   script_name("Java for Mac OS X 10.6 Update 4");
   desc = "
   Overview: This host has important security update missing according to

Modified: trunk/openvas-plugins/scripts/secpod_macosx_su11-001.nasl
===================================================================
--- trunk/openvas-plugins/scripts/secpod_macosx_su11-001.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/secpod_macosx_su11-001.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -48,8 +48,8 @@
                     46997, 46990, 44779, 45617, 43187, 44951, 44718, 43926, 45119,
                     44723, 44718, 44980, 46965, 46832, 46995, 45241, 45240, 46992,
                     45239, 46966, 43212, 43678, 44643, 44214, 44605, 44980);
-  script_tag(name:"cvss_base", value:"10.0");
-  script_tag(name:"risk_factor", value:"Critical");
+  script_tag(name:"cvss_base", value:"4.9");
+  script_tag(name:"risk_factor", value:"Medium");
   script_name("Mac OS X v10.6.6 Multiple Vulnerabilities (2011-001)");
   desc = "
   Overview: This host has important security update missing according to

Modified: trunk/openvas-plugins/scripts/secpod_mahara_xss_n_csrf_vuln.nasl
===================================================================
--- trunk/openvas-plugins/scripts/secpod_mahara_xss_n_csrf_vuln.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/secpod_mahara_xss_n_csrf_vuln.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -30,8 +30,8 @@
   script_version("$Revision: 1.0 $");
   script_bugtraq_id(47033);
   script_cve_id("CVE-2011-0439", "CVE-2011-0440");
-  script_tag(name:"cvss_base", value:"5.8");
-  script_tag(name:"risk_factor", value:"High");
+  script_tag(name:"cvss_base", value:"4.3");
+  script_tag(name:"risk_factor", value:"Medium");
   script_name("Mahara Cross Site Scripting and Cross Site Request Forgery Vulnerabilities");
   desc = "
   Overview: This host is running Mahara and is prone to cross site scripting

Modified: trunk/openvas-plugins/scripts/secpod_mailenable_imap_dos_vuln_900104.nasl
===================================================================
--- trunk/openvas-plugins/scripts/secpod_mailenable_imap_dos_vuln_900104.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/secpod_mailenable_imap_dos_vuln_900104.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -31,8 +31,8 @@
  script_bugtraq_id(30498);
  script_copyright("Copyright (C) 2008 SecPod");
  script_version("$Revision: 1.2 $");
- script_tag(name:"cvss_base", value:"6.3");
- script_tag(name:"risk_factor", value:"High");
+ script_tag(name:"cvss_base", value:"5.0");
+ script_tag(name:"risk_factor", value:"Medium");
  script_category(ACT_GATHER_INFO);
  script_family("Denial of Service");
  script_name(" MailEnable IMAP Denial of Service Vulnerability");

Modified: trunk/openvas-plugins/scripts/secpod_mcafee_encrypt_usb_mngr_sec_bypass_vuln_900026.nasl
===================================================================
--- trunk/openvas-plugins/scripts/secpod_mcafee_encrypt_usb_mngr_sec_bypass_vuln_900026.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/secpod_mcafee_encrypt_usb_mngr_sec_bypass_vuln_900026.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -31,8 +31,8 @@
  script_bugtraq_id(30630);
  script_copyright("Copyright (C) 2008 SecPod");
  script_version("$Revision: 1.1 $");
-  script_tag(name:"cvss_base", value:"4.3");
-  script_tag(name:"risk_factor", value:"Medium");
+  script_tag(name:"cvss_base", value:"6.8");
+  script_tag(name:"risk_factor", value:"High");
  script_category(ACT_GATHER_INFO);
  script_family("Brute force attacks");
  script_name("McAfee Encrypted USB Manager Remote Security Bypass Vulnerability");
@@ -66,7 +66,7 @@
  CVSS Score :
         CVSS Base Score     : 4.3 (AV:N/AC:M/Au:NR/C:P/I:N/A:N)
         CVSS Temporal Score : 3.2
- Risk factor : Medium";
+ Risk factor : High";
 
  script_description(desc);
  script_dependencies("secpod_reg_enum.nasl");

Modified: trunk/openvas-plugins/scripts/secpod_microworld_mailscan_mult_vuln_900204.nasl
===================================================================
--- trunk/openvas-plugins/scripts/secpod_microworld_mailscan_mult_vuln_900204.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/secpod_microworld_mailscan_mult_vuln_900204.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -31,8 +31,8 @@
  script_bugtraq_id(30700);
  script_copyright("Copyright (C) 2008 SecPod");
  script_version("Revision: 1.1 ");
- script_tag(name:"cvss_base", value:"5.8");
- script_tag(name:"risk_factor", value:"High");
+ script_tag(name:"cvss_base", value:"4.3");
+ script_tag(name:"risk_factor", value:"Medium");
  script_category(ACT_MIXED_ATTACK);
  script_family("Web application abuses");
  script_name("MicroWorld MailScan for Mail Servers multiple vulnerabilities");

Modified: trunk/openvas-plugins/scripts/secpod_movable_type_mult_vuln.nasl
===================================================================
--- trunk/openvas-plugins/scripts/secpod_movable_type_mult_vuln.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/secpod_movable_type_mult_vuln.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -30,8 +30,8 @@
   script_version("$Revision: 1.0$");
   script_cve_id("CVE-2010-3921", "CVE-2010-3922", "CVE-2010-4509", "CVE-2010-4511");
   script_bugtraq_id(45380, 45383, 45250, 45253);
-  script_tag(name:"cvss_base", value:"10.0");
-  script_tag(name:"risk_factor", value:"Critical");
+  script_tag(name:"cvss_base", value:"4.3");
+  script_tag(name:"risk_factor", value:"Medium");
   script_name("Movable Type Multiple Vulnerabilities");
   desc = "
   Overview: This host is running movable type and is prone to multiple

Modified: trunk/openvas-plugins/scripts/secpod_mozilla_prdts_iframe_dos_vuln_win.nasl
===================================================================
--- trunk/openvas-plugins/scripts/secpod_mozilla_prdts_iframe_dos_vuln_win.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/secpod_mozilla_prdts_iframe_dos_vuln_win.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -29,7 +29,7 @@
   script_id(902185);
   script_version("$Revision$: 1.0");
   script_cve_id("CVE-2010-1990");
-  script_tag(name:"cvss_base", value:"4.3");
+  script_tag(name:"cvss_base", value:"5.0");
   script_tag(name:"risk_factor", value:"Medium");
   script_name("Mozilla Products 'IFRAME' Denial Of Service vulnerability (Windows)");
   desc = "

Modified: trunk/openvas-plugins/scripts/secpod_mozilla_prdts_mult_vuln_mar10_lin.nasl
===================================================================
--- trunk/openvas-plugins/scripts/secpod_mozilla_prdts_mult_vuln_mar10_lin.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/secpod_mozilla_prdts_mult_vuln_mar10_lin.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -30,7 +30,7 @@
   script_version("$Revision$: 1.0");
   script_cve_id("CVE-2010-0167", "CVE-2010-0169", "CVE-2010-0171");
   script_bugtraq_id(38918);
-  script_tag(name:"cvss_base", value:"10.0");
+  script_tag(name:"cvss_base", value:"9.3");
   script_tag(name:"risk_factor", value:"Critical");
   script_name("Mozilla Products Multiple Vulnerabilities Mar-10 (Linux)");
   desc = "

Modified: trunk/openvas-plugins/scripts/secpod_mozilla_prdts_mult_vuln_mar10_win.nasl
===================================================================
--- trunk/openvas-plugins/scripts/secpod_mozilla_prdts_mult_vuln_mar10_win.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/secpod_mozilla_prdts_mult_vuln_mar10_win.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -30,7 +30,7 @@
   script_version("$Revision$: 1.0");
   script_cve_id("CVE-2010-0167", "CVE-2010-0169", "CVE-2010-0171");
   script_bugtraq_id(38918);
-  script_tag(name:"cvss_base", value:"10.0");
+  script_tag(name:"cvss_base", value:"9.3");
   script_tag(name:"risk_factor", value:"Critical");
   script_name("Mozilla Products Multiple Vulnerabilities Mar-10 (Windows)");
   desc = "

Modified: trunk/openvas-plugins/scripts/secpod_mozilla_prdts_mult_vuln_win01_jun10.nasl
===================================================================
--- trunk/openvas-plugins/scripts/secpod_mozilla_prdts_mult_vuln_win01_jun10.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/secpod_mozilla_prdts_mult_vuln_win01_jun10.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -30,8 +30,8 @@
   script_version("$Revision$: 1.0");
   script_cve_id("CVE-2010-1197", "CVE-2010-1198");
   script_bugtraq_id(41050);
-  script_tag(name:"cvss_base", value:"9.3");
-  script_tag(name:"risk_factor", value:"Critical");
+  script_tag(name:"cvss_base", value:"4.3");
+  script_tag(name:"risk_factor", value:"Medium");
   script_name("Mozilla Products Firefox/Seamonkey Multiple Vulnerabilities june-10 (Win)");
   desc = "
   Overview:

Modified: trunk/openvas-plugins/scripts/secpod_ms08-037_900005.nasl
===================================================================
--- trunk/openvas-plugins/scripts/secpod_ms08-037_900005.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/secpod_ms08-037_900005.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -31,7 +31,7 @@
  script_cve_id("CVE-2008-1447", "CVE-2008-1454");
  script_copyright("Copyright (C) 2008 SecPod");
  script_version("Revision: 1.3 ");
- script_tag(name:"cvss_base", value:"7.5");
+ script_tag(name:"cvss_base", value:"6.4");
  script_tag(name:"risk_factor", value:"High");
  script_category(ACT_GATHER_INFO);
  script_family("Windows : Microsoft Bulletins");

Modified: trunk/openvas-plugins/scripts/secpod_ms08-039_900007.nasl
===================================================================
--- trunk/openvas-plugins/scripts/secpod_ms08-039_900007.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/secpod_ms08-039_900007.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -31,8 +31,8 @@
  script_cve_id("CVE-2008-2247", "CVE-2008-2248");
  script_copyright("Copyright (C) 2008 SecPod");
  script_version("Revision: 1.3 ");
- script_tag(name:"cvss_base", value:"6.8");
- script_tag(name:"risk_factor", value:"High");
+ script_tag(name:"cvss_base", value:"4.3");
+ script_tag(name:"risk_factor", value:"Medium");
  script_category(ACT_GATHER_INFO);
  script_family("Windows : Microsoft Bulletins");
  script_name("Outlook Web Access for Exchange Server Elevation of Privilege (953747)");

Modified: trunk/openvas-plugins/scripts/secpod_ms08-043_900028.nasl
===================================================================
--- trunk/openvas-plugins/scripts/secpod_ms08-043_900028.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/secpod_ms08-043_900028.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -31,8 +31,8 @@
  script_cve_id("CVE-2008-3003", "CVE-2008-3004", "CVE-2008-3005", "CVE-2008-3006");
  script_copyright("Copyright (C) 2008 SecPod");
  script_version("$Revision$");
- script_tag(name:"cvss_base", value:"8.3");
- script_tag(name:"risk_factor", value:"Critical");
+ script_tag(name:"cvss_base", value:"6.6");
+ script_tag(name:"risk_factor", value:"High");
  script_category(ACT_GATHER_INFO);
  script_family("Windows : Microsoft Bulletins");
  script_name("Microsoft Excel Could Allow Remote Code Execution Vulnerabilities (954066)");

Modified: trunk/openvas-plugins/scripts/secpod_ms08-044_900029.nasl
===================================================================
--- trunk/openvas-plugins/scripts/secpod_ms08-044_900029.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/secpod_ms08-044_900029.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -32,7 +32,7 @@
 	       "CVE-2008-3021", "CVE-2008-3460");
  script_copyright("Copyright (C) 2008 SecPod");
  script_version("Revision: 1.1 ");
- script_tag(name:"cvss_base", value:"8.3");
+ script_tag(name:"cvss_base", value:"9.3");
  script_tag(name:"risk_factor", value:"Critical");
  script_category(ACT_GATHER_INFO);
  script_family("Windows : Microsoft Bulletins");
@@ -69,7 +69,7 @@
  CVSS Score :
         CVSS Base Score     : 8.3 (AV:N/AC:M/Au:NR/C:P/I:P/A:C)
         CVSS Temporal Score : 6.1 
- Risk factor : High";
+ Risk factor : Critical";
  script_description(desc);
  script_dependencies("secpod_reg_enum.nasl", "secpod_ms_office_detection_900025.nasl");
  script_require_ports(139, 445);

Modified: trunk/openvas-plugins/scripts/secpod_ms08-045_900030.nasl
===================================================================
--- trunk/openvas-plugins/scripts/secpod_ms08-045_900030.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/secpod_ms08-045_900030.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -31,8 +31,8 @@
 	       "CVE-2008-2257", "CVE-2008-2258", "CVE-2008-2259");
  script_copyright("Copyright (C) 2008 SecPod");
  script_version("$Revision: 1.1 $");
- script_tag(name:"cvss_base", value:"7.5");
- script_tag(name:"risk_factor", value:"High");
+ script_tag(name:"cvss_base", value:"9.3");
+ script_tag(name:"risk_factor", value:"Critical");
  script_category(ACT_GATHER_INFO);
  script_family("Windows : Microsoft Bulletins");
  script_name("Cumulative Security Update for Internet Explorer (953838)");
@@ -70,7 +70,7 @@
  CVSS Score :
         CVSS Base Score     : 7.5 (AV:N/AC:L/Au:NR/C:P/I:P/A:P)
         CVSS Temporal Score : 5.5
- Risk factor : High";
+ Risk factor : Critical";
 
  script_description(desc);
  script_dependencies("secpod_reg_enum.nasl");

Modified: trunk/openvas-plugins/scripts/secpod_ms08-048_900031.nasl
===================================================================
--- trunk/openvas-plugins/scripts/secpod_ms08-048_900031.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/secpod_ms08-048_900031.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -30,7 +30,7 @@
  script_cve_id("CVE-2008-1448");
  script_copyright("Copyright (C) 2008 SecPod");
  script_version("$Revision: 1.1 $");
- script_tag(name:"cvss_base", value:"6.8");
+ script_tag(name:"cvss_base", value:"7.1");
  script_tag(name:"risk_factor", value:"High");
  script_category(ACT_GATHER_INFO);
  script_family("Windows : Microsoft Bulletins");

Modified: trunk/openvas-plugins/scripts/secpod_ms08-049_900035.nasl
===================================================================
--- trunk/openvas-plugins/scripts/secpod_ms08-049_900035.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/secpod_ms08-049_900035.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -30,8 +30,8 @@
  script_cve_id("CVE-2008-1456", "CVE-2008-1457");
  script_copyright("Copyright (C) 2008 SecPod");
  script_version("$Revision: 1.1 $");
- script_tag(name:"cvss_base", value:"6.8");
- script_tag(name:"risk_factor", value:"High");
+ script_tag(name:"cvss_base", value:"9.0");
+ script_tag(name:"risk_factor", value:"Critical");
  script_category(ACT_GATHER_INFO);
  script_family("Windows : Microsoft Bulletins");
  script_name("Vulnerabilities in Event System Could Allow Remote Code Execution (950974)");
@@ -65,7 +65,7 @@
  CVSS Score :
         CVSS Base Score     : 6.8 (AV:N/AC:M/Au:NR/C:P/I:P/A:P)
         CVSS Temporal Score : 5.0
- Risk factor : Medium";
+ Risk factor : Critical";
  script_description(desc);
  script_dependencies("secpod_reg_enum.nasl");
  script_require_ports(139, 445);

Modified: trunk/openvas-plugins/scripts/secpod_ms08-050_900034.nasl
===================================================================
--- trunk/openvas-plugins/scripts/secpod_ms08-050_900034.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/secpod_ms08-050_900034.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -30,8 +30,8 @@
  script_cve_id("CVE-2008-0082");
  script_copyright("Copyright (C) 2008 SecPod");
  script_version("$Revision: 1.1 $");
- script_tag(name:"cvss_base", value:"6.4");
- script_tag(name:"risk_factor", value:"High");
+ script_tag(name:"cvss_base", value:"10.0");
+ script_tag(name:"risk_factor", value:"Critical");
  script_category(ACT_GATHER_INFO);
  script_family("Windows : Microsoft Bulletins");
  script_name("Windows Messenger Could Allow Information Disclosure Vulnerability (955702)");
@@ -66,7 +66,7 @@
  CVSS Score :
         CVSS Base Score     : 6.4 (AV:N/AC:L/Au:NR/C:P/I:P/A:N)
         CVSS Temporal Score : 4.7
- Risk factor : Medium";
+ Risk factor : Critical";
 
  script_description(desc);
  script_dependencies("secpod_reg_enum.nasl");

Modified: trunk/openvas-plugins/scripts/secpod_ms08-051_900033.nasl
===================================================================
--- trunk/openvas-plugins/scripts/secpod_ms08-051_900033.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/secpod_ms08-051_900033.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -31,7 +31,7 @@
  script_cve_id("CVE-2008-0120", "CVE-2008-0121", "CVE-2008-1455");
  script_copyright("Copyright (C) 2008 SecPod");
  script_version("Revision: 1.1 ");
- script_tag(name:"cvss_base", value:"8.3");
+ script_tag(name:"cvss_base", value:"9.3");
  script_tag(name:"risk_factor", value:"Critical");
  script_category(ACT_GATHER_INFO);
  script_family("Windows : Microsoft Bulletins");
@@ -67,7 +67,7 @@
  CVSS Score :
    CVSS Base Score     : 8.3 (AV:N/AC:M/Au:NR/C:P/I:P/A:C)
    CVSS Temporal Score : 6.1
- Risk factor : High";
+ Risk factor : Critical";
  script_description(desc);
  script_dependencies("secpod_reg_enum.nasl", "secpod_office_products_version_900032.nasl",
 		     "secpod_ms_office_detection_900025.nasl");

Modified: trunk/openvas-plugins/scripts/secpod_ms09-034.nasl
===================================================================
--- trunk/openvas-plugins/scripts/secpod_ms09-034.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/secpod_ms09-034.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -34,7 +34,7 @@
 {
   script_id(900906);
   script_version("$Revision: 1.0$");
-  script_tag(name:"cvss_base", value:"10.0");
+  script_tag(name:"cvss_base", value:"9.3");
   script_tag(name:"risk_factor", value:"Critical");
   script_cve_id("CVE-2009-1917", "CVE-2009-1918", "CVE-2009-1919");
   script_bugtraq_id(35831, 35827);

Modified: trunk/openvas-plugins/scripts/secpod_ms09-037.nasl
===================================================================
--- trunk/openvas-plugins/scripts/secpod_ms09-037.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/secpod_ms09-037.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -31,7 +31,7 @@
 {
   script_id(101100);
   script_version("$Revision$");
-  script_tag(name:"cvss_base", value:"10.0");
+  script_tag(name:"cvss_base", value:"9.3");
   script_tag(name:"risk_factor", value:"Critical");
   script_cve_id("CVE-2008-0015", "CVE-2008-002", "CVE-2009-0901",
                 "CVE-2009-2493", "CVE-2009-2494");

Modified: trunk/openvas-plugins/scripts/secpod_ms09-048.nasl
===================================================================
--- trunk/openvas-plugins/scripts/secpod_ms09-048.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/secpod_ms09-048.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -31,7 +31,7 @@
 {
   script_id(900838);
   script_version("$Revision$");
-  script_tag(name:"cvss_base", value:"7.8");
+  script_tag(name:"cvss_base", value:"7.1");
   script_tag(name:"risk_factor", value:"High");
   script_cve_id("CVE-2008-4609", "CVE-2009-1925", "CVE-2009-1926");
   script_bugtraq_id(31545, 36269);
@@ -70,7 +70,7 @@
   http://www.vupen.com/english/advisories/2009/2567
   http://www.microsoft.com/technet/security/bulletin/ms09-048.mspx
 
-  Risk factor: Critical";
+  Risk factor : High";
 
   script_description(desc);
   script_summary("Check for the version of Tcpip.sys file");

Modified: trunk/openvas-plugins/scripts/secpod_ms09-050-remote.nasl
===================================================================
--- trunk/openvas-plugins/scripts/secpod_ms09-050-remote.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/secpod_ms09-050-remote.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -31,8 +31,8 @@
   script_bugtraq_id(36299);
   script_cve_id("CVE-2009-2526", "CVE-2009-2532", "CVE-2009-3103");
   script_version ("$Revision: 1.0$");
-  script_tag(name:"cvss_base", value:"10.0");
-  script_tag(name:"risk_factor", value:"Critical");
+  script_tag(name:"cvss_base", value:"7.8");
+  script_tag(name:"risk_factor", value:"High");
   script_name("Microsoft Windows SMB2 Negotiation Protocol Remote Code Execution Vulnerability");
 
   desc = "
@@ -63,7 +63,7 @@
   References:
   http://www.microsoft.com/technet/security/bulletin/MS09-050.mspx
 
-  Risk factor: Critical";
+  Risk factor : High";
 
   script_description(desc);
   script_summary("Determine if Microsoft Windows is prone to a remote code-execution vulnerability");

Modified: trunk/openvas-plugins/scripts/secpod_ms09-053.nasl
===================================================================
--- trunk/openvas-plugins/scripts/secpod_ms09-053.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/secpod_ms09-053.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -31,8 +31,8 @@
 {
   script_id(900874);
   script_version("$Revision$");
-  script_tag(name:"cvss_base", value:"9.0");
-  script_tag(name:"risk_factor", value:"Critical");
+  script_tag(name:"cvss_base", value:"2.6");
+  script_tag(name:"risk_factor", value:"Medium");
   script_cve_id("CVE-2009-2521", "CVE-2009-3023");
   script_bugtraq_id(36273, 36189);
   script_name("Microsoft IIS FTP Service Remote Code Execution Vulnerabilities (975254)");
@@ -70,7 +70,7 @@
   CVSS Score Report:
     CVSS Base Score     : 9.0 (AV:N/AC:L/Au:SI/C:C/I:C/A:C)
     CVSS Temporal Score : 7.1
-  Risk factor: High";
+  Risk factor : Medium";
 
   script_description(desc);
   script_summary("Check for the version of ftpsvc2.dll file");

Modified: trunk/openvas-plugins/scripts/secpod_ms09-056.nasl
===================================================================
--- trunk/openvas-plugins/scripts/secpod_ms09-056.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/secpod_ms09-056.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -31,7 +31,7 @@
 {
   script_id(900876);
   script_version("$Revision$");
-  script_tag(name:"cvss_base", value:"7.5");
+  script_tag(name:"cvss_base", value:"6.8");
   script_tag(name:"risk_factor", value:"High");
   script_cve_id("CVE-2009-2510", "CVE-2009-2511");
   script_bugtraq_id(36475, 36577);
@@ -73,7 +73,7 @@
   http://www.vupen.com/english/advisories/2009/2891
   http://www.microsoft.com/technet/security/bulletin/MS09-056.mspx
 
-  Risk factor: Medium";
+  Risk factor : High";
 
   script_description(desc);
   script_summary("Check for the version of msasn1.dll file");

Modified: trunk/openvas-plugins/scripts/secpod_ms09-058.nasl
===================================================================
--- trunk/openvas-plugins/scripts/secpod_ms09-058.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/secpod_ms09-058.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -31,7 +31,7 @@
 {
   script_id(900963);
   script_version("$Revision$");
-  script_tag(name:"cvss_base", value:"6.8");
+  script_tag(name:"cvss_base", value:"7.2");
   script_tag(name:"risk_factor", value:"High");
   script_cve_id("CVE-2009-2515", "CVE-2009-2516", "CVE-2009-2517");
   script_bugtraq_id(36623, 36624, 36625);
@@ -69,7 +69,7 @@
   http://www.vupen.com/english/advisories/2009/2893
   http://www.microsoft.com/technet/security/bulletin/MS09-058.mspx
 
-  Risk factor: High";
+  Risk factor : High";
 
   script_description(desc);
   script_summary("Check for the version of ntoskrnl.exe");

Modified: trunk/openvas-plugins/scripts/secpod_ms09-065.nasl
===================================================================
--- trunk/openvas-plugins/scripts/secpod_ms09-065.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/secpod_ms09-065.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -31,8 +31,8 @@
 {
   script_id(900886);
   script_version("$Revision$");
-  script_tag(name:"cvss_base", value:"9.3");
-  script_tag(name:"risk_factor", value:"Critical");
+  script_tag(name:"cvss_base", value:"6.8");
+  script_tag(name:"risk_factor", value:"High");
   script_cve_id("CVE-2009-1127", "CVE-2009-2513", "CVE-2009-2514");
   script_bugtraq_id(36939, 36941, 36029);
   script_name("Microsoft Windows Kernel-Mode Drivers Multiple Vulnerabilities (969947)");
@@ -75,7 +75,7 @@
   http://www.vupen.com/english/advisories/2009/3191
   http://www.microsoft.com/technet/security/bulletin/ms09-065.mspx
 
-  Risk factor: Critical";
+  Risk factor : High";
 
   script_description(desc);
   script_summary("Check for the version of Win32k.sys file");

Modified: trunk/openvas-plugins/scripts/secpod_ms09-070.nasl
===================================================================
--- trunk/openvas-plugins/scripts/secpod_ms09-070.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/secpod_ms09-070.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -31,8 +31,8 @@
 {
   script_id(901064);
   script_version("$Revision: 1.0 $");
-  script_tag(name:"cvss_base", value:"9.0");
-  script_tag(name:"risk_factor", value:"Critical");
+  script_tag(name:"cvss_base", value:"6.9");
+  script_tag(name:"risk_factor", value:"High");
   script_cve_id("CVE-2009-2508", "CVE-2009-2509");
   script_name("Microsoft Windows ADFS Remote Code Execution Vulnerability (971726)");
   desc = "
@@ -65,7 +65,7 @@
   http://www.vupen.com/english/advisories/2009/3434
   http://www.microsoft.com/technet/security/bulletin/MS09-070.mspx
 
-  Risk factor: Medium";
+  Risk factor : High";
 
   script_description(desc);
   script_summary("Check for the version of Adfsreg.exe file");

Modified: trunk/openvas-plugins/scripts/secpod_ms10-002.nasl
===================================================================
--- trunk/openvas-plugins/scripts/secpod_ms10-002.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/secpod_ms10-002.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -31,8 +31,8 @@
 {
   script_id(901097);
   script_version("$Revision$: 1.0");
-  script_tag(name:"cvss_base", value:"9.3");
-  script_tag(name:"risk_factor", value:"Critical");
+  script_tag(name:"cvss_base", value:"4.3");
+  script_tag(name:"risk_factor", value:"Medium");
   script_cve_id("CVE-2009-4074", "CVE-2010-0027", "CVE-2010-0244", "CVE-2010-0245",
                 "CVE-2010-0246", "CVE-2010-0247", "CVE-2010-0248", "CVE-2010-0249");
   script_bugtraq_id(37883, 37135, 37884, 37891, 37895, 37892, 37893, 37894, 37815);
@@ -74,7 +74,7 @@
   http://www.vupen.com/english/advisories/2010/0187
   http://www.microsoft.com/technet/security/Bulletin/MS10-002.mspx
 
-  Risk factor : Critical";
+  Risk factor : Medium";
 
   script_description(desc);
   script_summary("Check for the vulnerable mshtml.dll file version");

Modified: trunk/openvas-plugins/scripts/secpod_ms10-012-remote.nasl
===================================================================
--- trunk/openvas-plugins/scripts/secpod_ms10-012-remote.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/secpod_ms10-012-remote.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -30,7 +30,7 @@
   script_id(902269);
   script_version("$Revision$: 1.0");
   script_cve_id("CVE-2010-0020", "CVE-2010-0021", "CVE-2010-0022", "CVE-2010-0231");
-  script_tag(name:"cvss_base", value:"10.0");
+  script_tag(name:"cvss_base", value:"9.0");
   script_tag(name:"risk_factor", value:"Critical");
   script_name("Microsoft Windows SMB Server NTLM Multiple Vulnerabilities (971468)");
 

Modified: trunk/openvas-plugins/scripts/secpod_ms10-012.nasl
===================================================================
--- trunk/openvas-plugins/scripts/secpod_ms10-012.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/secpod_ms10-012.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -31,7 +31,7 @@
 {
   script_id(900230);
   script_version("$Revision$: 1.0");
-  script_tag(name:"cvss_base", value:"10.0");
+  script_tag(name:"cvss_base", value:"9.0");
   script_tag(name:"risk_factor", value:"Critical");
   script_cve_id("CVE-2010-0020", "CVE-2010-0021",
                 "CVE-2010-0022", "CVE-2010-0231");
@@ -78,7 +78,7 @@
   http://www.vupen.com/english/advisories/2010/0345
   http://www.microsoft.com/technet/security/bulletin/ms10-012.mspx
 
-  Risk factor: High";
+  Risk factor : Critical";
 
   script_description(desc);
   script_summary("Check for the version of Srv.sys file");

Modified: trunk/openvas-plugins/scripts/secpod_ms10-021.nasl
===================================================================
--- trunk/openvas-plugins/scripts/secpod_ms10-021.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/secpod_ms10-021.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -32,8 +32,8 @@
   script_id(900236);
   script_version("$Revision$:1.0");
   script_bugtraq_id(39297, 39309, 39323, 39324, 39318, 39319, 39320, 39322);
-  script_tag(name:"cvss_base", value:"6.9");
-  script_tag(name:"risk_factor", value:"High");
+  script_tag(name:"cvss_base", value:"4.7");
+  script_tag(name:"risk_factor", value:"Medium");
   script_cve_id("CVE-2010-0234", "CVE-2010-0235", "CVE-2010-0236", "CVE-2010-0237",
                 "CVE-2010-0238", "CVE-2010-0481", "CVE-2010-0482", "CVE-2010-0810");
   script_name("Microsoft Windows Kernel Could Allow Elevation of Privilege (979683)");

Modified: trunk/openvas-plugins/scripts/secpod_ms10-032.nasl
===================================================================
--- trunk/openvas-plugins/scripts/secpod_ms10-032.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/secpod_ms10-032.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -32,8 +32,8 @@
   script_version("$Revision$: 1.0");
   script_cve_id("CVE-2010-0484", "CVE-2010-0485", "CVE-2010-1255");
   script_bugtraq_id(40508, 40569, 40570);
-  script_tag(name:"cvss_base", value:"10.0");
-  script_tag(name:"risk_factor", value:"Critical");
+  script_tag(name:"cvss_base", value:"6.8");
+  script_tag(name:"risk_factor", value:"High");
   script_name("Microsoft Windows Kernel Mode Drivers Privilege Escalation Vulnerabilities (979559)");
   desc = "
   Overview: This host has critical security update missing according to

Modified: trunk/openvas-plugins/scripts/secpod_ms10-033.nasl
===================================================================
--- trunk/openvas-plugins/scripts/secpod_ms10-033.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/secpod_ms10-033.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -32,7 +32,7 @@
   script_version("$Revision$: 1.0");
   script_bugtraq_id(40432, 40464);
   script_cve_id("CVE-2010-1879", "CVE-2010-1880");
-  script_tag(name:"cvss_base", value:"10.0");
+  script_tag(name:"cvss_base", value:"9.3");
   script_tag(name:"risk_factor", value:"Critical");
   script_name("Microsoft Media Decompression Remote Code Execution Vulnerability (979902)");
   desc = "

Modified: trunk/openvas-plugins/scripts/secpod_ms10-035.nasl
===================================================================
--- trunk/openvas-plugins/scripts/secpod_ms10-035.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/secpod_ms10-035.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -34,8 +34,8 @@
   script_cve_id("CVE-2010-0255", "CVE-2010-1257", "CVE-2010-1259", "CVE-2010-1260",
                 "CVE-2010-1261", "CVE-2010-1262");
   script_bugtraq_id(38056, 38547, 40410, 40414, 40416, 40417);
-  script_tag(name:"cvss_base", value:"9.3");
-  script_tag(name:"risk_factor", value:"Critical");
+  script_tag(name:"cvss_base", value:"4.3");
+  script_tag(name:"risk_factor", value:"Medium");
   script_name("Microsoft Internet Explorer Multiple Vulnerabilities (982381)");
   desc = "
   Overview: This host has critical security update missing according to

Modified: trunk/openvas-plugins/scripts/secpod_ms10-036.nasl
===================================================================
--- trunk/openvas-plugins/scripts/secpod_ms10-036.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/secpod_ms10-036.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -30,8 +30,8 @@
   script_version("$Revision$: 1.0");
   script_cve_id("CVE-2010-1263");
   script_bugtraq_id(40574);
-  script_tag(name:"cvss_base", value:"8.0");
-  script_tag(name:"risk_factor", value:"High");
+  script_tag(name:"cvss_base", value:"9.3");
+  script_tag(name:"risk_factor", value:"Critical");
   script_name("Microsoft Office COM Validation Remote Code Execution Vulnerability (983235)");
   desc = "
   Overview: This host has critical security update missing according to

Modified: trunk/openvas-plugins/scripts/secpod_ms10-037.nasl
===================================================================
--- trunk/openvas-plugins/scripts/secpod_ms10-037.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/secpod_ms10-037.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -33,7 +33,7 @@
   script_version("$Revision$: 1.0");
   script_bugtraq_id(40572);
   script_cve_id("CVE-2010-0819");
-  script_tag(name:"cvss_base", value:"6.8");
+  script_tag(name:"cvss_base", value:"7.2");
   script_tag(name:"risk_factor", value:"High");
   script_name("Microsoft Windows OpenType Compact Font Format Driver Privilege Escalation Vulnerability (980218)");
   desc = "

Modified: trunk/openvas-plugins/scripts/secpod_ms10-038.nasl
===================================================================
--- trunk/openvas-plugins/scripts/secpod_ms10-038.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/secpod_ms10-038.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -34,7 +34,7 @@
                 "CVE-2010-1253");
   script_bugtraq_id(40518, 40520, 40521, 40522, 40524, 40523, 40525, 40526, 
                     40527, 40528, 40529, 40530, 40531);
-  script_tag(name:"cvss_base", value:"10.0");
+  script_tag(name:"cvss_base", value:"9.3");
   script_tag(name:"risk_factor", value:"Critical");
   script_name("Microsoft Office Excel Remote Code Execution Vulnerabilities (2027452)");
   desc = "

Modified: trunk/openvas-plugins/scripts/secpod_ms10-039.nasl
===================================================================
--- trunk/openvas-plugins/scripts/secpod_ms10-039.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/secpod_ms10-039.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -30,8 +30,8 @@
   script_version("$Revision$: 1.0");
   script_cve_id("CVE-2010-1257", "CVE-2010-1264");
   script_bugtraq_id(40409, 40559);
-  script_tag(name:"cvss_base", value:"10.0");
-  script_tag(name:"risk_factor", value:"Critical");
+  script_tag(name:"cvss_base", value:"4.3");
+  script_tag(name:"risk_factor", value:"Medium");
   script_name("Microsoft SharePoint Privilege Elevation Vulnerabilities (2028554)");
   desc = "
   Overview: This host has critical security update missing according to

Modified: trunk/openvas-plugins/scripts/secpod_ms10-040.nasl
===================================================================
--- trunk/openvas-plugins/scripts/secpod_ms10-040.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/secpod_ms10-040.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -33,8 +33,8 @@
   script_version("$Revision$: 1.0");
   script_bugtraq_id(40573);
   script_cve_id("CVE-2010-1256");
-  script_tag(name:"cvss_base", value:"7.1");
-  script_tag(name:"risk_factor", value:"High");
+  script_tag(name:"cvss_base", value:"8.5");
+  script_tag(name:"risk_factor", value:"Critical");
   script_name("Microsoft IIS Authentication Remote Code Execution Vulnerability (982666)");
   desc = "
   Overview: This host has important security update missing according to

Modified: trunk/openvas-plugins/scripts/secpod_ms10-045.nasl
===================================================================
--- trunk/openvas-plugins/scripts/secpod_ms10-045.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/secpod_ms10-045.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -30,8 +30,8 @@
   script_version("$Revision: 1.0 $");
   script_bugtraq_id(41446);
   script_cve_id("CVE-2010-0266");
-  script_tag(name:"cvss_base", value:"7.3");
-  script_tag(name:"risk_factor", value:"High");
+  script_tag(name:"cvss_base", value:"9.3");
+  script_tag(name:"risk_factor", value:"Critical");
   script_name("Microsoft Outlook SMB Attachment Remote Code Execution Vulnerability (978212)");
   desc = "
   Overview: This host has critical security update missing according to

Modified: trunk/openvas-plugins/scripts/secpod_ms10-047.nasl
===================================================================
--- trunk/openvas-plugins/scripts/secpod_ms10-047.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/secpod_ms10-047.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -32,7 +32,7 @@
   script_id(902093);
   script_version("$Revision$:1.0");
   script_bugtraq_id(42211, 42213, 42221);
-  script_tag(name:"cvss_base", value:"6.9");
+  script_tag(name:"cvss_base", value:"6.8");
   script_tag(name:"risk_factor", value:"High");
   script_cve_id("CVE-2010-1888", "CVE-2010-1889", "CVE-2010-1890");
   script_name("Microsoft Windows Kernel Privilege Elevation Vulnerabilities (981852)");

Modified: trunk/openvas-plugins/scripts/secpod_ms10-048.nasl
===================================================================
--- trunk/openvas-plugins/scripts/secpod_ms10-048.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/secpod_ms10-048.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -33,8 +33,8 @@
   script_cve_id("CVE-2010-1887", "CVE-2010-1894", "CVE-2010-1895",
                 "CVE-2010-1896", "CVE-2010-1897");
   script_bugtraq_id(42250, 39630, 42245, 42210, 42206);
-  script_tag(name:"cvss_base", value:"10.0");
-  script_tag(name:"risk_factor", value:"Critical");
+  script_tag(name:"cvss_base", value:"4.4");
+  script_tag(name:"risk_factor", value:"Medium");
   script_name("Microsoft Windows Kernel Mode Drivers Privilege Elevation Vulnerabilities (2160329)");
   desc = "
   Overview: This host has critical security update missing according to

Modified: trunk/openvas-plugins/scripts/secpod_ms10-049.nasl
===================================================================
--- trunk/openvas-plugins/scripts/secpod_ms10-049.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/secpod_ms10-049.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -32,7 +32,7 @@
   script_version("$Revision$:1.0");
   script_bugtraq_id(36935);
   script_cve_id("CVE-2009-3555");
-  script_tag(name:"cvss_base", value:"6.4");
+  script_tag(name:"cvss_base", value:"5.8");
   script_tag(name:"risk_factor", value:"High");
   script_name("Remote Code Execution Vulnerabilities in SChannel (980436)");
   desc = "

Modified: trunk/openvas-plugins/scripts/secpod_ms10-053.nasl
===================================================================
--- trunk/openvas-plugins/scripts/secpod_ms10-053.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/secpod_ms10-053.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -34,8 +34,8 @@
   script_cve_id("CVE-2010-1258", "CVE-2010-2556", "CVE-2010-2557",
                 "CVE-2010-2558", "CVE-2010-2559", "CVE-2010-2560");
   script_bugtraq_id(42257,42288,42289,42290,42292);
-  script_tag(name:"cvss_base", value:"9.3");
-  script_tag(name:"risk_factor", value:"Critical");
+  script_tag(name:"cvss_base", value:"4.3");
+  script_tag(name:"risk_factor", value:"Medium");
   script_name("Microsoft Internet Explorer Multiple Vulnerabilities (2183461)");
   desc = "
   Overview: This host has critical security update missing according to

Modified: trunk/openvas-plugins/scripts/secpod_ms10-057.nasl
===================================================================
--- trunk/openvas-plugins/scripts/secpod_ms10-057.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/secpod_ms10-057.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -30,7 +30,7 @@
   script_version("$Revision$: 1.0");
   script_cve_id("CVE-2010-2562");
   script_bugtraq_id(42199);
-  script_tag(name:"cvss_base", value:"10.0");
+  script_tag(name:"cvss_base", value:"9.3");
   script_tag(name:"risk_factor", value:"Critical");
   script_name("Microsoft Office Excel Remote Code Execution Vulnerability (2269707)");
   desc = "

Modified: trunk/openvas-plugins/scripts/secpod_ms10-058.nasl
===================================================================
--- trunk/openvas-plugins/scripts/secpod_ms10-058.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/secpod_ms10-058.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -29,8 +29,8 @@
   script_id(902232);
   script_version("$Revision$: 1.0");
   script_cve_id("CVE-2010-1892", "CVE-2010-1893");
-  script_tag(name:"cvss_base", value:"9.3");
-  script_tag(name:"risk_factor", value:"Critical");
+  script_tag(name:"cvss_base", value:"7.8");
+  script_tag(name:"risk_factor", value:"High");
   script_name("Microsoft Windows  TCP/IP Privilege Elevation Vulnerabilities (978886)");
   desc = "
   Overview: This host has critical security update missing according to

Modified: trunk/openvas-plugins/scripts/secpod_ms10-059.nasl
===================================================================
--- trunk/openvas-plugins/scripts/secpod_ms10-059.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/secpod_ms10-059.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -29,8 +29,8 @@
   script_id(902231);
   script_version("$Revision$: 1.0");
   script_cve_id("CVE-2010-2555", "CVE-2010-2554");
-  script_tag(name:"cvss_base", value:"9.3");
-  script_tag(name:"risk_factor", value:"Critical");
+  script_tag(name:"cvss_base", value:"6.8");
+  script_tag(name:"risk_factor", value:"High");
   script_name("Microsoft Windows Tracing Feature Privilege Elevation Vulnerabilities (982799)");
   desc = "
   Overview: This host has critical security update missing according to

Modified: trunk/openvas-plugins/scripts/secpod_ms10-061.nasl
===================================================================
--- trunk/openvas-plugins/scripts/secpod_ms10-061.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/secpod_ms10-061.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -30,7 +30,7 @@
   script_version("$Revision$: 1.0");
   script_cve_id("CVE-2010-2729");
   script_bugtraq_id(43073);
-  script_tag(name:"cvss_base", value:"10.0");
+  script_tag(name:"cvss_base", value:"9.3");
   script_tag(name:"risk_factor", value:"Critical");
   script_name("Microsoft Windows Print Spooler Service Remote Code Execution Vulnerability(2347290)");
   desc = "

Modified: trunk/openvas-plugins/scripts/secpod_ms10-062.nasl
===================================================================
--- trunk/openvas-plugins/scripts/secpod_ms10-062.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/secpod_ms10-062.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -29,7 +29,7 @@
   script_version("$Revision$: 1.0");
   script_bugtraq_id(43039);
   script_cve_id("CVE-2010-0818");
-  script_tag(name:"cvss_base", value:"10.0");
+  script_tag(name:"cvss_base", value:"9.3");
   script_tag(name:"risk_factor", value:"Critical");
   script_name("MPEG-4 Codec Remote Code Execution Vulnerability (975558)");
   desc = "

Modified: trunk/openvas-plugins/scripts/secpod_ms10-065.nasl
===================================================================
--- trunk/openvas-plugins/scripts/secpod_ms10-065.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/secpod_ms10-065.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -30,8 +30,8 @@
   script_version("$Revision$: 1.0");
   script_cve_id("CVE-2010-1899", "CVE-2010-2730", "CVE-2010-2731");
   script_bugtraq_id(43140, 43138, 41314);
-  script_tag(name:"cvss_base", value:"10.0");
-  script_tag(name:"risk_factor", value:"Critical");
+  script_tag(name:"cvss_base", value:"4.3");
+  script_tag(name:"risk_factor", value:"Medium");
   script_name("Microsoft Internet Information Services Remote Code Execution Vulnerabilities (2267960)");
   desc = "
   Overview: This host has critical security update missing according to

Modified: trunk/openvas-plugins/scripts/secpod_ms10-066.nasl
===================================================================
--- trunk/openvas-plugins/scripts/secpod_ms10-066.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/secpod_ms10-066.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -27,7 +27,7 @@
 {
   script_id(902300);
   script_version("$Revision$");
-  script_tag(name:"cvss_base", value:"10.0");
+  script_tag(name:"cvss_base", value:"9.3");
   script_tag(name:"risk_factor", value:"Critical");
   script_cve_id("CVE-2010-2567");
   script_bugtraq_id(43119);

Modified: trunk/openvas-plugins/scripts/secpod_ms10-068.nasl
===================================================================
--- trunk/openvas-plugins/scripts/secpod_ms10-068.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/secpod_ms10-068.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -28,8 +28,8 @@
 {
   script_id(902244);
   script_version("$Revision$: 1.0");
-  script_tag(name:"cvss_base", value:"7.8");
-  script_tag(name:"risk_factor", value:"High");
+  script_tag(name:"cvss_base", value:"9.0");
+  script_tag(name:"risk_factor", value:"Critical");
   script_cve_id("CVE-2010-0820");
   script_name("MS Local Security Authority Subsystem Service Privilege Elevation Vulnerability (983539)");
   desc = "

Modified: trunk/openvas-plugins/scripts/secpod_ms10-069.nasl
===================================================================
--- trunk/openvas-plugins/scripts/secpod_ms10-069.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/secpod_ms10-069.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -27,8 +27,8 @@
 {
   script_id(902301);
   script_version("$Revision$");
-  script_tag(name:"cvss_base", value:"10.0");
-  script_tag(name:"risk_factor", value:"Critical");
+  script_tag(name:"cvss_base", value:"6.9");
+  script_tag(name:"risk_factor", value:"High");
   script_cve_id("CVE-2010-1891");
   script_bugtraq_id(43121);
   script_name("Windows Client/Server Runtime Subsystem Privilege Elevation Vulnerability (2121546)");

Modified: trunk/openvas-plugins/scripts/secpod_ms10-073.nasl
===================================================================
--- trunk/openvas-plugins/scripts/secpod_ms10-073.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/secpod_ms10-073.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -30,8 +30,8 @@
   script_version("$Revision$: 1.0");
   script_cve_id("CVE-2010-2549", "CVE-2010-2743", "CVE-2010-2744");
   script_bugtraq_id(41280, 43774, 43773);
-  script_tag(name:"cvss_base", value:"10.0");
-  script_tag(name:"risk_factor", value:"Critical");
+  script_tag(name:"cvss_base", value:"7.2");
+  script_tag(name:"risk_factor", value:"High");
   script_name("Windows Kernel-Mode Drivers Privilege Elevation Vulnerabilities (981957)");
   desc = "
   Overview: This host has critical security update missing according to

Modified: trunk/openvas-plugins/scripts/secpod_ms10-074.nasl
===================================================================
--- trunk/openvas-plugins/scripts/secpod_ms10-074.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/secpod_ms10-074.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -30,7 +30,7 @@
   script_version("$Revision$: 1.0");
   script_cve_id("CVE-2010-3227");
   script_bugtraq_id(41333);
-  script_tag(name:"cvss_base", value:"10.0");
+  script_tag(name:"cvss_base", value:"9.3");
   script_tag(name:"risk_factor", value:"Critical");
   script_name("Microsoft Foundation Classes Could Allow Remote Code Execution Vulnerability (2387149)");
   desc = "

Modified: trunk/openvas-plugins/scripts/secpod_ms10-075.nasl
===================================================================
--- trunk/openvas-plugins/scripts/secpod_ms10-075.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/secpod_ms10-075.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -29,8 +29,8 @@
   script_id(902263);
   script_version("$Revision$: 1.0");
   script_cve_id("CVE-2010-3225");
-  script_tag(name:"cvss_base", value:"9.3");
-  script_tag(name:"risk_factor", value:"Critical");
+  script_tag(name:"cvss_base", value:"7.6");
+  script_tag(name:"risk_factor", value:"High");
   script_name("Microsoft Windows Media Player Network Sharing Remote Code Execution Vulnerability (2281679)");
   desc = "
   Overview: This host has critical security update missing according to

Modified: trunk/openvas-plugins/scripts/secpod_ms10-076.nasl
===================================================================
--- trunk/openvas-plugins/scripts/secpod_ms10-076.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/secpod_ms10-076.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -30,7 +30,7 @@
   script_version("$Revision$: 1.0");
   script_cve_id("CVE-2010-1883");
   script_bugtraq_id(43775);
-  script_tag(name:"cvss_base", value:"10.0");
+  script_tag(name:"cvss_base", value:"9.3");
   script_tag(name:"risk_factor", value:"Critical");
   script_name("Embedded OpenType Font Engine Remote Code Execution Vulnerability (982132)");
   desc = "

Modified: trunk/openvas-plugins/scripts/secpod_ms10-078.nasl
===================================================================
--- trunk/openvas-plugins/scripts/secpod_ms10-078.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/secpod_ms10-078.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -29,8 +29,8 @@
   script_version("$Revision$: 1.0");
   script_cve_id("CVE-2010-2740", "CVE-2010-2741");
   script_bugtraq_id(43779, 43778);
-  script_tag(name:"cvss_base", value:"10.0");
-  script_tag(name:"risk_factor", value:"Critical");
+  script_tag(name:"cvss_base", value:"7.2");
+  script_tag(name:"risk_factor", value:"High");
   script_name("OpenType Font (OTF) Format Driver Privilege Elevation Vulnerabilities (2279986)");
   desc = "
   Overview: This host has critical security update missing according to

Modified: trunk/openvas-plugins/scripts/secpod_ms10-080.nasl
===================================================================
--- trunk/openvas-plugins/scripts/secpod_ms10-080.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/secpod_ms10-080.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -32,7 +32,7 @@
                 "CVE-2010-3234", "CVE-2010-3235", "CVE-2010-3236", "CVE-2010-3237",
                 "CVE-2010-3238", "CVE-2010-3239", "CVE-2010-3240", "CVE-2010-3241",
                 "CVE-2010-3242");
-  script_tag(name:"cvss_base", value:"10.0");
+  script_tag(name:"cvss_base", value:"9.3");
   script_tag(name:"risk_factor", value:"Critical");
   script_name("Microsoft Office Excel Remote Code Execution Vulnerabilities (2293211)");
   desc = "

Modified: trunk/openvas-plugins/scripts/secpod_ms10-081.nasl
===================================================================
--- trunk/openvas-plugins/scripts/secpod_ms10-081.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/secpod_ms10-081.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -29,8 +29,8 @@
   script_id(901165);
   script_version("$Revision$: 1.0");
   script_cve_id("CVE-2010-2746");
-  script_tag(name:"cvss_base", value:"9.3");
-  script_tag(name:"risk_factor", value:"Critical");
+  script_tag(name:"cvss_base", value:"7.6");
+  script_tag(name:"risk_factor", value:"High");
   script_name("Windows Common Control Library Remote Code Execution Vulnerability (2296011)");
   desc = "
   Overview: This host has critical security update missing according to

Modified: trunk/openvas-plugins/scripts/secpod_ms10-083.nasl
===================================================================
--- trunk/openvas-plugins/scripts/secpod_ms10-083.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/secpod_ms10-083.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -28,8 +28,8 @@
 {
   script_id(902262);
   script_version("$Revision$: 1.0");
-  script_tag(name:"cvss_base", value:"7.8");
-  script_tag(name:"risk_factor", value:"High");
+  script_tag(name:"cvss_base", value:"9.3");
+  script_tag(name:"risk_factor", value:"Critical");
   script_cve_id("CVE-2010-1263");
   script_name("Microsoft Windows Shell and WordPad COM Validation Vulnerability (2405882)");
   desc = "

Modified: trunk/openvas-plugins/scripts/secpod_ms10-084.nasl
===================================================================
--- trunk/openvas-plugins/scripts/secpod_ms10-084.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/secpod_ms10-084.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -29,8 +29,8 @@
   script_version("$Revision$: 1.0");
   script_cve_id("CVE-2010-3222");
   script_bugtraq_id(43777);
-  script_tag(name:"cvss_base", value:"10.0");
-  script_tag(name:"risk_factor", value:"Critical");
+  script_tag(name:"cvss_base", value:"7.2");
+  script_tag(name:"risk_factor", value:"High");
   script_name("Windows Local Procedure Call Privilege Elevation Vulnerability (2360937)");
   desc = "
   Overview: This host has critical security update missing according to

Modified: trunk/openvas-plugins/scripts/secpod_ms10-088.nasl
===================================================================
--- trunk/openvas-plugins/scripts/secpod_ms10-088.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/secpod_ms10-088.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -28,7 +28,7 @@
 {
   script_id(900261);
   script_version("$Revision$:1.0");
-  script_tag(name:"cvss_base", value:"9.4");
+  script_tag(name:"cvss_base", value:"9.3");
   script_tag(name:"risk_factor", value:"Critical");
   script_cve_id("CVE-2010-2572", "CVE-2010-2573");
   script_bugtraq_id(44626, 44628);

Modified: trunk/openvas-plugins/scripts/secpod_ms10-091.nasl
===================================================================
--- trunk/openvas-plugins/scripts/secpod_ms10-091.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/secpod_ms10-091.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -30,8 +30,8 @@
   script_version("$Revision$: 1.0");
   script_bugtraq_id(45311, 45315, 45316);
   script_cve_id("CVE-2010-3956", "CVE-2010-3957", "CVE-2010-3959");
-  script_tag(name:"cvss_base", value:"6.8");
-  script_tag(name:"risk_factor", value:"High");
+  script_tag(name:"cvss_base", value:"9.3");
+  script_tag(name:"risk_factor", value:"Critical");
   script_name("Microsoft Windows OpenType Compact Font Format Driver Privilege Escalation Vulnerability (2296199)");
   desc = "
   Overview: This host has important security update missing according to

Modified: trunk/openvas-plugins/scripts/secpod_ms10-092.nasl
===================================================================
--- trunk/openvas-plugins/scripts/secpod_ms10-092.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/secpod_ms10-092.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -29,7 +29,7 @@
   script_id(902276);
   script_version("$Revision$: 1.0");
   script_cve_id("CVE-2010-3338");
-  script_tag(name:"cvss_base", value:"7.1");
+  script_tag(name:"cvss_base", value:"7.2");
   script_tag(name:"risk_factor", value:"High");
   script_name("Microsoft Windows Task Scheduler Elevation of Privilege Vulnerability (2305420)");
   desc = "

Modified: trunk/openvas-plugins/scripts/secpod_ms10-094.nasl
===================================================================
--- trunk/openvas-plugins/scripts/secpod_ms10-094.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/secpod_ms10-094.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -29,8 +29,8 @@
   script_version("$Revision$: 1.0");
   script_bugtraq_id(42855);
   script_cve_id("CVE-2010-3965");
-  script_tag(name:"cvss_base", value:"6.5");
-  script_tag(name:"risk_factor", value:"High");
+  script_tag(name:"cvss_base", value:"9.3");
+  script_tag(name:"risk_factor", value:"Critical");
   script_name("Microsoft Media Decompression Remote Code Execution Vulnerability (2447961)");
   desc = "
 

Modified: trunk/openvas-plugins/scripts/secpod_ms10-095.nasl
===================================================================
--- trunk/openvas-plugins/scripts/secpod_ms10-095.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/secpod_ms10-095.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -29,8 +29,8 @@
   script_id(902280);
   script_version("$Revision$: 1.0");
   script_cve_id("CVE-2010-3966");
-  script_tag(name:"cvss_base", value:"7.1");
-  script_tag(name:"risk_factor", value:"High");
+  script_tag(name:"cvss_base", value:"9.3");
+  script_tag(name:"risk_factor", value:"Critical");
   script_name("Microsoft Windows BranchCache Remote Code Execution Vulnerability (2385678)");
   desc = "
   Overview: This host has critical security update missing according to

Modified: trunk/openvas-plugins/scripts/secpod_ms10-098.nasl
===================================================================
--- trunk/openvas-plugins/scripts/secpod_ms10-098.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/secpod_ms10-098.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -30,8 +30,8 @@
   script_version("$Revision$: 1.0");
   script_cve_id("CVE-2010-3939", "CVE-2010-3940", "CVE-2010-3941", "CVE-2010-3942",
                 "CVE-2010-3943"," CVE-2010-3944");
-  script_tag(name:"cvss_base", value:"10.0");
-  script_tag(name:"risk_factor", value:"Critical");
+  script_tag(name:"cvss_base", value:"7.2");
+  script_tag(name:"risk_factor", value:"High");
   script_name("Windows Kernel-Mode Drivers Privilege Elevation Vulnerabilities (2436673)");
   desc = "
   Overview: This host has critical security update missing according to

Modified: trunk/openvas-plugins/scripts/secpod_ms10-099.nasl
===================================================================
--- trunk/openvas-plugins/scripts/secpod_ms10-099.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/secpod_ms10-099.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -30,7 +30,7 @@
   script_version("$Revision$: 1.0");
   script_bugtraq_id(45269);
   script_cve_id("CVE-2010-3963");
-  script_tag(name:"cvss_base", value:"6.8");
+  script_tag(name:"cvss_base", value:"7.2");
   script_tag(name:"risk_factor", value:"High");
   script_name("Routing and Remote Access Privilege Escalation Vulnerability (2440591)");
   desc = "

Modified: trunk/openvas-plugins/scripts/secpod_ms10-100.nasl
===================================================================
--- trunk/openvas-plugins/scripts/secpod_ms10-100.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/secpod_ms10-100.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -30,7 +30,7 @@
   script_version("$Revision$: 1.0");
   script_bugtraq_id(45318);
   script_cve_id("CVE-2010-3961");
-  script_tag(name:"cvss_base", value:"7.1");
+  script_tag(name:"cvss_base", value:"7.2");
   script_tag(name:"risk_factor", value:"High");
   script_name("Consent User Interface Privilege Escalation Vulnerability (2442962)");
   desc = "

Modified: trunk/openvas-plugins/scripts/secpod_ms10-101.nasl
===================================================================
--- trunk/openvas-plugins/scripts/secpod_ms10-101.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/secpod_ms10-101.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -29,7 +29,7 @@
   script_id(902277);
   script_version("$Revision$: 1.0");
   script_cve_id("CVE-2010-2742");
-  script_tag(name:"cvss_base", value:"7.1");
+  script_tag(name:"cvss_base", value:"5.4");
   script_tag(name:"risk_factor", value:"High");
   script_name("Microsoft Windows Netlogon Service Denial of Service Vulnerability (2207559)");
   desc = "

Modified: trunk/openvas-plugins/scripts/secpod_ms11-005.nasl
===================================================================
--- trunk/openvas-plugins/scripts/secpod_ms11-005.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/secpod_ms11-005.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -29,8 +29,8 @@
   script_id(902290);
   script_version("$Revision$: 1.0");
   script_cve_id("CVE-2011-0040");
-  script_tag(name:"cvss_base", value:"7.1");
-  script_tag(name:"risk_factor", value:"High");
+  script_tag(name:"cvss_base", value:"5.0");
+  script_tag(name:"risk_factor", value:"Medium");
   script_name("Microsoft Windows Active Directory SPN Denial of Service (2478953)");
   desc = "
   Overview: This host has critical security update missing according to

Modified: trunk/openvas-plugins/scripts/secpod_ms11-008.nasl
===================================================================
--- trunk/openvas-plugins/scripts/secpod_ms11-008.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/secpod_ms11-008.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -29,8 +29,8 @@
   script_version("$Revision$: 1.0");
   script_cve_id("CVE-2011-0092", "CVE-2011-0093");
   script_bugtraq_id(46138, 46137);
-  script_tag(name:"cvss_base", value:"7.6");
-  script_tag(name:"risk_factor", value:"High");
+  script_tag(name:"cvss_base", value:"9.3");
+  script_tag(name:"risk_factor", value:"Critical");
   script_name("Microsoft Visio Remote Code Execution Vulnerabilities (2451879)");
   desc = "
   Overview: This host has critical security update missing according to

Modified: trunk/openvas-plugins/scripts/secpod_ms11-009.nasl
===================================================================
--- trunk/openvas-plugins/scripts/secpod_ms11-009.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/secpod_ms11-009.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -30,7 +30,7 @@
   script_version("$Revision$: 1.0");
   script_cve_id("CVE-2011-0031");
   script_bugtraq_id(46139);
-  script_tag(name:"cvss_base", value:"6.5");
+  script_tag(name:"cvss_base", value:"7.1");
   script_tag(name:"risk_factor", value:"High");
   script_name("Microsoft JScript and VBScript Scripting Engines Information Disclosure Vulnerability (2475792)");
   desc = "

Modified: trunk/openvas-plugins/scripts/secpod_ms11-010.nasl
===================================================================
--- trunk/openvas-plugins/scripts/secpod_ms11-010.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/secpod_ms11-010.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -30,7 +30,7 @@
   script_version("$Revision$: 1.0");
   script_cve_id("CVE-2011-0030");
   script_bugtraq_id(46142);
-  script_tag(name:"cvss_base", value:"6.8");
+  script_tag(name:"cvss_base", value:"6.9");
   script_tag(name:"risk_factor", value:"High");
   script_name("Windows Client/Server Run-time Subsystem Privilege Elevation Vulnerability (2476687)");
   desc = "

Modified: trunk/openvas-plugins/scripts/secpod_ms11-012.nasl
===================================================================
--- trunk/openvas-plugins/scripts/secpod_ms11-012.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/secpod_ms11-012.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -31,7 +31,7 @@
   script_cve_id("CVE-2011-0086", "CVE-2011-0087", "CVE-2011-0088",
                 "CVE-2011-0089", "CVE-2011-0090");
   script_bugtraq_id(46141, 46148, 46147, 46149, 46150);
-  script_tag(name:"cvss_base", value:"6.8");
+  script_tag(name:"cvss_base", value:"7.2");
   script_tag(name:"risk_factor", value:"High");
   script_name("Windows Kernel-Mode Drivers Privilege Elevation Vulnerabilities (2479628)");
   desc = "

Modified: trunk/openvas-plugins/scripts/secpod_ms11-013.nasl
===================================================================
--- trunk/openvas-plugins/scripts/secpod_ms11-013.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/secpod_ms11-013.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -33,7 +33,7 @@
   script_version("$Revision$:1.1");
   script_cve_id("CVE-2011-0043", "CVE-2011-0091");
   script_bugtraq_id(46130, 46140);
-  script_tag(name:"cvss_base", value:"6.3");
+  script_tag(name:"cvss_base", value:"7.2");
   script_tag(name:"risk_factor", value:"High");
   script_name("Microsoft Kerberos Privilege Escalation Vulnerabilities (2496930)");
   desc = "

Modified: trunk/openvas-plugins/scripts/secpod_ms11-014.nasl
===================================================================
--- trunk/openvas-plugins/scripts/secpod_ms11-014.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/secpod_ms11-014.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -30,7 +30,7 @@
   script_version("$Revision$:1.0");
   script_cve_id("CVE-2011-0039");
   script_bugtraq_id(46152);
-  script_tag(name:"cvss_base", value:"6.3");
+  script_tag(name:"cvss_base", value:"7.2");
   script_tag(name:"risk_factor", value:"High");
   script_name("Microsoft Windows LSASS Privilege Escalation Vulnerability (2478960)");
   desc = "

Modified: trunk/openvas-plugins/scripts/secpod_ms11-017.nasl
===================================================================
--- trunk/openvas-plugins/scripts/secpod_ms11-017.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/secpod_ms11-017.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -30,7 +30,7 @@
   script_version("$Revision$:1.0");
   script_cve_id("CVE-2011-0029");
   script_bugtraq_id(46678);
-  script_tag(name:"cvss_base", value:"9.0");
+  script_tag(name:"cvss_base", value:"9.3");
   script_tag(name:"risk_factor", value:"Critical");
   script_name("Microsoft Remote Desktop Client Remote Code Execution Vulnerability (2508062)");
   desc = "

Modified: trunk/openvas-plugins/scripts/secpod_ms11-018.nasl
===================================================================
--- trunk/openvas-plugins/scripts/secpod_ms11-018.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/secpod_ms11-018.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -31,7 +31,7 @@
   script_cve_id("CVE-2011-0094", "CVE-2011-0346", "CVE-2011-1244",
                 "CVE-2011-1245", "CVE-2011-1345");
   script_bugtraq_id(47190, 45639, 47191, 47192, 46821);
-  script_tag(name:"cvss_base", value:"10.0");
+  script_tag(name:"cvss_base", value:"9.3");
   script_tag(name:"risk_factor", value:"Critical");
   script_name("Microsoft Internet Explorer Multiple Vulnerabilities (2497640)");
   desc = "

Modified: trunk/openvas-plugins/scripts/secpod_ms11-021.nasl
===================================================================
--- trunk/openvas-plugins/scripts/secpod_ms11-021.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/secpod_ms11-021.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -31,7 +31,7 @@
   script_cve_id("CVE-2011-0097", "CVE-2011-0098", "CVE-2011-0101", "CVE-2011-0103",
                 "CVE-2011-0104", "CVE-2011-0105", "CVE-2011-0978", "CVE-2011-0979",
                 "CVE-2011-0980");
-  script_tag(name:"cvss_base", value:"10.0");
+  script_tag(name:"cvss_base", value:"9.3");
   script_tag(name:"risk_factor", value:"Critical");
   script_name("Microsoft Office Excel Remote Code Execution Vulnerabilities (2489279)");
   desc = "

Modified: trunk/openvas-plugins/scripts/secpod_ms11-022.nasl
===================================================================
--- trunk/openvas-plugins/scripts/secpod_ms11-022.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/secpod_ms11-022.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -29,7 +29,7 @@
   script_id(902411);
   script_version("$Revision:1.0 $");
   script_cve_id("CVE-2011-0655", "CVE-2011-0656", "CVE-2011-0976");
-  script_tag(name:"cvss_base", value:"9.4");
+  script_tag(name:"cvss_base", value:"9.3");
   script_tag(name:"risk_factor", value:"Critical");
   script_name("Microsoft Office PowerPoint Remote Code Execution Vulnerabilities (2489283)");
   desc = "

Modified: trunk/openvas-plugins/scripts/secpod_ms11-024.nasl
===================================================================
--- trunk/openvas-plugins/scripts/secpod_ms11-024.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/secpod_ms11-024.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -32,7 +32,7 @@
   script_id(902408);
   script_version("$Revision: 1.0$");
   script_cve_id("CVE-2010-3974");
-  script_tag(name:"cvss_base", value:"6.8");
+  script_tag(name:"cvss_base", value:"7.6");
   script_tag(name:"risk_factor", value:"High");
   script_name("Windows Fax Cover Page Editor Remote Code Execution Vulnerability (2527308)");
   desc = "

Modified: trunk/openvas-plugins/scripts/secpod_ms11-026.nasl
===================================================================
--- trunk/openvas-plugins/scripts/secpod_ms11-026.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/secpod_ms11-026.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -29,8 +29,8 @@
   script_id(902409);
   script_version("$Revision: 1.0$");
   script_cve_id("CVE-2011-0096");
-  script_tag(name:"cvss_base", value:"6.8");
-  script_tag(name:"risk_factor", value:"High");
+  script_tag(name:"cvss_base", value:"4.3");
+  script_tag(name:"risk_factor", value:"Medium");
   script_name("Windows MHTML Information Disclosure Vulnerability (2503658)");
   desc = "
   Overview: This host has critical security update missing according to

Modified: trunk/openvas-plugins/scripts/secpod_ms11-029.nasl
===================================================================
--- trunk/openvas-plugins/scripts/secpod_ms11-029.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/secpod_ms11-029.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -30,7 +30,7 @@
   script_version("$Revision$: 1.0");
   script_cve_id("CVE-2011-0041");
   script_bugtraq_id(47250);
-  script_tag(name:"cvss_base", value:"10.0");
+  script_tag(name:"cvss_base", value:"9.3");
   script_tag(name:"risk_factor", value:"Critical");
   script_name("Microsoft GDI+ Remote Code Execution Vulnerability (2489979)");
   desc = "

Modified: trunk/openvas-plugins/scripts/secpod_ms11-030.nasl
===================================================================
--- trunk/openvas-plugins/scripts/secpod_ms11-030.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/secpod_ms11-030.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -30,8 +30,8 @@
   script_version("$Revision:1.0 $");
   script_bugtraq_id(47242);
   script_cve_id("CVE-2011-0657");
-  script_tag(name:"cvss_base", value:"10.0");
-  script_tag(name:"risk_factor", value:"Critical");
+  script_tag(name:"cvss_base", value:"7.5");
+  script_tag(name:"risk_factor", value:"High");
   script_name("Microsoft DNS Resolution Remote Code Execution Vulnerability (2509553)");
   desc = "
   Overview: This host has critical security update missing according to

Modified: trunk/openvas-plugins/scripts/secpod_ms11-034.nasl
===================================================================
--- trunk/openvas-plugins/scripts/secpod_ms11-034.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/secpod_ms11-034.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -37,7 +37,7 @@
                 "CVE-2011-1240", "CVE-2011-1241", "CVE-2011-1242", "CVE-2011-0673", "CVE-2011-0676",
                 "CVE-2011-0677", "CVE-2011-1225", "CVE-2011-1226", "CVE-2011-1227", "CVE-2011-1228",
                 "CVE-2011-1229", "CVE-2011-1230", "CVE-2011-1231", "CVE-2011-1232", "CVE-2011-1233");
-  script_tag(name:"cvss_base", value:"6.8");
+  script_tag(name:"cvss_base", value:"7.2");
   script_tag(name:"risk_factor", value:"High");
   script_name("Windows Kernel-Mode Drivers Privilege Elevation Vulnerabilities (2506223)");
   desc = "

Modified: trunk/openvas-plugins/scripts/secpod_ms11-035.nasl
===================================================================
--- trunk/openvas-plugins/scripts/secpod_ms11-035.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/secpod_ms11-035.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -30,7 +30,7 @@
   script_version("$Revision: 1.0$");
   script_cve_id("CVE-2011-1248");
   script_bugtraq_id(47730);
-  script_tag(name:"cvss_base", value:"10.0");
+  script_tag(name:"cvss_base", value:"9.3");
   script_tag(name:"risk_factor", value:"Critical");
   script_name("Microsoft Windows WINS Remote Code Execution Vulnerability (2524426)");
   desc = "

Modified: trunk/openvas-plugins/scripts/secpod_ms11-036.nasl
===================================================================
--- trunk/openvas-plugins/scripts/secpod_ms11-036.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/secpod_ms11-036.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -29,7 +29,7 @@
   script_id(902430);
   script_version("$Revision: 1.0$");
   script_cve_id("CVE-2011-1269", "CVE-2011-1270");
-  script_tag(name:"cvss_base", value:"9.4");
+  script_tag(name:"cvss_base", value:"9.3");
   script_tag(name:"risk_factor", value:"Critical");
   script_name("Microsoft Office PowerPoint Remote Code Execution Vulnerabilities (2545814)");
   desc = "

Modified: trunk/openvas-plugins/scripts/secpod_ms11-037.nasl
===================================================================
--- trunk/openvas-plugins/scripts/secpod_ms11-037.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/secpod_ms11-037.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -29,8 +29,8 @@
   script_id(902441);
   script_version("$Revision: 1.0$");
   script_cve_id("CVE-2011-1894");
-  script_tag(name:"cvss_base", value:"6.8");
-  script_tag(name:"risk_factor", value:"High");
+  script_tag(name:"cvss_base", value:"4.3");
+  script_tag(name:"risk_factor", value:"Medium");
   script_name("Windows MHTML Information Disclosure Vulnerability (2544893)");
   desc = "
   Overview: This host has important security update missing according to

Modified: trunk/openvas-plugins/scripts/secpod_ms11-038.nasl
===================================================================
--- trunk/openvas-plugins/scripts/secpod_ms11-038.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/secpod_ms11-038.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -30,8 +30,8 @@
   script_version("$Revision: 1.0$");
   script_cve_id("CVE-2011-0658");
   script_bugtraq_id(48174);
-  script_tag(name:"cvss_base", value:"6.8");
-  script_tag(name:"risk_factor", value:"High");
+  script_tag(name:"cvss_base", value:"9.3");
+  script_tag(name:"risk_factor", value:"Critical");
   script_name("Microsoft Windows OLE Automation Remote Code Execution Vulnerability (2476490)");
   desc = "
   Overview: This host has critical security update missing according to

Modified: trunk/openvas-plugins/scripts/secpod_ms11-044.nasl
===================================================================
--- trunk/openvas-plugins/scripts/secpod_ms11-044.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/secpod_ms11-044.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -30,8 +30,8 @@
   script_version("$Revision: 1.0$");
   script_cve_id("CVE-2011-1271");
   script_bugtraq_id(47834);
-  script_tag(name:"cvss_base", value:"9.3");
-  script_tag(name:"risk_factor", value:"Critical");
+  script_tag(name:"cvss_base", value:"5.1");
+  script_tag(name:"risk_factor", value:"High");
   script_name("Microsoft .NET Framework Remote Code Execution Vulnerability (2538814)");
   desc = "
   Overview: This host has critical security update missing according to

Modified: trunk/openvas-plugins/scripts/secpod_ms11-045.nasl
===================================================================
--- trunk/openvas-plugins/scripts/secpod_ms11-045.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/secpod_ms11-045.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -31,7 +31,7 @@
   script_cve_id("CVE-2011-1272", "CVE-2011-1273", "CVE-2011-1274", "CVE-2011-1275",
                 "CVE-2011-1276", "CVE-2011-1277", "CVE-2011-1278", "CVE-2011-1279");
   script_bugtraq_id(48158, 48159, 48157, 48160, 48161, 48162, 48163, 48164);
-  script_tag(name:"cvss_base", value:"10.0");
+  script_tag(name:"cvss_base", value:"9.3");
   script_tag(name:"risk_factor", value:"Critical");
   script_name("Microsoft Office Excel Remote Code Execution Vulnerabilities (2537146)");
   desc = "

Modified: trunk/openvas-plugins/scripts/secpod_ms11-046.nasl
===================================================================
--- trunk/openvas-plugins/scripts/secpod_ms11-046.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/secpod_ms11-046.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -29,7 +29,7 @@
   script_id(902442);
   script_version("$Revision: 1.0$");
   script_cve_id("CVE-2011-1249");
-  script_tag(name:"cvss_base", value:"6.8");
+  script_tag(name:"cvss_base", value:"7.2");
   script_tag(name:"risk_factor", value:"High");
   script_name("MS Windows Ancillary Function Driver Privilege Elevation Vulnerability");
   desc = "

Modified: trunk/openvas-plugins/scripts/secpod_ms11-048.nasl
===================================================================
--- trunk/openvas-plugins/scripts/secpod_ms11-048.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/secpod_ms11-048.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -29,8 +29,8 @@
   script_id(902440);
   script_version("$Revision: 1.0 $");
   script_cve_id("CVE-2011-1267");
-  script_tag(name:"cvss_base", value:"10.0");
-  script_tag(name:"risk_factor", value:"Critical");
+  script_tag(name:"cvss_base", value:"7.8");
+  script_tag(name:"risk_factor", value:"High");
   script_name("Microsoft Windows SMB Server Remote Code Execution Vulnerability (2536275)");
   desc = "
   Overview: This host has important security update missing according to

Modified: trunk/openvas-plugins/scripts/secpod_ms11-050.nasl
===================================================================
--- trunk/openvas-plugins/scripts/secpod_ms11-050.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/secpod_ms11-050.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -33,8 +33,8 @@
                 "CVE-2011-1260", "CVE-2011-1261", "CVE-2011-1262");
   script_bugtraq_id(48200, 48202, 48203, 48199, 48204, 48206, 48207, 48201, 48208,
                     48210, 48211);
-  script_tag(name:"cvss_base", value:"10.0");
-  script_tag(name:"risk_factor", value:"Critical");
+  script_tag(name:"cvss_base", value:"4.3");
+  script_tag(name:"risk_factor", value:"Medium");
   script_name("Microsoft Internet Explorer Multiple Vulnerabilities (2530548)");
   desc = "
   Overview: This host has critical security update missing according to

Modified: trunk/openvas-plugins/scripts/secpod_ms11-051.nasl
===================================================================
--- trunk/openvas-plugins/scripts/secpod_ms11-051.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/secpod_ms11-051.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -30,7 +30,7 @@
   script_version("$Revision$:1.0");
   script_bugtraq_id(48175);
   script_cve_id("CVE-2011-1264");
-  script_tag(name:"cvss_base", value:"5.0");
+  script_tag(name:"cvss_base", value:"4.3");
   script_tag(name:"risk_factor", value:"Medium");
   script_name("Active Directory Certificate Services Web Enrollment Elevation of Privilege Vulnerability (2518295)");
   desc = "

Modified: trunk/openvas-plugins/scripts/secpod_ms11-052.nasl
===================================================================
--- trunk/openvas-plugins/scripts/secpod_ms11-052.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/secpod_ms11-052.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -30,7 +30,7 @@
   script_bugtraq_id(48173);
   script_cve_id("CVE-2011-1266");
   script_version("$Revision: 1.0$");
-  script_tag(name:"cvss_base", value:"10.0");
+  script_tag(name:"cvss_base", value:"9.3");
   script_tag(name:"risk_factor", value:"Critical");
   script_name("Internet Explorer Vector Markup Language Remote Code Execution Vulnerability (2544521)");
   desc = "

Modified: trunk/openvas-plugins/scripts/secpod_ms11-054.nasl
===================================================================
--- trunk/openvas-plugins/scripts/secpod_ms11-054.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/secpod_ms11-054.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -35,7 +35,7 @@
                 "CVE-2011-1880", "CVE-2011-1881", "CVE-2011-1882",
                 "CVE-2011-1883", "CVE-2011-1884", "CVE-2011-1885",
                 "CVE-2011-1886", "CVE-2011-1887", "CVE-2011-1888");
-  script_tag(name:"cvss_base", value:"6.8");
+  script_tag(name:"cvss_base", value:"7.2");
   script_tag(name:"risk_factor", value:"High");
   script_name("Windows Kernel-Mode Drivers Privilege Elevation Vulnerabilities (2555917)");
   desc = "

Modified: trunk/openvas-plugins/scripts/secpod_ms11-055.nasl
===================================================================
--- trunk/openvas-plugins/scripts/secpod_ms11-055.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/secpod_ms11-055.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -29,8 +29,8 @@
   script_version("$Revision: 1.0$");
   script_cve_id("CVE-2010-3148");
   script_bugtraq_id(42681);
-  script_tag(name:"cvss_base", value:"7.6");
-  script_tag(name:"risk_factor", value:"High");
+  script_tag(name:"cvss_base", value:"9.3");
+  script_tag(name:"risk_factor", value:"Critical");
   script_name("Microsoft Visio Remote Code Execution Vulnerability (2560847)");
   desc = "
   Overview: This host has important security update missing according to

Modified: trunk/openvas-plugins/scripts/secpod_ms11-056.nasl
===================================================================
--- trunk/openvas-plugins/scripts/secpod_ms11-056.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/secpod_ms11-056.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -31,7 +31,7 @@
   script_cve_id("CVE-2011-1281", "CVE-2011-1282", "CVE-2011-1283",
                 "CVE-2011-1284", "CVE-2011-1870");
   script_bugtraq_id(48588, 48598, 48604, 48606, 48605);
-  script_tag(name:"cvss_base", value:"6.8");
+  script_tag(name:"cvss_base", value:"7.2");
   script_tag(name:"risk_factor", value:"High");
   script_name("Microsoft Windows CSRSS Privilege Escalation Vulnerabilities (2507938)");
   desc = "

Modified: trunk/openvas-plugins/scripts/secpod_ms_access_snapshot_viewer_actvx_vuln_900004.nasl
===================================================================
--- trunk/openvas-plugins/scripts/secpod_ms_access_snapshot_viewer_actvx_vuln_900004.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/secpod_ms_access_snapshot_viewer_actvx_vuln_900004.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -31,7 +31,7 @@
  script_cve_id("CVE-2008-2463");
  script_copyright("Copyright 2008 SecPod");
  script_version ("Revision: 1.5 ");
- script_tag(name:"cvss_base", value:"7.5");
+ script_tag(name:"cvss_base", value:"6.8");
  script_tag(name:"risk_factor", value:"High");
  script_category(ACT_GATHER_INFO);
  script_family("Windows");

Modified: trunk/openvas-plugins/scripts/secpod_ms_ie_dos_vuln_mar10.nasl
===================================================================
--- trunk/openvas-plugins/scripts/secpod_ms_ie_dos_vuln_mar10.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/secpod_ms_ie_dos_vuln_mar10.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -29,7 +29,7 @@
   script_id(902151);
   script_version("$Revision$: 1.0");
   script_cve_id("CVE-2010-1127");
-  script_tag(name:"cvss_base", value:"4.3");
+  script_tag(name:"cvss_base", value:"5.0");
   script_tag(name:"risk_factor", value:"Medium");
   script_name("Microsoft Internet Explorer Denial of Service Vulnerability - Mar10");
   desc = "

Modified: trunk/openvas-plugins/scripts/secpod_ms_ie_iframe_dos_vuln.nasl
===================================================================
--- trunk/openvas-plugins/scripts/secpod_ms_ie_iframe_dos_vuln.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/secpod_ms_ie_iframe_dos_vuln.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -29,7 +29,7 @@
   script_id(902183);
   script_version("$Revision$");
   script_cve_id("CVE-2010-1991");
-  script_tag(name:"cvss_base", value:"4.3");
+  script_tag(name:"cvss_base", value:"5.0");
   script_tag(name:"risk_factor", value:"Medium"); 
   script_name("Microsoft Internet Explorer 'IFRAME' Denial Of Service Vulnerability");
   desc = "

Modified: trunk/openvas-plugins/scripts/secpod_ms_ie_mhtml_info_disc_vuln.nasl
===================================================================
--- trunk/openvas-plugins/scripts/secpod_ms_ie_mhtml_info_disc_vuln.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/secpod_ms_ie_mhtml_info_disc_vuln.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -28,8 +28,8 @@
 {
   script_id(902285);
   script_version("$Revision$:1.0");
-  script_tag(name:"cvss_base", value:"9.3");
-  script_tag(name:"risk_factor", value:"Critical");
+  script_tag(name:"cvss_base", value:"4.3");
+  script_tag(name:"risk_factor", value:"Medium");
   script_cve_id("CVE-2011-0096");
   script_bugtraq_id(46055);
   script_name("Microsoft Internet Explorer Information Disclosure Vulnerability (2501696)");

Modified: trunk/openvas-plugins/scripts/secpod_ms_iexplorer_dos_vuln_900131.nasl
===================================================================
--- trunk/openvas-plugins/scripts/secpod_ms_iexplorer_dos_vuln_900131.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/secpod_ms_iexplorer_dos_vuln_900131.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -31,8 +31,8 @@
  script_bugtraq_id(31215);
  script_copyright("Copyright (C) 2008 SecPod");
  script_version("Revision: 1.1 ");
- script_tag(name:"cvss_base", value:"7.1");
- script_tag(name:"risk_factor", value:"High");
+ script_tag(name:"cvss_base", value:"4.3");
+ script_tag(name:"risk_factor", value:"Medium");
  script_category(ACT_GATHER_INFO);
  script_family("Denial of Service");
  script_name("Microsoft Internet Explorer Denial of Service Vulnerability");

Modified: trunk/openvas-plugins/scripts/secpod_ms_org_chart_remote_code_exe_vuln_900120.nasl
===================================================================
--- trunk/openvas-plugins/scripts/secpod_ms_org_chart_remote_code_exe_vuln_900120.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/secpod_ms_org_chart_remote_code_exe_vuln_900120.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -31,7 +31,7 @@
  script_bugtraq_id(31059);
  script_copyright("Copyright (C) 2008 SecPod");
  script_version("Revision: 1.1 ");
- script_tag(name:"cvss_base", value:"8.3");
+ script_tag(name:"cvss_base", value:"9.3");
  script_tag(name:"risk_factor", value:"Critical");
  script_category(ACT_GATHER_INFO);
  script_family("Windows");
@@ -69,7 +69,7 @@
  CVSS Score :
         CVSS Base Score     : 8.3 (AV:N/AC:M/Au:NR/C:P/I:P/A:C)
         CVSS Temporal Score : 7.5
- Risk factor : High";
+ Risk factor : Critical";
 
  script_description(desc);
  script_dependencies("secpod_reg_enum.nasl");

Modified: trunk/openvas-plugins/scripts/secpod_ms_sharepoint_layouts_xss_vuln.nasl
===================================================================
--- trunk/openvas-plugins/scripts/secpod_ms_sharepoint_layouts_xss_vuln.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/secpod_ms_sharepoint_layouts_xss_vuln.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -29,7 +29,7 @@
   script_id(902176);
   script_version("$Revision$: 1.0");
   script_cve_id("CVE-2010-0817");
-  script_tag(name:"cvss_base", value:"3.5");
+  script_tag(name:"cvss_base", value:"4.3");
   script_tag(name:"risk_factor", value:"Medium");
   script_name("Microsoft SharePoint '_layouts/help.aspx' Cross Site Scripting Vulnerability");
   desc = "

Modified: trunk/openvas-plugins/scripts/secpod_ms_sql_server_2000_activex_bof_vuln_900125.nasl
===================================================================
--- trunk/openvas-plugins/scripts/secpod_ms_sql_server_2000_activex_bof_vuln_900125.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/secpod_ms_sql_server_2000_activex_bof_vuln_900125.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -31,8 +31,8 @@
  script_bugtraq_id(31129);
  script_copyright("Copyright (C) 2008 SecPod");
  script_version("Revision: 1.1 ");
- script_tag(name:"cvss_base", value:"8.3");
- script_tag(name:"risk_factor", value:"Critical");
+ script_tag(name:"cvss_base", value:"7.6");
+ script_tag(name:"risk_factor", value:"High");
  script_category(ACT_GATHER_INFO);
  script_family("Denial of Service");
  script_name("Microsoft SQL Server 2000 sqlvdir.dll ActiveX Buffer Overflow Vulnerability");

Modified: trunk/openvas-plugins/scripts/secpod_ms_word_code_exec_vuln_900006.nasl
===================================================================
--- trunk/openvas-plugins/scripts/secpod_ms_word_code_exec_vuln_900006.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/secpod_ms_word_code_exec_vuln_900006.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -31,8 +31,8 @@
  script_cve_id("CVE-2008-2244");
  script_copyright("Copyright (C) 2008 SecPod");
  script_version("Revision: 1.3 ");
- script_tag(name:"cvss_base", value:"6.8");
- script_tag(name:"risk_factor", value:"High");
+ script_tag(name:"cvss_base", value:"9.3");
+ script_tag(name:"risk_factor", value:"Critical");
  script_category(ACT_GATHER_INFO);
  script_family("Windows");
  script_name("Microsoft Word Could Allow Remote Code Execution Vulnerability");
@@ -70,7 +70,7 @@
  CVSS Score :
         CVSS Base Score     : 6.8 (AV:N/AC:M/Au:NR/C:P/I:P/A:P)
         CVSS Temporal Score : 5.0
- Risk factor : Medium";
+ Risk factor : Critical";
 
  script_description(desc);
  script_dependencies("secpod_reg_enum.nasl", "secpod_office_products_version_900032.nasl",

Modified: trunk/openvas-plugins/scripts/secpod_mysql_dos_vuln_900221.nasl
===================================================================
--- trunk/openvas-plugins/scripts/secpod_mysql_dos_vuln_900221.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/secpod_mysql_dos_vuln_900221.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -31,8 +31,8 @@
  script_cve_id("CVE-2008-3963");
  script_copyright("Copyright (C) 2008 SecPod");
  script_version("Revision: 1.1 ");
- script_tag(name:"cvss_base", value:"7.1");
- script_tag(name:"risk_factor", value:"High");
+ script_tag(name:"cvss_base", value:"4.0");
+ script_tag(name:"risk_factor", value:"Medium");
  script_category(ACT_GATHER_INFO);
  script_family("Denial of Service");
  script_name("MySQL Empty Bit-String Literal Denial of Service Vulnerability");
@@ -67,7 +67,7 @@
  CVSS Score :
         CVSS Base Score     : 7.1 (AV:N/AC:M/Au:NR/C:N/I:N/A:C)
         CVSS Temporal Score : 5.6
- Risk factor : High";
+ Risk factor : Medium";
 
  script_description(desc);
  script_dependencies("mysql_version.nasl");

Modified: trunk/openvas-plugins/scripts/secpod_nms_dvd_burning_sdk_actvx_vuln_900132.nasl
===================================================================
--- trunk/openvas-plugins/scripts/secpod_nms_dvd_burning_sdk_actvx_vuln_900132.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/secpod_nms_dvd_burning_sdk_actvx_vuln_900132.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -30,8 +30,8 @@
   script_bugtraq_id(31374);
   script_copyright("Copyright (C) 2008 SecPod");
   script_version("Revision: 1.1 ");
-  script_tag(name:"cvss_base", value:"5.1");
-  script_tag(name:"risk_factor", value:"High");
+  script_tag(name:"cvss_base", value:"9.3");
+  script_tag(name:"risk_factor", value:"Critical");
   script_category(ACT_GATHER_INFO);
   script_family("General");
   script_name("NuMedia Soft DVD Burning SDK Activex Control Remote Code Execution Vulnerability");
@@ -63,7 +63,7 @@
   CVSS Score :
     CVSS Base Score     : 5.1 (AV:N/AC:H/Au:NR/C:P/I:P/A:P)
     CVSS Temporal Score : 4.6
-  Risk factor : Medium";
+  Risk factor : Critical";
 
   script_description(desc);
   script_dependencies("secpod_reg_enum.nasl");

Modified: trunk/openvas-plugins/scripts/secpod_noticeware_email_svr_dos_vuln_900027.nasl
===================================================================
--- trunk/openvas-plugins/scripts/secpod_noticeware_email_svr_dos_vuln_900027.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/secpod_noticeware_email_svr_dos_vuln_900027.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -30,8 +30,8 @@
  script_bugtraq_id(30605);
  script_copyright("Copyright (C) 2008 SecPod");
  script_version("$Revision: 1.1 $");
- script_tag(name:"cvss_base", value:"7.1");
- script_tag(name:"risk_factor", value:"High");
+ script_tag(name:"cvss_base", value:"5.0");
+ script_tag(name:"risk_factor", value:"Medium");
  script_category(ACT_MIXED_ATTACK);
  script_family("Denial of Service");
  script_name("NoticeWare Email Server NG LOGIN Messages DoS Vulnerability");
@@ -61,7 +61,7 @@
  CVSS Score :
         CVSS Base Score     : 7.1 (AV:N/AC:M/Au:NR/C:N/I:N/A:C)
         CVSS Temporal Score : 5.6
- Risk factor : High";
+ Risk factor : Medium";
 
  script_description(desc);
  script_dependencies("find_service.nes", "secpod_reg_enum.nasl");

Modified: trunk/openvas-plugins/scripts/secpod_novell_iprint_client_actvx_bof_vuln_dec10.nasl
===================================================================
--- trunk/openvas-plugins/scripts/secpod_novell_iprint_client_actvx_bof_vuln_dec10.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/secpod_novell_iprint_client_actvx_bof_vuln_dec10.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -30,8 +30,8 @@
   script_version("$Revision$: 1.0");
   script_cve_id("CVE-2010-4321");
   script_bugtraq_id(44966);
-  script_tag(name:"cvss_base", value:"6.8");
-  script_tag(name:"risk_factor", value:"High");
+  script_tag(name:"cvss_base", value:"9.3");
+  script_tag(name:"risk_factor", value:"Critical");
   script_name("Novell iPrint Client 'ienipp.ocx' ActiveX Buffer Overflow Vulnerability");
   desc = "
   Overview: The host is installed with Novell iPrint Client and is prone to

Modified: trunk/openvas-plugins/scripts/secpod_novell_iprint_client_actvx_mult_vuln_900040.nasl
===================================================================
--- trunk/openvas-plugins/scripts/secpod_novell_iprint_client_actvx_mult_vuln_900040.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/secpod_novell_iprint_client_actvx_mult_vuln_900040.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -30,8 +30,8 @@
  script_cve_id("CVE-2008-2431",	"CVE-2008-2432");
  script_copyright("Copyright (C) 2008 SecPod");
  script_version("Revision: 1.2 ");
- script_tag(name:"cvss_base", value:"6.8");
- script_tag(name:"risk_factor", value:"High");
+ script_tag(name:"cvss_base", value:"9.3");
+ script_tag(name:"risk_factor", value:"Critical");
  script_category(ACT_GATHER_INFO);
  script_family("General");
  script_name("Novell iPrint Client ActiveX Control Multiple Vulnerabilities");
@@ -71,7 +71,7 @@
  CVSS Score :
         CVSS Base Score     : 6.8 (AV:N/AC:M/Au:NR/C:P/I:P/A:P)
         CVSS Temporal Score : 5.8
- Risk factor : Medium";
+ Risk factor : Critical";
  script_description(desc);
  script_dependencies("secpod_reg_enum.nasl");
  script_require_keys("SMB/WindowsVersion");

Modified: trunk/openvas-plugins/scripts/secpod_novell_iprint_client_mult_vuln_win.nasl
===================================================================
--- trunk/openvas-plugins/scripts/secpod_novell_iprint_client_mult_vuln_win.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/secpod_novell_iprint_client_mult_vuln_win.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -30,7 +30,7 @@
   script_version("$Revision$: 1.0");
   script_cve_id("CVE-2010-3105", "CVE-2010-1527");
   script_bugtraq_id(42576);
-  script_tag(name:"cvss_base", value:"10.0");
+  script_tag(name:"cvss_base", value:"9.3");
   script_tag(name:"risk_factor", value:"Critical");
   script_name("Novell iPrint Client Multiple Vulnerabilities (windows)");
   desc = "

Modified: trunk/openvas-plugins/scripts/secpod_ocs_inventory_ng_mult_sql_inj_vuln_may10.nasl
===================================================================
--- trunk/openvas-plugins/scripts/secpod_ocs_inventory_ng_mult_sql_inj_vuln_may10.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/secpod_ocs_inventory_ng_mult_sql_inj_vuln_may10.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -29,7 +29,7 @@
   script_id(902059);
   script_version("$Revision$: 1.0");
   script_cve_id("CVE-2010-1733");
-  script_tag(name:"cvss_base", value:"5.1");
+  script_tag(name:"cvss_base", value:"6.8");
   script_tag(name:"risk_factor", value:"High");
   script_name("OCS Inventory NG Multiple SQL Injection Vulnerabilities");
   desc = "

Modified: trunk/openvas-plugins/scripts/secpod_openoffice_code_exec_vuln_lin_900043.nasl
===================================================================
--- trunk/openvas-plugins/scripts/secpod_openoffice_code_exec_vuln_lin_900043.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/secpod_openoffice_code_exec_vuln_lin_900043.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -30,8 +30,8 @@
  script_cve_id("CVE-2008-3282");
  script_copyright("Copyright (C) 2008 SecPod");
  script_version("Revision: 1.2 ");
- script_tag(name:"cvss_base", value:"6.8");
- script_tag(name:"risk_factor", value:"High");
+ script_tag(name:"cvss_base", value:"9.3");
+ script_tag(name:"risk_factor", value:"Critical");
  script_category(ACT_GATHER_INFO);
  script_family("General");
  script_name("OpenOffice rtl_allocateMemory() Remote Code Execution Vulnerability (Lin)");
@@ -63,7 +63,7 @@
  CVSS Score :
         CVSS Base Score     : 6.8 (AV:N/AC:M/Au:NR/C:P/I:P/A:P)
         CVSS Temporal Score : 5.8
- Risk factor : High";
+ Risk factor : Critical";
 
  script_description(desc);
  script_dependencies("gather-package-list.nasl");

Modified: trunk/openvas-plugins/scripts/secpod_openoffice_code_exec_vuln_win_900042.nasl
===================================================================
--- trunk/openvas-plugins/scripts/secpod_openoffice_code_exec_vuln_win_900042.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/secpod_openoffice_code_exec_vuln_win_900042.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -30,8 +30,8 @@
  script_cve_id("CVE-2008-3282");
  script_copyright("Copyright (C) 2008 SecPod");
  script_version("Revision: 1.1 ");
- script_tag(name:"cvss_base", value:"6.8");
- script_tag(name:"risk_factor", value:"High");
+ script_tag(name:"cvss_base", value:"9.3");
+ script_tag(name:"risk_factor", value:"Critical");
  script_category(ACT_GATHER_INFO);
  script_family("General");
  script_name("OpenOffice rtl_allocateMemory() Remote Code Execution Vulnerability (Win)");
@@ -63,7 +63,7 @@
  CVSS Score :
         CVSS Base Score     : 6.8 (AV:N/AC:M/Au:NR/C:P/I:P/A:P)
         CVSS Temporal Score : 5.8
- Risk factor : High";
+ Risk factor : Critical";
 
  script_description(desc);
  script_dependencies("secpod_reg_enum.nasl");

Modified: trunk/openvas-plugins/scripts/secpod_openoffice_mult_vuln_win.nasl
===================================================================
--- trunk/openvas-plugins/scripts/secpod_openoffice_mult_vuln_win.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/secpod_openoffice_mult_vuln_win.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -28,7 +28,7 @@
 {
   script_id(902283);
   script_version("$Revision$: 1.0");
-  script_tag(name:"cvss_base", value:"8.5");
+  script_tag(name:"cvss_base", value:"9.3");
   script_tag(name:"risk_factor", value:"Critical");
   script_cve_id("CVE-2010-3450", "CVE-2010-3451", "CVE-2010-3452", "CVE-2010-3453",
                 "CVE-2010-3454", "CVE-2010-4253", "CVE-2010-4643");

Modified: trunk/openvas-plugins/scripts/secpod_openoffice_soffice_dir_traversal_vuln_win.nasl
===================================================================
--- trunk/openvas-plugins/scripts/secpod_openoffice_soffice_dir_traversal_vuln_win.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/secpod_openoffice_soffice_dir_traversal_vuln_win.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -28,8 +28,8 @@
 {
   script_id(902284);
   script_version("$Revision$: 1.0");
-  script_tag(name:"cvss_base", value:"8.5");
-  script_tag(name:"risk_factor", value:"Critical");
+  script_tag(name:"cvss_base", value:"6.9");
+  script_tag(name:"risk_factor", value:"High");
   script_cve_id("CVE-2010-3689");
   script_bugtraq_id(46031);
   script_name("OpenOffice.org 'soffice' Directory Traversal Vulnerability (Win)");

Modified: trunk/openvas-plugins/scripts/secpod_openvpn_client_code_exec_vuln_900024.nasl
===================================================================
--- trunk/openvas-plugins/scripts/secpod_openvpn_client_code_exec_vuln_900024.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/secpod_openvpn_client_code_exec_vuln_900024.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -30,7 +30,7 @@
  script_cve_id("CVE-2008-3459");
  script_copyright("Copyright (C) 2008 SecPod");
  script_version("Revision: 1.3 ");
- script_tag(name:"cvss_base", value:"6.0");
+ script_tag(name:"cvss_base", value:"7.6");
  script_tag(name:"risk_factor", value:"High");
  script_category(ACT_GATHER_INFO);
  script_family("General");
@@ -70,7 +70,7 @@
  CVSS Score :
         CVSS Base Score     : 6.0 (AV:N/AC:M/Au:SI/C:P/I:P/A:P)
         CVSS Temporal Score : 4.4
- Risk factor : Medium";
+ Risk factor : High";
 
  script_description(desc);
  script_dependencies("gather-package-list.nasl");

Modified: trunk/openvas-plugins/scripts/secpod_opera_mult_dos_vuln_win.nasl
===================================================================
--- trunk/openvas-plugins/scripts/secpod_opera_mult_dos_vuln_win.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/secpod_opera_mult_dos_vuln_win.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -29,8 +29,8 @@
   script_id(902182);
   script_version("$Revision$:1.0");
   script_cve_id("CVE-2010-1989", "CVE-2010-1993");
-  script_tag(name:"cvss_base", value:"9.3");
-  script_tag(name:"risk_factor", value:"Critical");
+  script_tag(name:"cvss_base", value:"5.0");
+  script_tag(name:"risk_factor", value:"Medium");
   script_name("Opera Browser Multiple Denial Of Service Vulnerability (Windows)");
   desc = "
   Overview: The host is installed with Opera Web Browser and is prone to

Modified: trunk/openvas-plugins/scripts/secpod_opera_mult_vuln_aug08_lin_900039.nasl
===================================================================
--- trunk/openvas-plugins/scripts/secpod_opera_mult_vuln_aug08_lin_900039.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/secpod_opera_mult_vuln_aug08_lin_900039.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -30,8 +30,8 @@
  script_bugtraq_id(30768);
  script_copyright("Copyright (C) 2008 SecPod");
  script_version("Revision: 1.2 ");
- script_tag(name:"cvss_base", value:"7.5");
- script_tag(name:"risk_factor", value:"High");
+ script_tag(name:"cvss_base", value:"5.0");
+ script_tag(name:"risk_factor", value:"Medium");
  script_category(ACT_GATHER_INFO);
  script_family("General");
  script_name("Opera Web Browser Multiple Security Vulnerabilities Aug-08 (Linux)");
@@ -73,7 +73,7 @@
  CVSS Score Report :
         CVSS Base Score     : 7.5 (AV:N/AC:L/Au:NR/C:P/I:P/A:P)
         CVSS Temporal Score : 5.5
- Risk factor : High";
+ Risk factor : Medium";
  script_description(desc);
  script_dependencies("gather-package-list.nasl",
                      "secpod_opera_detection_linux_900037.nasl");

Modified: trunk/openvas-plugins/scripts/secpod_opera_mult_vuln_aug08_win_900038.nasl
===================================================================
--- trunk/openvas-plugins/scripts/secpod_opera_mult_vuln_aug08_win_900038.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/secpod_opera_mult_vuln_aug08_win_900038.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -31,8 +31,8 @@
  script_bugtraq_id(30768);
  script_copyright("Copyright (C) 2008 SecPod");
  script_version("Revision: 1.1 ");
- script_tag(name:"cvss_base", value:"7.5");
- script_tag(name:"risk_factor", value:"High");
+ script_tag(name:"cvss_base", value:"5.0");
+ script_tag(name:"risk_factor", value:"Medium");
  script_category(ACT_GATHER_INFO);
  script_family("General");
  script_name("Opera Web Browser Multiple Security Vulnerabilities Aug-08 (Win)");
@@ -75,7 +75,7 @@
  CVSS Score Report :
         CVSS Base Score     : 7.5 (AV:N/AC:L/Au:NR/C:P/I:P/A:P)
         CVSS Temporal Score : 5.5 
- Risk factor : High";
+ Risk factor : Medium";
  script_description(desc);
  script_dependencies("secpod_reg_enum.nasl", "secpod_opera_detection_win_900036.nasl");
  script_require_keys("SMB/WindowsVersion");

Modified: trunk/openvas-plugins/scripts/secpod_opera_mult_vuln_july08_900001.nasl
===================================================================
--- trunk/openvas-plugins/scripts/secpod_opera_mult_vuln_july08_900001.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/secpod_opera_mult_vuln_july08_900001.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -29,7 +29,7 @@
  script_bugtraq_id(30068);
  script_copyright("Copyright 2008 SecPod");
  script_version("Revision: 1.2 ");
- script_tag(name:"cvss_base", value:"7.5");
+ script_tag(name:"cvss_base", value:"7.8");
  script_tag(name:"risk_factor", value:"High");
  script_category(ACT_GATHER_INFO);
  script_family("General");

Modified: trunk/openvas-plugins/scripts/secpod_oracle_java_mult_code_exec_vuln_win.nasl
===================================================================
--- trunk/openvas-plugins/scripts/secpod_oracle_java_mult_code_exec_vuln_win.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/secpod_oracle_java_mult_code_exec_vuln_win.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -30,8 +30,8 @@
   script_version("$Revision: 1.0$");
   script_cve_id("CVE-2010-4468", "CVE-2010-4471");
   script_bugtraq_id(46393, 46399);
-  script_tag(name:"cvss_base", value:"10.0");
-  script_tag(name:"risk_factor", value:"Critical");
+  script_tag(name:"cvss_base", value:"4.0");
+  script_tag(name:"risk_factor", value:"Medium");
   script_name("Oracle Java SE Code Execution Vulnerabilities (Windows)");
   desc = "
   Overview: This host is installed with Sun Java SE and is prone to multiple

Modified: trunk/openvas-plugins/scripts/secpod_oracle_java_mult_unspecified_vuln_win.nasl
===================================================================
--- trunk/openvas-plugins/scripts/secpod_oracle_java_mult_unspecified_vuln_win.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/secpod_oracle_java_mult_unspecified_vuln_win.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -31,8 +31,8 @@
   script_cve_id("CVE-2010-4422", "CVE-2010-4451", "CVE-2010-4452", "CVE-2010-4470",
                 "CVE-2010-4472", "CVE-2010-4474");
   script_bugtraq_id(46402, 46405, 46388, 46387, 46404, 46407);
-  script_tag(name:"cvss_base", value:"10.0");
-  script_tag(name:"risk_factor", value:"Critical");
+  script_tag(name:"cvss_base", value:"7.6");
+  script_tag(name:"risk_factor", value:"High");
   script_name("Oracle Java SE Multiple Unspecified Vulnerabilities (Windows)");
   desc = "
   Overview: This host is installed with Sun Java SE and is prone to multiple

Modified: trunk/openvas-plugins/scripts/secpod_oracle_java_mult_unspecified_vuln_win01_jun11.nasl
===================================================================
--- trunk/openvas-plugins/scripts/secpod_oracle_java_mult_unspecified_vuln_win01_jun11.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/secpod_oracle_java_mult_unspecified_vuln_win01_jun11.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -31,8 +31,8 @@
   script_cve_id("CVE-2011-0868", "CVE-2011-0869", "CVE-2011-0872", "CVE-2011-0786",
                 "CVE-2011-0788", "CVE-2011-0817", "CVE-2011-0863");
   script_bugtraq_id(48140, 48141, 48146, 48133, 48135, 48134, 48138);
-  script_tag(name:"cvss_base", value:"10.0");
-  script_tag(name:"risk_factor", value:"Critical");
+  script_tag(name:"cvss_base", value:"5.0");
+  script_tag(name:"risk_factor", value:"Medium");
   script_name("Oracle Java SE Multiple Unspecified Vulnerabilities 01 - June11 (Windows)");
   desc = "
   Overview: This host is installed with Oracle Java SE and is prone to multiple

Modified: trunk/openvas-plugins/scripts/secpod_oracle_java_mult_unspecified_vuln_win_feb11.nasl
===================================================================
--- trunk/openvas-plugins/scripts/secpod_oracle_java_mult_unspecified_vuln_win_feb11.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/secpod_oracle_java_mult_unspecified_vuln_win_feb11.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -33,8 +33,8 @@
                 "CVE-2010-4475", "CVE-2010-4476");
   script_bugtraq_id(46409, 46398, 46391, 46394, 46406, 46411, 46400, 46403, 46410,
                     46091);
-  script_tag(name:"cvss_base", value:"10.0");
-  script_tag(name:"risk_factor", value:"Critical");
+  script_tag(name:"cvss_base", value:"4.3");
+  script_tag(name:"risk_factor", value:"Medium");
   script_name("Oracle Java SE Multiple Unspecified Vulnerabilities (Windows)");
   desc = "
   Overview: This host is installed with Sun Java SE and is prone to multiple

Modified: trunk/openvas-plugins/scripts/secpod_personal_ftp_server_dos_vuln_900127.nasl
===================================================================
--- trunk/openvas-plugins/scripts/secpod_personal_ftp_server_dos_vuln_900127.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/secpod_personal_ftp_server_dos_vuln_900127.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -31,8 +31,8 @@
  script_bugtraq_id(31173);
  script_copyright("Copyright (C) 2008 SecPod");
  script_version("Revision: 1.1 ");
- script_tag(name:"cvss_base", value:"6.3");
- script_tag(name:"risk_factor", value:"High");
+ script_tag(name:"cvss_base", value:"5.0");
+ script_tag(name:"risk_factor", value:"Medium");
  script_category(ACT_GATHER_INFO);
  script_family("Denial of Service");
  script_name("Personal FTP Server RETR Command Remote Denial of Service Vulnerability");
@@ -63,7 +63,7 @@
  CVSS Score :
         CVSS Base Score     : 6.3 (AV:N/AC:M/Au:SI/C:N/I:N/A:C)
         CVSS Temporal Score : 5.7
- Risk factor : High";
+ Risk factor : Medium";
 
  script_description(desc);
  script_dependencies("secpod_reg_enum.nasl", "find_service.nes");

Modified: trunk/openvas-plugins/scripts/secpod_php_bof_vuln_win.nasl
===================================================================
--- trunk/openvas-plugins/scripts/secpod_php_bof_vuln_win.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/secpod_php_bof_vuln_win.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -30,7 +30,7 @@
   script_version("$Revision: 1.0$");
   script_cve_id("CVE-2011-1938");
   script_bugtraq_id(47950);
-  script_tag(name:"cvss_base", value:"5.6");
+  script_tag(name:"cvss_base", value:"7.5");
   script_tag(name:"risk_factor", value:"High");
   script_name("PHP 'socket_connect()' Buffer Overflow Vulnerability");
   desc = "

Modified: trunk/openvas-plugins/scripts/secpod_php_format_string_vuln.nasl
===================================================================
--- trunk/openvas-plugins/scripts/secpod_php_format_string_vuln.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/secpod_php_format_string_vuln.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -29,8 +29,8 @@
   script_id(902317);
   script_version("$Revision$: 1.1");
   script_cve_id("CVE-2010-2950", "CVE-2010-3436", "CVE-2010-4156");
-  script_tag(name:"cvss_base", value:"5.0");
-  script_tag(name:"risk_factor", value:"Medium");
+  script_tag(name:"cvss_base", value:"6.8");
+  script_tag(name:"risk_factor", value:"High");
   script_name("PHP 'phar_stream_flush' Format String Vulnerability");
   desc = "
   Overview: This host is running PHP and is prone to format string

Modified: trunk/openvas-plugins/scripts/secpod_phpmyadmin_remote_command_exe_vuln_900130.nasl
===================================================================
--- trunk/openvas-plugins/scripts/secpod_phpmyadmin_remote_command_exe_vuln_900130.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/secpod_phpmyadmin_remote_command_exe_vuln_900130.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -31,8 +31,8 @@
  script_bugtraq_id(31188);
  script_copyright("Copyright (C) 2008 SecPod");
  script_version("Revision: 1.1 ");
- script_tag(name:"cvss_base", value:"6.0");
- script_tag(name:"risk_factor", value:"High");
+ script_tag(name:"cvss_base", value:"8.5");
+ script_tag(name:"risk_factor", value:"Critical");
  script_category(ACT_GATHER_INFO);
  script_family("Web application abuses");
  script_name("phpMyAdmin 'server_databases.php' Remote Command Execution Vulnerability");
@@ -65,7 +65,7 @@
  CVSS Score :
         CVSS Base Score     : 6.0 (AV:N/AC:M/Au:SI/C:P/I:P/A:P)
         CVSS Temporal Score : 4.7 
- Risk factor : Medium";
+ Risk factor : Critical";
 
  script_description(desc);
  script_dependencies("secpod_phpmyadmin_detect_900129.nasl");

Modified: trunk/openvas-plugins/scripts/secpod_pidgin_intgr_overflow_lin_900009.nasl
===================================================================
--- trunk/openvas-plugins/scripts/secpod_pidgin_intgr_overflow_lin_900009.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/secpod_pidgin_intgr_overflow_lin_900009.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -31,8 +31,8 @@
  script_cve_id("CVE-2008-2927");
  script_copyright("Copyright (C) 2008 SecPod");
  script_version("Revision: 1.4 ");
- script_tag(name:"cvss_base", value:"5.0");
- script_tag(name:"risk_factor", value:"Medium");
+ script_tag(name:"cvss_base", value:"6.8");
+ script_tag(name:"risk_factor", value:"High");
  script_category(ACT_GATHER_INFO);
  script_family("General");
  script_name("Pidgin MSN SLP Message Integer Overflow Vulnerabilities (Linux)");
@@ -64,7 +64,7 @@
  CVSS Score Report :
         CVSS Base Score     : 5.0 (AV:N/AC:L/Au:NR/C:N/I:N/A:P)
         CVSS Temporal Score : 3.9
- Risk factor : Medium";
+ Risk factor : High";
  script_description(desc);
  script_dependencies("gather-package-list.nasl");
  script_require_keys("ssh/login/uname");

Modified: trunk/openvas-plugins/scripts/secpod_pidgin_intgr_overflow_win_900008.nasl
===================================================================
--- trunk/openvas-plugins/scripts/secpod_pidgin_intgr_overflow_win_900008.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/secpod_pidgin_intgr_overflow_win_900008.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -31,8 +31,8 @@
  script_cve_id("CVE-2008-2927");
  script_copyright("Copyright (C) 2008 SecPod");
  script_version("$Revision: 1.2 $");
- script_tag(name:"cvss_base", value:"5.0");
- script_tag(name:"risk_factor", value:"Medium");
+ script_tag(name:"cvss_base", value:"6.8");
+ script_tag(name:"risk_factor", value:"High");
  script_category(ACT_GATHER_INFO);
  script_family("General");
  script_name("Pidgin MSN SLP Message Integer Overflow Vulnerabilities (Win)");
@@ -64,7 +64,7 @@
  CVSS Score Report :
         CVSS Base Score     : 5.0 (AV:N/AC:L/Au:NR/C:N/I:N/A:P)
         CVSS Temporal Score : 3.9
- Risk factor : Medium";
+ Risk factor : High";
  script_description(desc);
  script_dependencies("secpod_reg_enum.nasl");
  script_require_keys("SMB/WindowsVersion");

Modified: trunk/openvas-plugins/scripts/secpod_proftpd_cmd_handling_sec_vuln_900133.nasl
===================================================================
--- trunk/openvas-plugins/scripts/secpod_proftpd_cmd_handling_sec_vuln_900133.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/secpod_proftpd_cmd_handling_sec_vuln_900133.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -31,7 +31,7 @@
  script_bugtraq_id(31289);
   script_copyright("Copyright (C) 2008 SecPod");
   script_version("Revision: 1.1 ");
-  script_tag(name:"cvss_base", value:"5.5");
+  script_tag(name:"cvss_base", value:"6.8");
   script_tag(name:"risk_factor", value:"High");
   script_category(ACT_GATHER_INFO);
   script_family("Web application abuses");
@@ -68,7 +68,7 @@
   CVSS Score :
     CVSS Base Score     : 5.5 (AV:N/AC:L/Au:SI/C:P/I:P/A:N)
     CVSS Temporal Score : 4.3
-  Risk factor : Medium";
+  Risk factor : High";
 
   script_description(desc);
   script_dependencies("find_service.nes");

Modified: trunk/openvas-plugins/scripts/secpod_python_mult_vuln_lin_900106.nasl
===================================================================
--- trunk/openvas-plugins/scripts/secpod_python_mult_vuln_lin_900106.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/secpod_python_mult_vuln_lin_900106.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -32,7 +32,7 @@
 		"CVE-2008-3143","CVE-2008-3144");
  script_copyright("Copyright (C) 2008 SecPod");
  script_version("Revision: 1.4 ");
- script_tag(name:"cvss_base", value:"6.8");
+ script_tag(name:"cvss_base", value:"7.5");
  script_tag(name:"risk_factor", value:"High");
  script_category(ACT_GATHER_INFO);
  script_family("Buffer overflow");
@@ -71,7 +71,7 @@
  CVSS Score :
         CVSS Base Score     : 6.8 (AV:N/AC:M/Au:NR/C:P/I:P/A:P)
         CVSS Temporal Score : 5.0
- Risk factor : Medium";
+ Risk factor : High";
  script_description(desc);
  script_dependencies("gather-package-list.nasl");
  script_require_keys("ssh/login/uname");

Modified: trunk/openvas-plugins/scripts/secpod_python_mult_vuln_win_900105.nasl
===================================================================
--- trunk/openvas-plugins/scripts/secpod_python_mult_vuln_win_900105.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/secpod_python_mult_vuln_win_900105.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -32,7 +32,7 @@
 	       "CVE-2008-3143","CVE-2008-3144");
  script_copyright("Copyright (C) 2008 SecPod");
  script_version("$Revision: 1.1 $");
- script_tag(name:"cvss_base", value:"6.8");
+ script_tag(name:"cvss_base", value:"7.5");
  script_tag(name:"risk_factor", value:"High");
  script_category(ACT_GATHER_INFO);
  script_family("Buffer overflow");
@@ -73,7 +73,7 @@
  CVSS Score :
         CVSS Base Score     : 6.8 (AV:N/AC:M/Au:NR/C:P/I:P/A:P)
         CVSS Temporal Score : 5.0
- Risk factor : Medium";
+ Risk factor : High";
  script_description(desc);
  script_dependencies("secpod_reg_enum.nasl");
  script_require_keys("SMB/WindowsVersion");

Modified: trunk/openvas-plugins/scripts/secpod_realplayer_swf_bof_vuln_900015.nasl
===================================================================
--- trunk/openvas-plugins/scripts/secpod_realplayer_swf_bof_vuln_900015.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/secpod_realplayer_swf_bof_vuln_900015.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -31,8 +31,8 @@
  script_cve_id("CVE-2007-5400");
  script_copyright("Copyright (C) 2008 SecPod");
  script_version("$Revision: 1.1 $");
- script_tag(name:"cvss_base", value:"6.8");
- script_tag(name:"risk_factor", value:"High");
+ script_tag(name:"cvss_base", value:"9.3");
+ script_tag(name:"risk_factor", value:"Critical");
  script_category(ACT_GATHER_INFO);
  script_family("Buffer overflow");
  script_name("RealPlayer SWF Frame Handling Buffer Overflow Vulnerability (Win)");
@@ -62,7 +62,7 @@
  CVSS Score :
         CVSS Base Score     : 6.8 (AV:N/AC:M/Au:NR/C:P/I:P/A:P)
         CVSS Temporal Score : 5.0
- Risk factor : Medium";
+ Risk factor : Critical";
  script_description(desc);
  script_dependencies("secpod_reg_enum.nasl");
  script_require_keys("SMB/WindowsVersion");

Modified: trunk/openvas-plugins/scripts/secpod_realvnc_dos_vuln_win_900019.nasl
===================================================================
--- trunk/openvas-plugins/scripts/secpod_realvnc_dos_vuln_win_900019.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/secpod_realvnc_dos_vuln_win_900019.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -30,7 +30,7 @@
  script_bugtraq_id(30499);
  script_copyright("Copyright (C) 2008 SecPod");
  script_version("$Revision: 1.2 $");
- script_tag(name:"cvss_base", value:"4.3");
+ script_tag(name:"cvss_base", value:"5.0");
  script_tag(name:"risk_factor", value:"Medium");
  script_category(ACT_GATHER_INFO);
  script_family("Denial of Service");

Modified: trunk/openvas-plugins/scripts/secpod_ruby_rails_sec_bypass_n_sql_inj_vuln.nasl
===================================================================
--- trunk/openvas-plugins/scripts/secpod_ruby_rails_sec_bypass_n_sql_inj_vuln.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/secpod_ruby_rails_sec_bypass_n_sql_inj_vuln.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -30,7 +30,7 @@
   script_version("$Revision$: 1.0");
   script_cve_id("CVE-2011-0448", "CVE-2011-0449");
   script_bugtraq_id(46292);
-  script_tag(name:"cvss_base", value:"6.8");
+  script_tag(name:"cvss_base", value:"7.5");
   script_tag(name:"risk_factor", value:"High");
   script_name("Ruby on Rails Security Bypass and SQL Injection Vulnerabilities");
   desc = "

Modified: trunk/openvas-plugins/scripts/secpod_simple_machines_forum_sec_bypass_vuln_900118.nasl
===================================================================
--- trunk/openvas-plugins/scripts/secpod_simple_machines_forum_sec_bypass_vuln_900118.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/secpod_simple_machines_forum_sec_bypass_vuln_900118.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -30,7 +30,7 @@
  script_bugtraq_id(31053);
  script_copyright("Copyright (C) 2008 SecPod");
  script_version("$Revision: 1.1 $");
- script_tag(name:"cvss_base", value:"6.4");
+ script_tag(name:"cvss_base", value:"7.5");
  script_tag(name:"risk_factor", value:"High");
  script_category(ACT_GATHER_INFO);
  script_family("Web application abuses");
@@ -65,7 +65,7 @@
  CVSS Score :
         CVSS Base Score      : 6.4 (AV:N/AC:L/Au:NR/C:P/I:P/A:N)
         CVSS  Temporal Score : 5.0
- Risk factor : Medium";
+ Risk factor : High";
 
  script_description(desc);
  script_dependencies("http_version.nasl");

Modified: trunk/openvas-plugins/scripts/secpod_softalk_mail_serv_imap_dos_vuln_900119.nasl
===================================================================
--- trunk/openvas-plugins/scripts/secpod_softalk_mail_serv_imap_dos_vuln_900119.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/secpod_softalk_mail_serv_imap_dos_vuln_900119.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -31,8 +31,8 @@
  script_bugtraq_id(30970);
  script_copyright("Copyright (C) 2008 SecPod");
  script_version("Revision: 1.1 ");
- script_tag(name:"cvss_base", value:"6.3");
- script_tag(name:"risk_factor", value:"High");
+ script_tag(name:"cvss_base", value:"4.0");
+ script_tag(name:"risk_factor", value:"Medium");
  script_category(ACT_GATHER_INFO);
  script_family("Denial of Service");
  script_name("Softalk Mail Server IMAP Denial of Service Vulnerability");
@@ -64,7 +64,7 @@
  CVSS Score :
         CVSS Base Score     : 6.3 (AV:N/AC:M/Au:SI/C:N/I:N/A:C)
         CVSS Temporal Score : 5.7
- Risk factor : High";
+ Risk factor : Medium";
 
  script_description(desc);
  script_dependencies("find_service.nes");

Modified: trunk/openvas-plugins/scripts/secpod_sun_java_jdk_mult_vuln_win_apr10.nasl
===================================================================
--- trunk/openvas-plugins/scripts/secpod_sun_java_jdk_mult_vuln_win_apr10.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/secpod_sun_java_jdk_mult_vuln_win_apr10.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -30,7 +30,7 @@
   script_version("$Revision$: 1.0");
   script_cve_id("CVE-2010-0886", "CVE-2010-0887", "CVE-2010-1423");
   script_bugtraq_id(39492);
-  script_tag(name:"cvss_base", value:"9.3");
+  script_tag(name:"cvss_base", value:"10.0");
   script_tag(name:"risk_factor", value:"Critical");
   script_name("Sun Java Deployment Toolkit Multiple Vulnerabilities (Windows)");
   desc = "

Modified: trunk/openvas-plugins/scripts/secpod_sun_java_jre_mult_vuln_lin_apr10.nasl
===================================================================
--- trunk/openvas-plugins/scripts/secpod_sun_java_jre_mult_vuln_lin_apr10.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/secpod_sun_java_jre_mult_vuln_lin_apr10.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -30,7 +30,7 @@
   script_version("$Revision$: 1.0");
   script_cve_id("CVE-2010-0886", "CVE-2010-0887", "CVE-2010-1423");
   script_bugtraq_id(39492);
-  script_tag(name:"cvss_base", value:"9.3");
+  script_tag(name:"cvss_base", value:"10.0");
   script_tag(name:"risk_factor", value:"Critical");
   script_name("Sun Java JRE Multiple Vulnerabilities (Linux)");
   desc = "

Modified: trunk/openvas-plugins/scripts/secpod_syncback_freeware_bof_vuln.nasl
===================================================================
--- trunk/openvas-plugins/scripts/secpod_syncback_freeware_bof_vuln.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/secpod_syncback_freeware_bof_vuln.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -30,8 +30,8 @@
   script_version("$Revision$: 1.0");
   script_cve_id("CVE-2010-1688");
   script_bugtraq_id(40311);
-  script_tag(name:"cvss_base", value:"7.5");
-  script_tag(name:"risk_factor", value:"High");
+  script_tag(name:"cvss_base", value:"9.3");
+  script_tag(name:"risk_factor", value:"Critical");
   script_name("SyncBack Profile Import Buffer Overflow Vulnerability");
   desc = "
   Overview: This host is installed with SyncBack Freeware and is prone

Modified: trunk/openvas-plugins/scripts/secpod_titan_ftp_server_cmd_processing_dos_vuln_900160.nasl
===================================================================
--- trunk/openvas-plugins/scripts/secpod_titan_ftp_server_cmd_processing_dos_vuln_900160.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/secpod_titan_ftp_server_cmd_processing_dos_vuln_900160.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -30,8 +30,8 @@
  script_bugtraq_id(31757);
   script_copyright("Copyright (C) 2008 SecPod");
   script_version("Revision: 1.1 ");
-  script_tag(name:"cvss_base", value:"6.3");
-  script_tag(name:"risk_factor", value:"High");
+  script_tag(name:"cvss_base", value:"5.0");
+  script_tag(name:"risk_factor", value:"Medium");
   script_category(ACT_GATHER_INFO);
   script_family("Denial of Service");
   script_name("Titan FTP Server 'SITE WHO' Command Remote DoS Vulnerability");

Modified: trunk/openvas-plugins/scripts/secpod_trellian_ftp_bof_vuln.nasl
===================================================================
--- trunk/openvas-plugins/scripts/secpod_trellian_ftp_bof_vuln.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/secpod_trellian_ftp_bof_vuln.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -30,8 +30,8 @@
   script_version("$Revision$: 1.0");
   script_cve_id("CVE-2010-1465");
   script_bugtraq_id(39598);
-  script_tag(name:"cvss_base", value:"6.8");
-  script_tag(name:"risk_factor", value:"High");
+  script_tag(name:"cvss_base", value:"9.3");
+  script_tag(name:"risk_factor", value:"Critical");
   script_name("Trellian FTP 'PASV' Response Buffer Overflow Vulnerability");
   desc = "
   Overview: This host is installed with Trellian FTP and is prone to buffer

Modified: trunk/openvas-plugins/scripts/secpod_trendmicro_officescan_auth_bypass_vuln_900205.nasl
===================================================================
--- trunk/openvas-plugins/scripts/secpod_trendmicro_officescan_auth_bypass_vuln_900205.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/secpod_trendmicro_officescan_auth_bypass_vuln_900205.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -31,8 +31,8 @@
  script_cve_id("CVE-2008-2433");
  script_copyright("Copyright (C) 2008 SecPod");
  script_version("$Revision: 1.1 $");
- script_tag(name:"cvss_base", value:"8.3");
- script_tag(name:"risk_factor", value:"Critical");
+ script_tag(name:"cvss_base", value:"7.5");
+ script_tag(name:"risk_factor", value:"High");
  script_category(ACT_GATHER_INFO);
  script_family("Privilege escalation");
  script_name("Trend Micro Web Management Authentication Bypass Vulnerability");

Modified: trunk/openvas-plugins/scripts/secpod_trendmicro_officescan_bof_vuln_900016.nasl
===================================================================
--- trunk/openvas-plugins/scripts/secpod_trendmicro_officescan_bof_vuln_900016.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/secpod_trendmicro_officescan_bof_vuln_900016.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -30,8 +30,8 @@
  script_bugtraq_id(30407);
  script_copyright("Copyright (C) 2008 SecPod");
  script_version("$Revision: 1.2 $");
- script_tag(name:"cvss_base", value:"6.8");
- script_tag(name:"risk_factor", value:"High");
+ script_tag(name:"cvss_base", value:"9.3");
+ script_tag(name:"risk_factor", value:"Critical");
  script_category(ACT_GATHER_INFO);
  script_family("Buffer overflow");
  script_name("Trend Micro OfficeScan ObjRemoveCtrl ActiveX Control BOF Vulnerability");
@@ -68,7 +68,7 @@
  CVSS Score :
         CVSS Base Score	    : 6.8 (AV:N/AC:M/Au:NR/C:P/I:P/A:P)
         CVSS Temporal Score : 6.1
- Risk factor : High";
+ Risk factor : Critical";
  script_description(desc);
  script_dependencies("secpod_reg_enum.nasl");
  script_require_keys("SMB/WindowsVersion");

Modified: trunk/openvas-plugins/scripts/secpod_trendmicro_officescan_bof_vuln_sept08_900220.nasl
===================================================================
--- trunk/openvas-plugins/scripts/secpod_trendmicro_officescan_bof_vuln_sept08_900220.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/secpod_trendmicro_officescan_bof_vuln_sept08_900220.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -66,7 +66,7 @@
  CVSS Score :
         CVSS Base Score     : 9.3 (AV:N/AC:M/Au:NR/C:C/I:C/A:C)
         CVSS Temporal Score : 7.1
- Risk factor : High";
+ Risk factor : Critical";
 
 if(description)
 {
@@ -75,7 +75,7 @@
  script_cve_id("CVE-2008-2437");
  script_copyright("Copyright (C) 2008 SecPod");
  script_version("Revision: 1.1 ");
- script_tag(name:"cvss_base", value:"9.3");
+ script_tag(name:"cvss_base", value:"10.0");
  script_tag(name:"risk_factor", value:"Critical");
  script_category(ACT_GATHER_INFO);
  script_family("Buffer overflow");

Modified: trunk/openvas-plugins/scripts/secpod_ttwm_sql_inj_vuln.nasl
===================================================================
--- trunk/openvas-plugins/scripts/secpod_ttwm_sql_inj_vuln.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/secpod_ttwm_sql_inj_vuln.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -29,7 +29,7 @@
   script_id(902135);
   script_version("$Revision$:1.0");
   script_cve_id("CVE-2009-4732");
-  script_tag(name:"cvss_base", value:"7.5");
+  script_tag(name:"cvss_base", value:"6.8");
   script_tag(name:"risk_factor", value:"High");
   script_name("TT Web Site Manager 'tt_name' Remote SQL Injection Vulnerability");
   desc = "

Modified: trunk/openvas-plugins/scripts/secpod_ultra_office_activex_control_mult_vuln_900208.nasl
===================================================================
--- trunk/openvas-plugins/scripts/secpod_ultra_office_activex_control_mult_vuln_900208.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/secpod_ultra_office_activex_control_mult_vuln_900208.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -34,8 +34,8 @@
  script_bugtraq_id(30861);
  script_copyright("Copyright (C) 2008 SecPod");
  script_version("Revision: 1.1 ");
- script_tag(name:"cvss_base", value:"6.8");
- script_tag(name:"risk_factor", value:"High");
+ script_tag(name:"cvss_base", value:"9.3");
+ script_tag(name:"risk_factor", value:"Critical");
  script_category(ACT_GATHER_INFO);
  script_family("Denial of Service");
  script_name("Ultra Office ActiveX Control Multiple Vulnerabilities");
@@ -75,7 +75,7 @@
  CVSS Score :
         CVSS Base Score     : 6.8 (AV:N/AC:M/Au:NR/C:P/I:P/A:P) 
         CVSS Temporal Score : 5.8
- Risk factor : High";
+ Risk factor : Critical";
 
  script_description(desc);
  script_dependencies("secpod_reg_enum.nasl");

Modified: trunk/openvas-plugins/scripts/secpod_vlc_media_player_bof_vuln_feb11_lin.nasl
===================================================================
--- trunk/openvas-plugins/scripts/secpod_vlc_media_player_bof_vuln_feb11_lin.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/secpod_vlc_media_player_bof_vuln_feb11_lin.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -30,7 +30,7 @@
   script_version("$Revision:1.0$");
   script_cve_id("CVE-2011-0522");
   script_bugtraq_id(46008);
-  script_tag(name:"cvss_base", value:"6.9");
+  script_tag(name:"cvss_base", value:"6.8");
   script_tag(name:"risk_factor", value:"High");
   script_name("VLC Media Player USF and Text Subtitles Decoders BOF Vulnerabilities (Linux)");
   desc = "

Modified: trunk/openvas-plugins/scripts/secpod_vlc_media_player_bof_vuln_feb11_win.nasl
===================================================================
--- trunk/openvas-plugins/scripts/secpod_vlc_media_player_bof_vuln_feb11_win.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/secpod_vlc_media_player_bof_vuln_feb11_win.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -30,7 +30,7 @@
   script_version("$Revision:1.0$");
   script_cve_id("CVE-2011-0522");
   script_bugtraq_id(46008);
-  script_tag(name:"cvss_base", value:"6.9");
+  script_tag(name:"cvss_base", value:"6.8");
   script_tag(name:"risk_factor", value:"High");
   script_name("VLC Media Player USF and Text Subtitles Decoders BOF Vulnerabilities (Windows)");
   desc = "

Modified: trunk/openvas-plugins/scripts/secpod_vlc_media_player_intgr_overflow_vuln_900112.nasl
===================================================================
--- trunk/openvas-plugins/scripts/secpod_vlc_media_player_intgr_overflow_vuln_900112.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/secpod_vlc_media_player_intgr_overflow_vuln_900112.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -31,8 +31,8 @@
  script_bugtraq_id(30718);
  script_copyright("Copyright 2008 SecPod");
  script_version("Revision: 1.1 ");
- script_tag(name:"cvss_base", value:"7.1");
- script_tag(name:"risk_factor", value:"High");
+ script_tag(name:"cvss_base", value:"9.3");
+ script_tag(name:"risk_factor", value:"Critical");
  script_category(ACT_GATHER_INFO);
  script_family("Denial of Service");
  script_name("VLC Media Player TTA Processing Integer Overflow Vulnerability");
@@ -64,7 +64,7 @@
  CVSS Score :
         CVSS Base Score     : 7.1 (AV:N/AC:M/Au:NR/C:N/I:N/A:C)
         CVSS Temporal Score : 6.4
- Risk factor : High";
+ Risk factor : Critical";
 
  script_description(desc);
  script_dependencies("secpod_reg_enum.nasl");

Modified: trunk/openvas-plugins/scripts/secpod_vmware_prdts_dos_vuln_win_apr10.nasl
===================================================================
--- trunk/openvas-plugins/scripts/secpod_vmware_prdts_dos_vuln_win_apr10.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/secpod_vmware_prdts_dos_vuln_win_apr10.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -29,8 +29,8 @@
   script_id(902173);
   script_version("$Revision$: 1.0");
   script_cve_id("CVE-2009-4811");
-  script_tag(name:"cvss_base", value:"10.0");
-  script_tag(name:"risk_factor", value:"Critical");
+  script_tag(name:"cvss_base", value:"5.0");
+  script_tag(name:"risk_factor", value:"Medium");
   script_name("VMware Authorization Service Denial of Service Vulnerability (Win) -Apr10");
   desc = "
   Overview: The host is installed with VMWare product(s) that are vulnerable to

Modified: trunk/openvas-plugins/scripts/secpod_vmware_prdts_sec_bypass_vuln_lin_sep10.nasl
===================================================================
--- trunk/openvas-plugins/scripts/secpod_vmware_prdts_sec_bypass_vuln_lin_sep10.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/secpod_vmware_prdts_sec_bypass_vuln_lin_sep10.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -29,8 +29,8 @@
   script_id(902261);
   script_version("$Revision$: 1.0");
   script_cve_id("CVE-2010-3277");
-  script_tag(name:"cvss_base", value:"10.0");
-  script_tag(name:"risk_factor", value:"Critical");
+  script_tag(name:"cvss_base", value:"2.1");
+  script_tag(name:"risk_factor", value:"Medium");
   script_name("VMware Products Security Bypass Vulnerability (Linux) -Sep10");
   desc = "
   Overview: The host is installed with VMWare product(s) which are vulnerable

Modified: trunk/openvas-plugins/scripts/secpod_vmware_prdts_sec_bypass_vuln_win_sep10.nasl
===================================================================
--- trunk/openvas-plugins/scripts/secpod_vmware_prdts_sec_bypass_vuln_win_sep10.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/secpod_vmware_prdts_sec_bypass_vuln_win_sep10.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -29,8 +29,8 @@
   script_id(902260);
   script_version("$Revision$: 1.0");
   script_cve_id("CVE-2010-3277");
-  script_tag(name:"cvss_base", value:"10.0");
-  script_tag(name:"risk_factor", value:"Critical");
+  script_tag(name:"cvss_base", value:"2.1");
+  script_tag(name:"risk_factor", value:"Medium");
   script_name("VMware Products Security Bypass Vulnerability (Win) -Sep10");
   desc = "
   Overview: The host is installed with VMWare product(s) which are vulnerable to

Modified: trunk/openvas-plugins/scripts/secpod_win_nslookup_remote_code_exe_vuln_900108.nasl
===================================================================
--- trunk/openvas-plugins/scripts/secpod_win_nslookup_remote_code_exe_vuln_900108.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/secpod_win_nslookup_remote_code_exe_vuln_900108.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -31,7 +31,7 @@
  script_bugtraq_id(30636);
  script_copyright("Copyright (C) 2008 SecPod");
  script_version("$Revision: 1.1 $");
- script_tag(name:"cvss_base", value:"8.3");
+ script_tag(name:"cvss_base", value:"9.3");
  script_tag(name:"risk_factor", value:"Critical");
  script_category(ACT_GATHER_INFO);
  script_family("Windows");
@@ -65,7 +65,7 @@
  CVSS Score :
         CVSS Base Score     : 8.3 (AV:N/AC:M/Au:NR/C:P/I:P/A:C)
         CVSS Temporal Score : 6.7
- Risk factor : High";
+ Risk factor : Critical";
 
  script_description(desc);
  script_dependencies("secpod_reg_enum.nasl");

Modified: trunk/openvas-plugins/scripts/secpod_wingate_imap_dos_vuln_900201.nasl
===================================================================
--- trunk/openvas-plugins/scripts/secpod_wingate_imap_dos_vuln_900201.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/secpod_wingate_imap_dos_vuln_900201.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -31,7 +31,7 @@
  script_bugtraq_id(30606);
  script_copyright("Copyright (C) 2008 SecPod");
  script_version("Revision: 1.1");
- script_tag(name:"cvss_base", value:"6.3");
+ script_tag(name:"cvss_base", value:"6.5");
  script_tag(name:"risk_factor", value:"High");
  script_category(ACT_GATHER_INFO);
  script_family("Denial of Service");
@@ -65,7 +65,7 @@
  CVSS Score :
         CVSS Base Score     : 6.3 (AV:N/AC:M/Au:N/Au:SI/C:N/I:N/A:C)
         CVSS Temporal Score : 5.7
- Risk factor : Medium";
+ Risk factor : High";
 
  script_description(desc);
  script_dependencies("secpod_reg_enum.nasl");

Modified: trunk/openvas-plugins/scripts/secpod_wireshark_mult_vuln_july08_lin_900011.nasl
===================================================================
--- trunk/openvas-plugins/scripts/secpod_wireshark_mult_vuln_july08_lin_900011.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/secpod_wireshark_mult_vuln_july08_lin_900011.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -31,8 +31,8 @@
  script_cve_id("CVE-2008-1561", "CVE-2008-1562", "CVE-2008-1563");
  script_copyright("Copyright (C) 2008 SecPod");
  script_version("Revision: 1.4 ");
- script_tag(name:"cvss_base", value:"6.8");
- script_tag(name:"risk_factor", value:"High");
+ script_tag(name:"cvss_base", value:"5.0");
+ script_tag(name:"risk_factor", value:"Medium");
  script_category(ACT_GATHER_INFO);
  script_family("General");
  script_name("Wireshark Multiple Vulnerabilities - July08 (Linux)");
@@ -64,7 +64,7 @@
  CVSS Score Report :
 	CVSS Base Score     : 6.8 (AV:N/AC:M/Au:NR/C:P/I:P/A:P)
 	CVSS Temporal Score : 5.3
- Risk factor : High";
+ Risk factor : Medium";
  script_description(desc);
  script_dependencies("gather-package-list.nasl");
  script_require_keys("ssh/login/uname");

Modified: trunk/openvas-plugins/scripts/secpod_wireshark_mult_vuln_july08_win_900010.nasl
===================================================================
--- trunk/openvas-plugins/scripts/secpod_wireshark_mult_vuln_july08_win_900010.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/secpod_wireshark_mult_vuln_july08_win_900010.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -31,8 +31,8 @@
  script_cve_id("CVE-2008-1561", "CVE-2008-1562", "CVE-2008-1563");
  script_copyright("Copyright (C) 2008 SecPod");
  script_version("Revision: 1.2 ");
- script_tag(name:"cvss_base", value:"6.8");
- script_tag(name:"risk_factor", value:"High");
+ script_tag(name:"cvss_base", value:"5.0");
+ script_tag(name:"risk_factor", value:"Medium");
  script_category(ACT_GATHER_INFO);
  script_family("General");
  script_name("Wireshark Multiple Vulnerabilities - July08 (Win)");
@@ -64,7 +64,7 @@
  CVSS Score Report :
 	CVSS Base Score     : 6.8 (AV:N/AC:M/Au:NR/C:P/I:P/A:P)
 	CVSS Temporal Score : 5.3 
- Risk factor : High";
+ Risk factor : Medium";
  script_description(desc);
  script_dependencies("secpod_reg_enum.nasl");
  script_require_keys("SMB/WindowsVersion");

Modified: trunk/openvas-plugins/scripts/secpod_wireshark_mult_vuln_sept08_lin_900213.nasl
===================================================================
--- trunk/openvas-plugins/scripts/secpod_wireshark_mult_vuln_sept08_lin_900213.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/secpod_wireshark_mult_vuln_sept08_lin_900213.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -43,7 +43,7 @@
  CVSS Score Report :
         CVSS Base Score     : 7.1 (AV:N/AC:M/Au:NR/C:N/I:N/A:C)
         CVSS Temporal Score : 5.3
- Risk factor : High";
+ Risk factor : Critical";
 if(description)
 {
  script_id(900213);
@@ -51,8 +51,8 @@
  script_cve_id("CVE-2008-3146", "CVE-2008-3932", "CVE-2008-3933");
  script_copyright("Copyright (C) 2008 SecPod");
  script_version("Revision: 1.2 ");
- script_tag(name:"cvss_base", value:"7.1");
- script_tag(name:"risk_factor", value:"High");
+ script_tag(name:"cvss_base", value:"10.0");
+ script_tag(name:"risk_factor", value:"Critical");
  script_category(ACT_GATHER_INFO);
  script_family("Denial of Service");
  script_name("Wireshark Multiple Vulnerabilities - Sept08 (Linux)");

Modified: trunk/openvas-plugins/scripts/secpod_wireshark_mult_vuln_sept08_win_900212.nasl
===================================================================
--- trunk/openvas-plugins/scripts/secpod_wireshark_mult_vuln_sept08_win_900212.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/secpod_wireshark_mult_vuln_sept08_win_900212.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -43,7 +43,7 @@
  CVSS Score Report :
         CVSS Base Score     : 7.1 (AV:N/AC:M/Au:NR/C:N/I:N/A:C)
         CVSS Temporal Score : 5.3
- Risk factor : High";
+ Risk factor : Critical";
 if(description)
 {
  script_id(900212);
@@ -51,8 +51,8 @@
  script_cve_id("CVE-2008-3146", "CVE-2008-3932", "CVE-2008-3933");
  script_copyright("Copyright (C) 2008 SecPod");
  script_version("Revision: 1.1 ");
- script_tag(name:"cvss_base", value:"7.1");
- script_tag(name:"risk_factor", value:"High");
+ script_tag(name:"cvss_base", value:"10.0");
+ script_tag(name:"risk_factor", value:"Critical");
  script_category(ACT_GATHER_INFO);
  script_family("Denial of Service");
  script_name("Wireshark Multiple Vulnerabilities - Sept-08 (Win)");

Modified: trunk/openvas-plugins/scripts/secpod_wordpress_mult_vuln_900219.nasl
===================================================================
--- trunk/openvas-plugins/scripts/secpod_wordpress_mult_vuln_900219.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/secpod_wordpress_mult_vuln_900219.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -31,7 +31,7 @@
  script_cve_id("CVE-2008-3747");
  script_copyright("Copyright (C) 2008 SecPod");
  script_version("Revision: 1.1 ");
- script_tag(name:"cvss_base", value:"6.8");
+ script_tag(name:"cvss_base", value:"7.5");
  script_tag(name:"risk_factor", value:"High");
  script_category(ACT_GATHER_INFO);
  script_family("Web application abuses");

Modified: trunk/openvas-plugins/scripts/secpod_wsftp_client_format_string_vuln_900206.nasl
===================================================================
--- trunk/openvas-plugins/scripts/secpod_wsftp_client_format_string_vuln_900206.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/secpod_wsftp_client_format_string_vuln_900206.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -31,8 +31,8 @@
  script_cve_id("CVE-2008-3734");
  script_copyright("Copyright (C) 2008 SecPod");
  script_version("Revision: 1.1 ");
- script_tag(name:"cvss_base", value:"6.8");
- script_tag(name:"risk_factor", value:"High");
+ script_tag(name:"cvss_base", value:"9.3");
+ script_tag(name:"risk_factor", value:"Critical");
  script_category(ACT_GATHER_INFO);
  script_family("Denial of Service");
  script_name("Ipswitch WS FTP Client Format String Vulnerability");
@@ -65,7 +65,7 @@
  CVSS Score :
         CVSS Base Score     : 6.8 (AV:N/AC:M/Au:NR/C:P/I:P/A:P)
         CVSS Temporal Score : 6.1
- Risk factor : Medium";
+ Risk factor : Critical";
 
  script_description(desc);
  script_dependencies("secpod_reg_enum.nasl");

Modified: trunk/openvas-plugins/scripts/secpod_xampp_mult_xss_vuln_900023.nasl
===================================================================
--- trunk/openvas-plugins/scripts/secpod_xampp_mult_xss_vuln_900023.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/secpod_xampp_mult_xss_vuln_900023.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -30,8 +30,8 @@
  script_bugtraq_id(30535);
  script_copyright("Copyright (C) 2008 SecPod");
  script_version("$Revision: 1.1 $");
- script_tag(name:"cvss_base", value:"5.8");
- script_tag(name:"risk_factor", value:"High");
+ script_tag(name:"cvss_base", value:"4.3");
+ script_tag(name:"risk_factor", value:"Medium");
  script_category(ACT_GATHER_INFO);
  script_family("Web application abuses");
  script_name("XAMPP for Linux text Parameter Multiple XSS Vulnerabilities");

Modified: trunk/openvas-plugins/scripts/secpod_xine-lib_mult_code_exe_dos_vuln_900111.nasl
===================================================================
--- trunk/openvas-plugins/scripts/secpod_xine-lib_mult_code_exe_dos_vuln_900111.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/secpod_xine-lib_mult_code_exe_dos_vuln_900111.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -31,8 +31,8 @@
  script_bugtraq_id(30698);
  script_copyright("Copyright (C) 2008 SecPod");
  script_version("Revision: 1.2 ");
- script_tag(name:"cvss_base", value:"6.8");
- script_tag(name:"risk_factor", value:"High");
+ script_tag(name:"cvss_base", value:"9.3");
+ script_tag(name:"risk_factor", value:"Critical");
  script_category(ACT_GATHER_INFO);
  script_family("General");
  script_name("xine-lib Multiple Vulnerabilities");
@@ -72,7 +72,7 @@
  CVSS Score :
         CVSS Base Score     : 6.8 (AV:N/AC:M/Au:NR/C:P/I:P/A:P)
         CVSS Temporal Score : 5.3
- Risk factor : High";
+ Risk factor : Critical";
  script_description(desc);
  script_dependencies("gather-package-list.nasl");
  script_require_keys("ssh/login/uname");

Modified: trunk/openvas-plugins/scripts/secpod_zonealarm_net_sec_suite_bof_vuln_900126.nasl
===================================================================
--- trunk/openvas-plugins/scripts/secpod_zonealarm_net_sec_suite_bof_vuln_900126.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/secpod_zonealarm_net_sec_suite_bof_vuln_900126.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -31,9 +31,9 @@
  script_bugtraq_id(31124);
  script_copyright("Copyright (C) 2008 SecPod");
  script_version("Revision: 1.1 ");
-  script_tag(name:"cvss_base", value:"8.3");
+  script_tag(name:"cvss_base", value:"6.9");
   script_tag(name:"cvss_temporal", value:"7.5");
-  script_tag(name:"risk_factor", value:"Critical");
+  script_tag(name:"risk_factor", value:"High");
  script_category(ACT_GATHER_INFO);
  script_family("Buffer overflow");
  script_name("ZoneAlarm Internet Security Suite Buffer Overflow Vulnerability");

Modified: trunk/openvas-plugins/scripts/sendmail_header.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sendmail_header.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/sendmail_header.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -29,8 +29,8 @@
  script_cve_id("CVE-2001-1349", "CVE-2002-1337");
  script_xref(name:"IAVA", value:"2003-A-0002");
  script_version("$Revision$");
- script_tag(name:"cvss_base", value:"10.0");
- script_tag(name:"risk_factor", value:"Critical");
+ script_tag(name:"cvss_base", value:"3.7");
+ script_tag(name:"risk_factor", value:"Medium");
  
  name = "Sendmail remote header buffer overflow";
  script_name(name);
@@ -58,7 +58,7 @@
     http://www.cert.org/advisories/CA-2003-07.html
     http://www.kb.cert.org/vuls/id/398025
 
-Risk factor : High";
+Risk factor : Medium";
 	
  script_description(desc);
  

Modified: trunk/openvas-plugins/scripts/servletExec_DoS.nasl
===================================================================
--- trunk/openvas-plugins/scripts/servletExec_DoS.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/servletExec_DoS.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -31,8 +31,8 @@
  script_bugtraq_id(1570, 4796);
  script_cve_id("CVE-2002-0894", "CVE-2000-0681");
  script_version ("$Revision$");
- script_tag(name:"cvss_base", value:"10.0");
- script_tag(name:"risk_factor", value:"Critical");
+ script_tag(name:"cvss_base", value:"5.0");
+ script_tag(name:"risk_factor", value:"Medium");
  name = "ServletExec 4.1 / JRun ISAPI DoS";
  script_name(name);
  
@@ -50,7 +50,7 @@
 www.westpoint.ltd.uk/advisories/wp-02-0006.txt
 http://online.securityfocus.com/bid/6122
 
-Risk factor : High";
+Risk factor : Medium";
 
  script_description(desc);
  

Modified: trunk/openvas-plugins/scripts/sles10_MozillaFirefox.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles10_MozillaFirefox.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/sles10_MozillaFirefox.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -31,8 +31,8 @@
  script_id(65780);
  script_cve_id("CVE-2008-5513", "CVE-2008-5512", "CVE-2008-5511", "CVE-2008-5510", "CVE-2008-5508", "CVE-2008-5507", "CVE-2008-5506", "CVE-2008-5504", "CVE-2008-5503", "CVE-2008-5500");
  script_version ("$Revision$");
- script_tag(name:"cvss_base", value:"10.0");
- script_tag(name:"risk_factor", value:"Critical");
+ script_tag(name:"cvss_base", value:"4.3");
+ script_tag(name:"risk_factor", value:"Medium");
  script_name("SLES10: Security update for MozillaFirefox");
 
  desc = "The remote host is missing updates to packages that affect
@@ -51,7 +51,7 @@
 
 Please install the updates provided by SuSE.
 
-Risk factor : High";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/sles10_MozillaFirefox0.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles10_MozillaFirefox0.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/sles10_MozillaFirefox0.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -31,7 +31,7 @@
  script_id(65781);
  script_cve_id("CVE-2008-0017", "CVE-2008-5012", "CVE-2008-5013", "CVE-2008-5014", "CVE-2008-5015", "CVE-2008-5016", "CVE-2008-5017", "CVE-2008-5018", "CVE-2008-5019", "CVE-2008-5021", "CVE-2008-5022", "CVE-2008-5023", "CVE-2008-5024", "CVE-2008-5052");
  script_version ("$Revision$");
- script_tag(name:"cvss_base", value:"10.0");
+ script_tag(name:"cvss_base", value:"9.3");
  script_tag(name:"risk_factor", value:"Critical");
  script_name("SLES10: Security update for MozillaFirefox");
 
@@ -51,7 +51,7 @@
 
 Please install the updates provided by SuSE.
 
-Risk factor : High";
+Risk factor : Critical";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/sles10_MozillaFirefox2.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles10_MozillaFirefox2.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/sles10_MozillaFirefox2.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -31,8 +31,8 @@
  script_id(65792);
  script_cve_id("CVE-2009-2654", "CVE-2009-2662", "CVE-2009-2663", "CVE-2009-2664");
  script_version ("$Revision$");
- script_tag(name:"cvss_base", value:"10.0");
- script_tag(name:"risk_factor", value:"Critical");
+ script_tag(name:"cvss_base", value:"5.8");
+ script_tag(name:"risk_factor", value:"High");
  script_name("SLES10: Security update for Mozilla Firefox");
 
  desc = "The remote host is missing updates to packages that affect

Modified: trunk/openvas-plugins/scripts/sles10_MozillaFirefox4.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles10_MozillaFirefox4.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/sles10_MozillaFirefox4.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -31,8 +31,8 @@
  script_id(65849);
  script_cve_id("CVE-2008-4069", "CVE-2008-4067", "CVE-2008-4068", "CVE-2008-4065", "CVE-2008-4066", "CVE-2008-4061", "CVE-2008-4062", "CVE-2008-4063", "CVE-2008-4064", "CVE-2008-4058", "CVE-2008-4059", "CVE-2008-4060", "CVE-2008-3837", "CVE-2008-3836", "CVE-2008-3835", "CVE-2008-0016");
  script_version ("$Revision$");
- script_tag(name:"cvss_base", value:"10.0");
- script_tag(name:"risk_factor", value:"Critical");
+ script_tag(name:"cvss_base", value:"5.0");
+ script_tag(name:"risk_factor", value:"Medium");
  script_name("SLES10: Security update for MozillaFirefox");
 
  desc = "The remote host is missing updates to packages that affect
@@ -51,7 +51,7 @@
 
 Please install the updates provided by SuSE.
 
-Risk factor : High";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/sles10_MozillaFirefox6.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles10_MozillaFirefox6.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/sles10_MozillaFirefox6.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -31,7 +31,7 @@
  script_id(65927);
  script_cve_id("CVE-2008-0017", "CVE-2008-5012", "CVE-2008-5013", "CVE-2008-5014", "CVE-2008-5015", "CVE-2008-5016", "CVE-2008-5017", "CVE-2008-5018", "CVE-2008-5019", "CVE-2008-5021", "CVE-2008-5022", "CVE-2008-5023", "CVE-2008-5024", "CVE-2008-5052");
  script_version ("$Revision$");
- script_tag(name:"cvss_base", value:"10.0");
+ script_tag(name:"cvss_base", value:"9.3");
  script_tag(name:"risk_factor", value:"Critical");
  script_name("SLES10: Security update for MozillaFirefox");
 
@@ -51,7 +51,7 @@
 
 Please install the updates provided by SuSE.
 
-Risk factor : High";
+Risk factor : Critical";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/sles10_MozillaFirefox7.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles10_MozillaFirefox7.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/sles10_MozillaFirefox7.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -31,8 +31,8 @@
  script_id(66232);
  script_cve_id("CVE-2009-3370", "CVE-2009-3274", "CVE-2009-3371", "CVE-2009-3372", "CVE-2009-3373", "CVE-2009-3374", "CVE-2009-1563", "CVE-2009-3375", "CVE-2009-3376", "CVE-2009-3377", "CVE-2009-3379", "CVE-2009-3378", "CVE-2009-3380", "CVE-2009-3381", "CVE-2009-3382", "CVE-2009-3383");
  script_version ("$Revision$");
- script_tag(name:"cvss_base", value:"10.0");
- script_tag(name:"risk_factor", value:"Critical");
+ script_tag(name:"cvss_base", value:"5.0");
+ script_tag(name:"risk_factor", value:"Medium");
  script_name("SLES10: Security update for Mozilla Firefox");
 
  desc = "The remote host is missing updates to packages that affect
@@ -54,7 +54,7 @@
 
 Please install the updates provided by SuSE.
 
-Risk factor : High";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/sles10_NetworkManager-0.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles10_NetworkManager-0.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/sles10_NetworkManager-0.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -31,8 +31,8 @@
  script_id(65847);
  script_cve_id("CVE-2009-0365", "CVE-2009-0578");
  script_version ("$Revision$");
- script_tag(name:"cvss_base", value:"6.2");
- script_tag(name:"risk_factor", value:"High");
+ script_tag(name:"cvss_base", value:"4.6");
+ script_tag(name:"risk_factor", value:"Medium");
  script_name("SLES10: Security update for NetworkManager-gnome");
 
  desc = "The remote host is missing updates to packages that affect
@@ -50,7 +50,7 @@
 
 Please install the updates provided by SuSE.
 
-Risk factor : High";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/sles10_NetworkManager.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles10_NetworkManager.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/sles10_NetworkManager.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -31,8 +31,8 @@
  script_id(65828);
  script_cve_id("CVE-2009-0365", "CVE-2009-0578");
  script_version ("$Revision$");
- script_tag(name:"cvss_base", value:"6.2");
- script_tag(name:"risk_factor", value:"High");
+ script_tag(name:"cvss_base", value:"4.6");
+ script_tag(name:"risk_factor", value:"Medium");
  script_name("SLES10: Security update for NetworkManager");
 
  desc = "The remote host is missing updates to packages that affect
@@ -52,7 +52,7 @@
 
 Please install the updates provided by SuSE.
 
-Risk factor : High";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/sles10_apache2-mod_php0.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles10_apache2-mod_php0.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/sles10_apache2-mod_php0.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -31,8 +31,8 @@
  script_id(65803);
  script_cve_id("CVE-2008-5658", "CVE-2008-5557");
  script_version ("$Revision$");
- script_tag(name:"cvss_base", value:"10.0");
- script_tag(name:"risk_factor", value:"Critical");
+ script_tag(name:"cvss_base", value:"7.5");
+ script_tag(name:"risk_factor", value:"High");
  script_name("SLES10: Security update for PHP5");
 
  desc = "The remote host is missing updates to packages that affect

Modified: trunk/openvas-plugins/scripts/sles10_apache21.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles10_apache21.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/sles10_apache21.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -31,8 +31,8 @@
  script_id(66074);
  script_cve_id("CVE-2009-1195", "CVE-2009-1890", "CVE-2009-1891", "CVE-2009-3094", "CVE-2009-3095");
  script_version ("$Revision$");
- script_tag(name:"cvss_base", value:"7.5");
- script_tag(name:"risk_factor", value:"High");
+ script_tag(name:"cvss_base", value:"4.9");
+ script_tag(name:"risk_factor", value:"Medium");
  script_name("SLES10: Security update for Apache 2");
 
  desc = "The remote host is missing updates to packages that affect
@@ -55,7 +55,7 @@
 
 Please install the updates provided by SuSE.
 
-Risk factor : High";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/sles10_clamav.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles10_clamav.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/sles10_clamav.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -31,8 +31,8 @@
  script_id(65798);
  script_cve_id("CVE-2008-3912", "CVE-2008-1389", "CVE-2008-3913", "CVE-2008-3914");
  script_version ("$Revision$");
- script_tag(name:"cvss_base", value:"10.0");
- script_tag(name:"risk_factor", value:"Critical");
+ script_tag(name:"cvss_base", value:"5.0");
+ script_tag(name:"risk_factor", value:"Medium");
  script_name("SLES10: Security update for clamav");
 
  desc = "The remote host is missing updates to packages that affect
@@ -50,7 +50,7 @@
 
 Please install the updates provided by SuSE.
 
-Risk factor : High";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/sles10_compat-openssl02.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles10_compat-openssl02.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/sles10_compat-openssl02.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -31,7 +31,7 @@
  script_id(66278);
  script_cve_id("CVE-2009-3555");
  script_version ("$Revision$");
- script_tag(name:"cvss_base", value:"6.4");
+ script_tag(name:"cvss_base", value:"5.8");
  script_tag(name:"risk_factor", value:"High");
  script_name("SLES10: Security update for OpenSSL");
 

Modified: trunk/openvas-plugins/scripts/sles10_cups0.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles10_cups0.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/sles10_cups0.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -31,8 +31,8 @@
  script_id(65769);
  script_cve_id("CVE-2009-0163", "CVE-2009-0165", "CVE-2009-0166", "CVE-2009-0146", "CVE-2009-0147", "CVE-2009-0799", "CVE-2009-0800", "CVE-2009-1179", "CVE-2009-1180", "CVE-2009-1181", "CVE-2009-1182", "CVE-2009-1183");
  script_version ("$Revision$");
- script_tag(name:"cvss_base", value:"10.0");
- script_tag(name:"risk_factor", value:"Critical");
+ script_tag(name:"cvss_base", value:"6.8");
+ script_tag(name:"risk_factor", value:"High");
  script_name("SLES10: Security update for CUPS");
 
  desc = "The remote host is missing updates to packages that affect

Modified: trunk/openvas-plugins/scripts/sles10_cups3.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles10_cups3.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/sles10_cups3.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -31,8 +31,8 @@
  script_id(65939);
  script_cve_id("CVE-2008-3639", "CVE-2008-3640", "CVE-2008-3641");
  script_version ("$Revision$");
- script_tag(name:"cvss_base", value:"10.0");
- script_tag(name:"risk_factor", value:"Critical");
+ script_tag(name:"cvss_base", value:"7.5");
+ script_tag(name:"risk_factor", value:"High");
  script_name("SLES10: Security update for CUPS");
 
  desc = "The remote host is missing updates to packages that affect

Modified: trunk/openvas-plugins/scripts/sles10_cups4.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles10_cups4.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/sles10_cups4.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -31,8 +31,8 @@
  script_id(65986);
  script_cve_id("CVE-2008-1373", "CVE-2008-0053");
  script_version ("$Revision$");
- script_tag(name:"cvss_base", value:"10.0");
- script_tag(name:"risk_factor", value:"Critical");
+ script_tag(name:"cvss_base", value:"5.8");
+ script_tag(name:"risk_factor", value:"High");
  script_name("SLES10: Security update for CUPS");
 
  desc = "The remote host is missing updates to packages that affect

Modified: trunk/openvas-plugins/scripts/sles10_epiphany.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles10_epiphany.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/sles10_epiphany.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -31,8 +31,8 @@
  script_id(65808);
  script_cve_id("CVE-2008-5512", "CVE-2008-5511", "CVE-2008-5510", "CVE-2008-5508", "CVE-2008-5507", "CVE-2008-5506", "CVE-2008-5503", "CVE-2008-5500");
  script_version ("$Revision$");
- script_tag(name:"cvss_base", value:"10.0");
- script_tag(name:"risk_factor", value:"Critical");
+ script_tag(name:"cvss_base", value:"6.8");
+ script_tag(name:"risk_factor", value:"High");
  script_name("SLES10: Security update for Epiphany");
 
  desc = "The remote host is missing updates to packages that affect

Modified: trunk/openvas-plugins/scripts/sles10_ethereal.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles10_ethereal.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/sles10_ethereal.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -31,8 +31,8 @@
  script_id(65762);
  script_cve_id("CVE-2009-1269", "CVE-2009-1268", "CVE-2009-1267", "CVE-2009-1210", "CVE-2009-1266");
  script_version ("$Revision$");
- script_tag(name:"cvss_base", value:"10.0");
- script_tag(name:"risk_factor", value:"Critical");
+ script_tag(name:"cvss_base", value:"5.0");
+ script_tag(name:"risk_factor", value:"Medium");
  script_name("SLES10: Security update for ethereal");
 
  desc = "The remote host is missing updates to packages that affect
@@ -51,7 +51,7 @@
 
 Please install the updates provided by SuSE.
 
-Risk factor : High";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/sles10_ethereal0.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles10_ethereal0.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/sles10_ethereal0.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -31,8 +31,8 @@
  script_id(65787);
  script_cve_id("CVE-2008-3137", "CVE-2008-3138", "CVE-2008-3139", "CVE-2008-3140", "CVE-2008-3141", "CVE-2008-3145", "CVE-2008-3146");
  script_version ("$Revision$");
- script_tag(name:"cvss_base", value:"10.0");
- script_tag(name:"risk_factor", value:"Critical");
+ script_tag(name:"cvss_base", value:"4.3");
+ script_tag(name:"risk_factor", value:"Medium");
  script_name("SLES10: Security update for ethereal");
 
  desc = "The remote host is missing updates to packages that affect
@@ -51,7 +51,7 @@
 
 Please install the updates provided by SuSE.
 
-Risk factor : High";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/sles10_ethereal2.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles10_ethereal2.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/sles10_ethereal2.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -31,7 +31,7 @@
  script_id(65918);
  script_cve_id("CVE-2008-3933", "CVE-2008-4685");
  script_version ("$Revision$");
- script_tag(name:"cvss_base", value:"5.0");
+ script_tag(name:"cvss_base", value:"3.3");
  script_tag(name:"risk_factor", value:"Medium");
  script_name("SLES10: Security update for ethereal");
 
@@ -51,7 +51,7 @@
 
 Please install the updates provided by SuSE.
 
-Risk factor : High";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/sles10_gd.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles10_gd.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/sles10_gd.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -31,7 +31,7 @@
  script_id(65994);
  script_cve_id("CVE-2007-3472", "CVE-2007-3475", "CVE-2007-3476", "CVE-2007-3477", "CVE-2007-3478");
  script_version ("$Revision$");
- script_tag(name:"cvss_base", value:"5.0");
+ script_tag(name:"cvss_base", value:"4.3");
  script_tag(name:"risk_factor", value:"Medium");
  script_name("SLES10: Security update for gd");
 
@@ -51,7 +51,7 @@
 
 Please install the updates provided by SuSE.
 
-Risk factor : High";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/sles10_gecko-sdk.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles10_gecko-sdk.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/sles10_gecko-sdk.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -31,8 +31,8 @@
  script_id(65789);
  script_cve_id("CVE-2008-4069", "CVE-2008-4067", "CVE-2008-4068", "CVE-2008-4065", "CVE-2008-4066", "CVE-2008-4061", "CVE-2008-4062", "CVE-2008-4063", "CVE-2008-4064", "CVE-2008-4058", "CVE-2008-4059", "CVE-2008-4060", "CVE-2008-3837", "CVE-2008-3836", "CVE-2008-3835", "CVE-2008-0016");
  script_version ("$Revision$");
- script_tag(name:"cvss_base", value:"10.0");
- script_tag(name:"risk_factor", value:"Critical");
+ script_tag(name:"cvss_base", value:"5.0");
+ script_tag(name:"risk_factor", value:"Medium");
  script_name("SLES10: Security update for Mozilla");
 
  desc = "The remote host is missing updates to packages that affect
@@ -50,7 +50,7 @@
 
 Please install the updates provided by SuSE.
 
-Risk factor : High";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/sles10_gecko-sdk0.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles10_gecko-sdk0.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/sles10_gecko-sdk0.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -31,7 +31,7 @@
  script_id(65879);
  script_cve_id("CVE-2008-0017", "CVE-2008-5012", "CVE-2008-5013", "CVE-2008-5014", "CVE-2008-5016", "CVE-2008-5017", "CVE-2008-5018", "CVE-2008-5021", "CVE-2008-5022", "CVE-2008-5023", "CVE-2008-5024", "CVE-2008-5052");
  script_version ("$Revision$");
- script_tag(name:"cvss_base", value:"10.0");
+ script_tag(name:"cvss_base", value:"9.3");
  script_tag(name:"risk_factor", value:"Critical");
  script_name("SLES10: Security update for gecko-sdk and mozilla-xulrunner");
 
@@ -50,7 +50,7 @@
 
 Please install the updates provided by SuSE.
 
-Risk factor : High";
+Risk factor : Critical";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/sles10_icu0.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles10_icu0.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/sles10_icu0.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -31,8 +31,8 @@
  script_id(65955);
  script_cve_id("CVE-2007-4770", "CVE-2007-4771");
  script_version ("$Revision$");
- script_tag(name:"cvss_base", value:"9.3");
- script_tag(name:"risk_factor", value:"Critical");
+ script_tag(name:"cvss_base", value:"6.8");
+ script_tag(name:"risk_factor", value:"High");
  script_name("SLES10: Security update for icu");
 
  desc = "The remote host is missing updates to packages that affect

Modified: trunk/openvas-plugins/scripts/sles10_ipsec-tools0.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles10_ipsec-tools0.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/sles10_ipsec-tools0.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -31,8 +31,8 @@
  script_id(65953);
  script_cve_id("CVE-2008-3651", "CVE-2008-3652");
  script_version ("$Revision$");
- script_tag(name:"cvss_base", value:"7.8");
- script_tag(name:"risk_factor", value:"High");
+ script_tag(name:"cvss_base", value:"4.0");
+ script_tag(name:"risk_factor", value:"Medium");
  script_name("SLES10: Security update for ipsec-tools");
 
  desc = "The remote host is missing updates to packages that affect
@@ -50,7 +50,7 @@
 
 Please install the updates provided by SuSE.
 
-Risk factor : High";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/sles10_jasper.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles10_jasper.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/sles10_jasper.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -31,7 +31,7 @@
  script_id(65824);
  script_cve_id("CVE-2008-3520", "CVE-2008-3521", "CVE-2008-3522");
  script_version ("$Revision$");
- script_tag(name:"cvss_base", value:"10.0");
+ script_tag(name:"cvss_base", value:"9.3");
  script_tag(name:"risk_factor", value:"Critical");
  script_name("SLES10: Security update for jasper");
 
@@ -51,7 +51,7 @@
 
 Please install the updates provided by SuSE.
 
-Risk factor : High";
+Risk factor : Critical";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/sles10_java-1_4_2-ibm.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles10_java-1_4_2-ibm.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/sles10_java-1_4_2-ibm.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -31,8 +31,8 @@
  script_id(65764);
  script_cve_id("CVE-2009-2625", "CVE-2008-5349");
  script_version ("$Revision$");
- script_tag(name:"cvss_base", value:"7.1");
- script_tag(name:"risk_factor", value:"High");
+ script_tag(name:"cvss_base", value:"5.0");
+ script_tag(name:"risk_factor", value:"Medium");
  script_name("SLES10: Security update for IBM Java 1.4.2");
 
  desc = "The remote host is missing updates to packages that affect
@@ -53,7 +53,7 @@
 
 Please install the updates provided by SuSE.
 
-Risk factor : High";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/sles10_java-1_4_2-ibm0.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles10_java-1_4_2-ibm0.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/sles10_java-1_4_2-ibm0.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -31,8 +31,8 @@
  script_id(65839);
  script_cve_id("CVE-2008-5350", "CVE-2008-5346", "CVE-2008-5343", "CVE-2008-5344", "CVE-2008-5359", "CVE-2008-5339", "CVE-2008-5340", "CVE-2008-5348", "CVE-2008-2086", "CVE-2008-5345", "CVE-2008-5351", "CVE-2008-5360", "CVE-2008-5353", "CVE-2008-5356", "CVE-2008-5354", "CVE-2008-5357", "CVE-2008-5342");
  script_version ("$Revision$");
- script_tag(name:"cvss_base", value:"10.0");
- script_tag(name:"risk_factor", value:"Critical");
+ script_tag(name:"cvss_base", value:"5.0");
+ script_tag(name:"risk_factor", value:"Medium");
  script_name("SLES10: Security update for IBM Java 1.4.2");
 
  desc = "The remote host is missing updates to packages that affect
@@ -53,7 +53,7 @@
 
 Please install the updates provided by SuSE.
 
-Risk factor : High";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/sles10_java-1_4_2-ibm2.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles10_java-1_4_2-ibm2.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/sles10_java-1_4_2-ibm2.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -31,8 +31,8 @@
  script_id(65904);
  script_cve_id("CVE-2008-3104", "CVE-2008-3112", "CVE-2008-3113", "CVE-2008-3114");
  script_version ("$Revision$");
- script_tag(name:"cvss_base", value:"10.0");
- script_tag(name:"risk_factor", value:"Critical");
+ script_tag(name:"cvss_base", value:"6.8");
+ script_tag(name:"risk_factor", value:"High");
  script_name("SLES10: Security update for IBM Java");
 
  desc = "The remote host is missing updates to packages that affect

Modified: trunk/openvas-plugins/scripts/sles10_java-1_4_2-ibm3.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles10_java-1_4_2-ibm3.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/sles10_java-1_4_2-ibm3.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -31,8 +31,8 @@
  script_id(65988);
  script_cve_id("CVE-2008-1196", "CVE-2008-1195", "CVE-2008-1192", "CVE-2008-1190", "CVE-2008-1189", "CVE-2008-1187", "CVE-2007-5232", "CVE-2007-5274", "CVE-2007-5273", "CVE-2007-5236", "CVE-2007-5238", "CVE-2007-5239", "CVE-2007-5240", "CVE-2007-4381", "CVE-2007-3698");
  script_version ("$Revision$");
- script_tag(name:"cvss_base", value:"9.3");
- script_tag(name:"risk_factor", value:"Critical");
+ script_tag(name:"cvss_base", value:"6.8");
+ script_tag(name:"risk_factor", value:"High");
  script_name("SLES10: Security update for IBM Java 1.4.2");
 
  desc = "The remote host is missing updates to packages that affect

Modified: trunk/openvas-plugins/scripts/sles10_java-1_4_2-sun.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles10_java-1_4_2-sun.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/sles10_java-1_4_2-sun.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -31,8 +31,8 @@
  script_id(65822);
  script_cve_id("CVE-2008-5360", "CVE-2008-5359", "CVE-2008-5358", "CVE-2008-5357", "CVE-2008-5356", "CVE-2008-5344", "CVE-2008-5343", "CVE-2008-5342", "CVE-2008-5341", "CVE-2008-5340", "CVE-2008-5339", "CVE-2008-2086", "CVE-2008-5355", "CVE-2008-5354", "CVE-2008-5353", "CVE-2008-5352", "CVE-2008-5351", "CVE-2008-5350", "CVE-2008-5349", "CVE-2008-5348", "CVE-2008-5347", "CVE-2008-5345", "CVE-2008-5346");
  script_version ("$Revision$");
- script_tag(name:"cvss_base", value:"10.0");
- script_tag(name:"risk_factor", value:"Critical");
+ script_tag(name:"cvss_base", value:"6.4");
+ script_tag(name:"risk_factor", value:"High");
  script_name("SLES10: Security update for Sun Java 1.4.2");
 
  desc = "The remote host is missing updates to packages that affect

Modified: trunk/openvas-plugins/scripts/sles10_java-1_4_2-sun0.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles10_java-1_4_2-sun0.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/sles10_java-1_4_2-sun0.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -31,8 +31,8 @@
  script_id(65916);
  script_cve_id("CVE-2008-3114", "CVE-2008-3113", "CVE-2008-3112", "CVE-2008-3111", "CVE-2008-3108", "CVE-2008-3107", "CVE-2008-3104");
  script_version ("$Revision$");
- script_tag(name:"cvss_base", value:"10.0");
- script_tag(name:"risk_factor", value:"Critical");
+ script_tag(name:"cvss_base", value:"5.0");
+ script_tag(name:"risk_factor", value:"Medium");
  script_name("SLES10: Security update for Java 1.4.2");
 
  desc = "The remote host is missing updates to packages that affect
@@ -54,7 +54,7 @@
 
 Please install the updates provided by SuSE.
 
-Risk factor : High";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/sles10_java-1_4_2-sun1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles10_java-1_4_2-sun1.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/sles10_java-1_4_2-sun1.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -31,8 +31,8 @@
  script_id(66005);
  script_cve_id("CVE-2008-1158", "CVE-2008-1186", "CVE-2008-1185", "CVE-2008-1187", "CVE-2008-1189", "CVE-2008-1188", "CVE-2008-1190", "CVE-2008-1191", "CVE-2008-1192", "CVE-2008-1195", "CVE-2008-1196");
  script_version ("$Revision$");
- script_tag(name:"cvss_base", value:"9.3");
- script_tag(name:"risk_factor", value:"Critical");
+ script_tag(name:"cvss_base", value:"7.8");
+ script_tag(name:"risk_factor", value:"High");
  script_name("SLES10: Security update for Sun Java");
 
  desc = "The remote host is missing updates to packages that affect

Modified: trunk/openvas-plugins/scripts/sles10_java-1_5_0-ibm1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles10_java-1_5_0-ibm1.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/sles10_java-1_5_0-ibm1.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -31,8 +31,8 @@
  script_id(65873);
  script_cve_id("CVE-2009-1100", "CVE-2009-1103", "CVE-2009-1104", "CVE-2009-1093", "CVE-2009-1094", "CVE-2009-1107", "CVE-2009-1095", "CVE-2009-1096", "CVE-2009-1098", "CVE-2009-1099");
  script_version ("$Revision$");
- script_tag(name:"cvss_base", value:"10.0");
- script_tag(name:"risk_factor", value:"Critical");
+ script_tag(name:"cvss_base", value:"5.0");
+ script_tag(name:"risk_factor", value:"Medium");
  script_name("SLES10: Security update for IBM Java 5");
 
  desc = "The remote host is missing updates to packages that affect
@@ -55,7 +55,7 @@
 
 Please install the updates provided by SuSE.
 
-Risk factor : High";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/sles10_java-1_5_0-ibm2.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles10_java-1_5_0-ibm2.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/sles10_java-1_5_0-ibm2.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -31,8 +31,8 @@
  script_id(65907);
  script_cve_id("CVE-2008-5350", "CVE-2008-5346", "CVE-2008-5343", "CVE-2008-5344", "CVE-2008-5359", "CVE-2008-5341", "CVE-2008-5339", "CVE-2008-5340", "CVE-2008-5348", "CVE-2008-2086", "CVE-2008-5345", "CVE-2008-5351", "CVE-2008-5360", "CVE-2008-5353", "CVE-2008-5356", "CVE-2008-5354", "CVE-2008-5357", "CVE-2008-5352", "CVE-2008-5342");
  script_version ("$Revision$");
- script_tag(name:"cvss_base", value:"10.0");
- script_tag(name:"risk_factor", value:"Critical");
+ script_tag(name:"cvss_base", value:"5.0");
+ script_tag(name:"risk_factor", value:"Medium");
  script_name("SLES10: Security update for IBM Java 1.5.0");
 
  desc = "The remote host is missing updates to packages that affect
@@ -55,7 +55,7 @@
 
 Please install the updates provided by SuSE.
 
-Risk factor : High";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/sles10_java-1_5_0-ibm3.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles10_java-1_5_0-ibm3.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/sles10_java-1_5_0-ibm3.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -31,8 +31,8 @@
  script_id(65941);
  script_cve_id("CVE-2008-3104", "CVE-2008-3106", "CVE-2008-3108", "CVE-2008-3111", "CVE-2008-3112", "CVE-2008-3113", "CVE-2008-3114");
  script_version ("$Revision$");
- script_tag(name:"cvss_base", value:"10.0");
- script_tag(name:"risk_factor", value:"Critical");
+ script_tag(name:"cvss_base", value:"6.8");
+ script_tag(name:"risk_factor", value:"High");
  script_name("SLES10: Security update for IBM Java 1.5");
 
  desc = "The remote host is missing updates to packages that affect

Modified: trunk/openvas-plugins/scripts/sles10_java-1_5_0-ibm4.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles10_java-1_5_0-ibm4.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/sles10_java-1_5_0-ibm4.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -31,8 +31,8 @@
  script_id(66000);
  script_cve_id("CVE-2008-1196", "CVE-2008-1195", "CVE-2008-1194", "CVE-2008-1193", "CVE-2008-1192", "CVE-2008-1190", "CVE-2008-1189", "CVE-2008-1188", "CVE-2008-1187", "CVE-2008-0657", "CVE-2007-5232", "CVE-2007-5274", "CVE-2007-5273", "CVE-2007-5236", "CVE-2007-5238", "CVE-2007-5239", "CVE-2007-5240", "CVE-2007-4381");
  script_version ("$Revision$");
- script_tag(name:"cvss_base", value:"10.0");
- script_tag(name:"risk_factor", value:"Critical");
+ script_tag(name:"cvss_base", value:"6.8");
+ script_tag(name:"risk_factor", value:"High");
  script_name("SLES10: Security update for IBM Java 1.5.0");
 
  desc = "The remote host is missing updates to packages that affect

Modified: trunk/openvas-plugins/scripts/sles10_kdegraphics3-pd.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles10_kdegraphics3-pd.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/sles10_kdegraphics3-pd.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -31,8 +31,8 @@
  script_id(65999);
  script_cve_id("CVE-2007-4352", "CVE-2007-5392", "CVE-2007-5393");
  script_version ("$Revision$");
- script_tag(name:"cvss_base", value:"9.3");
- script_tag(name:"risk_factor", value:"Critical");
+ script_tag(name:"cvss_base", value:"7.6");
+ script_tag(name:"risk_factor", value:"High");
  script_name("SLES10: Security update for kdegraphics3-pdf");
 
  desc = "The remote host is missing updates to packages that affect

Modified: trunk/openvas-plugins/scripts/sles10_kdegraphics3.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles10_kdegraphics3.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/sles10_kdegraphics3.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -31,8 +31,8 @@
  script_id(65835);
  script_cve_id("CVE-2009-0146", "CVE-2009-0147", "CVE-2009-0165", "CVE-2009-0166", "CVE-2009-0799", "CVE-2009-0800", "CVE-2009-1179", "CVE-2009-1180", "CVE-2009-1181", "CVE-2009-1182", "CVE-2009-1183");
  script_version ("$Revision$");
- script_tag(name:"cvss_base", value:"10.0");
- script_tag(name:"risk_factor", value:"Critical");
+ script_tag(name:"cvss_base", value:"4.3");
+ script_tag(name:"risk_factor", value:"Medium");
  script_name("SLES10: Security update for kdegraphics3");
 
  desc = "The remote host is missing updates to packages that affect
@@ -55,7 +55,7 @@
 
 Please install the updates provided by SuSE.
 
-Risk factor : High";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/sles10_kernel1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles10_kernel1.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/sles10_kernel1.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -31,8 +31,8 @@
  script_id(65812);
  script_cve_id("CVE-2009-0675", "CVE-2009-0676", "CVE-2009-0028", "CVE-2008-1294", "CVE-2009-0065", "CVE-2009-1046");
  script_version ("$Revision$");
- script_tag(name:"cvss_base", value:"10.0");
- script_tag(name:"risk_factor", value:"Critical");
+ script_tag(name:"cvss_base", value:"2.1");
+ script_tag(name:"risk_factor", value:"Medium");
  script_name("SLES10: Security update for Linux kernel");
 
  desc = "The remote host is missing updates to packages that affect
@@ -60,7 +60,7 @@
 
 Please install the updates provided by SuSE.
 
-Risk factor : High";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/sles10_kernel2.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles10_kernel2.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/sles10_kernel2.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -31,7 +31,7 @@
  script_id(65814);
  script_cve_id("CVE-2009-2692", "CVE-2009-1758", "CVE-2009-1389", "CVE-2009-1630");
  script_version ("$Revision$");
- script_tag(name:"cvss_base", value:"7.8");
+ script_tag(name:"cvss_base", value:"7.2");
  script_tag(name:"risk_factor", value:"High");
  script_name("SLES10: Security update for Linux kernel");
 

Modified: trunk/openvas-plugins/scripts/sles10_kernel3.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles10_kernel3.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/sles10_kernel3.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -31,8 +31,8 @@
  script_id(65876);
  script_cve_id("CVE-2008-1615", "CVE-2008-1669", "CVE-2008-2372", "CVE-2008-1673", "CVE-2008-2812", "CVE-2008-2931");
  script_version ("$Revision$");
- script_tag(name:"cvss_base", value:"10.0");
- script_tag(name:"risk_factor", value:"Critical");
+ script_tag(name:"cvss_base", value:"4.9");
+ script_tag(name:"risk_factor", value:"Medium");
  script_name("SLES10: Security update for Linux kernel");
 
  desc = "The remote host is missing updates to packages that affect
@@ -60,7 +60,7 @@
 
 Please install the updates provided by SuSE.
 
-Risk factor : High";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/sles10_kernel4.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles10_kernel4.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/sles10_kernel4.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -31,8 +31,8 @@
  script_id(65887);
  script_cve_id("CVE-2008-5079", "CVE-2008-5029", "CVE-2008-4933", "CVE-2008-5025", "CVE-2008-5182");
  script_version ("$Revision$");
- script_tag(name:"cvss_base", value:"7.8");
- script_tag(name:"risk_factor", value:"High");
+ script_tag(name:"cvss_base", value:"4.9");
+ script_tag(name:"risk_factor", value:"Medium");
  script_name("SLES10: Security update for Linux kernel");
 
  desc = "The remote host is missing updates to packages that affect
@@ -60,7 +60,7 @@
 
 Please install the updates provided by SuSE.
 
-Risk factor : High";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/sles10_kernel6.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles10_kernel6.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/sles10_kernel6.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -31,8 +31,8 @@
  script_id(65914);
  script_cve_id("CVE-2008-4210", "CVE-2008-3528", "CVE-2008-1514", "CVE-2007-6716", "CVE-2008-3525");
  script_version ("$Revision$");
- script_tag(name:"cvss_base", value:"7.2");
- script_tag(name:"risk_factor", value:"High");
+ script_tag(name:"cvss_base", value:"4.6");
+ script_tag(name:"risk_factor", value:"Medium");
  script_name("SLES10: Security update for Linux kernel");
 
  desc = "The remote host is missing updates to packages that affect
@@ -60,7 +60,7 @@
 
 Please install the updates provided by SuSE.
 
-Risk factor : High";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/sles10_kernel7.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles10_kernel7.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/sles10_kernel7.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -31,8 +31,8 @@
  script_id(65920);
  script_cve_id("CVE-2008-0598", "CVE-2008-1673", "CVE-2008-3272", "CVE-2008-3275");
  script_version ("$Revision$");
- script_tag(name:"cvss_base", value:"10.0");
- script_tag(name:"risk_factor", value:"Critical");
+ script_tag(name:"cvss_base", value:"4.9");
+ script_tag(name:"risk_factor", value:"Medium");
  script_name("SLES10: Security update for Linux Kernel (x86)");
 
  desc = "The remote host is missing updates to packages that affect
@@ -60,7 +60,7 @@
 
 Please install the updates provided by SuSE.
 
-Risk factor : High";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/sles10_kernel8.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles10_kernel8.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/sles10_kernel8.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -31,8 +31,8 @@
  script_id(65924);
  script_cve_id("CVE-2009-0834", "CVE-2009-1072", "CVE-2009-0835", "CVE-2009-1439", "CVE-2009-1337", "CVE-2009-0859", "CVE-2009-1265");
  script_version ("$Revision$");
- script_tag(name:"cvss_base", value:"7.8");
- script_tag(name:"risk_factor", value:"High");
+ script_tag(name:"cvss_base", value:"3.6");
+ script_tag(name:"risk_factor", value:"Medium");
  script_name("SLES10: Security update for the Linux kernel");
 
  desc = "The remote host is missing updates to packages that affect
@@ -60,7 +60,7 @@
 
 Please install the updates provided by SuSE.
 
-Risk factor : High";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/sles10_kernel9.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles10_kernel9.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/sles10_kernel9.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -31,7 +31,7 @@
  script_id(66280);
  script_cve_id("CVE-2009-3547", "CVE-2009-2910", "CVE-2009-3238", "CVE-2009-1192", "CVE-2009-2909", "CVE-2009-2848", "CVE-2009-3002", "CVE-2009-1633");
  script_version ("$Revision$");
- script_tag(name:"cvss_base", value:"7.8");
+ script_tag(name:"cvss_base", value:"6.9");
  script_tag(name:"risk_factor", value:"High");
  script_name("SLES10: Security update for Linux kernel");
 

Modified: trunk/openvas-plugins/scripts/sles10_krb5.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles10_krb5.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/sles10_krb5.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -31,8 +31,8 @@
  script_id(65791);
  script_cve_id("CVE-2009-0845", "CVE-2009-0844", "CVE-2009-0847", "CVE-2009-0846");
  script_version ("$Revision$");
- script_tag(name:"cvss_base", value:"10.0");
- script_tag(name:"risk_factor", value:"Critical");
+ script_tag(name:"cvss_base", value:"5.0");
+ script_tag(name:"risk_factor", value:"Medium");
  script_name("SLES10: Security update for Kerberos");
 
  desc = "The remote host is missing updates to packages that affect
@@ -55,7 +55,7 @@
 
 Please install the updates provided by SuSE.
 
-Risk factor : High";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/sles10_libexif.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles10_libexif.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/sles10_libexif.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -31,8 +31,8 @@
  script_id(65956);
  script_cve_id("CVE-2007-6351", "CVE-2007-6352");
  script_version ("$Revision$");
- script_tag(name:"cvss_base", value:"6.8");
- script_tag(name:"risk_factor", value:"High");
+ script_tag(name:"cvss_base", value:"4.3");
+ script_tag(name:"risk_factor", value:"Medium");
  script_name("SLES10: Security update for libexif");
 
  desc = "The remote host is missing updates to packages that affect
@@ -50,7 +50,7 @@
 
 Please install the updates provided by SuSE.
 
-Risk factor : High";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/sles10_libvorbis.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles10_libvorbis.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/sles10_libvorbis.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -31,8 +31,8 @@
  script_id(65846);
  script_cve_id("CVE-2008-1419", "CVE-2008-1420", "CVE-2008-1423");
  script_version ("$Revision$");
- script_tag(name:"cvss_base", value:"9.3");
- script_tag(name:"risk_factor", value:"Critical");
+ script_tag(name:"cvss_base", value:"4.3");
+ script_tag(name:"risk_factor", value:"Medium");
  script_name("SLES10: Security update for libvorbis");
 
  desc = "The remote host is missing updates to packages that affect
@@ -51,7 +51,7 @@
 
 Please install the updates provided by SuSE.
 
-Risk factor : High";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/sles10_libxml2.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles10_libxml2.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/sles10_libxml2.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -31,8 +31,8 @@
  script_id(65778);
  script_cve_id("CVE-2008-3281", "CVE-2008-3529");
  script_version ("$Revision$");
- script_tag(name:"cvss_base", value:"10.0");
- script_tag(name:"risk_factor", value:"Critical");
+ script_tag(name:"cvss_base", value:"4.3");
+ script_tag(name:"risk_factor", value:"Medium");
  script_name("SLES10: Security update for libxml2");
 
  desc = "The remote host is missing updates to packages that affect
@@ -52,7 +52,7 @@
 
 Please install the updates provided by SuSE.
 
-Risk factor : High";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/sles10_mozilla-xulrunn.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles10_mozilla-xulrunn.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/sles10_mozilla-xulrunn.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -31,8 +31,8 @@
  script_id(65980);
  script_cve_id("CVE-2008-1241", "CVE-2008-1195", "CVE-2008-1240", "CVE-2007-4879", "CVE-2008-1238", "CVE-2008-1236", "CVE-2008-1237", "CVE-2008-1233", "CVE-2008-1234", "CVE-2008-1235");
  script_version ("$Revision$");
- script_tag(name:"cvss_base", value:"9.3");
- script_tag(name:"risk_factor", value:"Critical");
+ script_tag(name:"cvss_base", value:"4.3");
+ script_tag(name:"risk_factor", value:"Medium");
  script_name("SLES10: Security update for epiphany");
 
  desc = "The remote host is missing updates to packages that affect
@@ -50,7 +50,7 @@
 
 Please install the updates provided by SuSE.
 
-Risk factor : High";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/sles10_mozilla-xulrunn0.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles10_mozilla-xulrunn0.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/sles10_mozilla-xulrunn0.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -31,8 +31,8 @@
  script_id(66237);
  script_cve_id("CVE-2009-3370", "CVE-2009-3274", "CVE-2009-3371", "CVE-2009-3372", "CVE-2009-3373", "CVE-2009-3374", "CVE-2009-1563", "CVE-2009-3375", "CVE-2009-3376", "CVE-2009-3380", "CVE-2009-3381", "CVE-2009-3382", "CVE-2009-3383");
  script_version ("$Revision$");
- script_tag(name:"cvss_base", value:"10.0");
- script_tag(name:"risk_factor", value:"Critical");
+ script_tag(name:"cvss_base", value:"5.0");
+ script_tag(name:"risk_factor", value:"Medium");
  script_name("SLES10: Security update for Mozilla XULRunner");
 
  desc = "The remote host is missing updates to packages that affect
@@ -52,7 +52,7 @@
 
 Please install the updates provided by SuSE.
 
-Risk factor : High";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/sles10_multipath-tools.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles10_multipath-tools.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/sles10_multipath-tools.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -31,7 +31,7 @@
  script_id(65930);
  script_cve_id("CVE-2009-0115");
  script_version ("$Revision$");
- script_tag(name:"cvss_base", value:"6.9");
+ script_tag(name:"cvss_base", value:"7.2");
  script_tag(name:"risk_factor", value:"High");
  script_name("SLES10: Security update for multipath-tools");
 

Modified: trunk/openvas-plugins/scripts/sles10_mysql0.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles10_mysql0.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/sles10_mysql0.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -31,7 +31,7 @@
  script_id(65884);
  script_cve_id("CVE-2008-3963", "CVE-2008-4097", "CVE-2008-4098");
  script_version ("$Revision$");
- script_tag(name:"cvss_base", value:"4.6");
+ script_tag(name:"cvss_base", value:"4.0");
  script_tag(name:"risk_factor", value:"Medium");
  script_name("SLES10: Security update for MySQL");
 
@@ -54,7 +54,7 @@
 
 Please install the updates provided by SuSE.
 
-Risk factor : High";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/sles10_net-snmp1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles10_net-snmp1.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/sles10_net-snmp1.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -31,8 +31,8 @@
  script_id(65905);
  script_cve_id("CVE-2008-2292", "CVE-2008-0960");
  script_version ("$Revision$");
- script_tag(name:"cvss_base", value:"10.0");
- script_tag(name:"risk_factor", value:"Critical");
+ script_tag(name:"cvss_base", value:"6.8");
+ script_tag(name:"risk_factor", value:"High");
  script_name("SLES10: Security update for net-snmp");
 
  desc = "The remote host is missing updates to packages that affect

Modified: trunk/openvas-plugins/scripts/sles10_openssl3.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles10_openssl3.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/sles10_openssl3.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -31,7 +31,7 @@
  script_id(66279);
  script_cve_id("CVE-2009-3555");
  script_version ("$Revision$");
- script_tag(name:"cvss_base", value:"6.4");
+ script_tag(name:"cvss_base", value:"5.8");
  script_tag(name:"risk_factor", value:"High");
  script_name("SLES10: Security update for OpenSSL");
 

Modified: trunk/openvas-plugins/scripts/sles10_poppler.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles10_poppler.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/sles10_poppler.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -31,8 +31,8 @@
  script_id(65775);
  script_cve_id("CVE-2009-0146", "CVE-2009-0147", "CVE-2009-0165", "CVE-2009-0166", "CVE-2009-0799", "CVE-2009-0800", "CVE-2009-1179", "CVE-2009-1180", "CVE-2009-1181", "CVE-2009-1182", "CVE-2009-1183", "CVE-2009-0755", "CVE-2009-0756");
  script_version ("$Revision$");
- script_tag(name:"cvss_base", value:"10.0");
- script_tag(name:"risk_factor", value:"Critical");
+ script_tag(name:"cvss_base", value:"4.3");
+ script_tag(name:"risk_factor", value:"Medium");
  script_name("SLES10: Security update for poppler");
 
  desc = "The remote host is missing updates to packages that affect
@@ -52,7 +52,7 @@
 
 Please install the updates provided by SuSE.
 
-Risk factor : High";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/sles10_postgresql0.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles10_postgresql0.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/sles10_postgresql0.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -31,8 +31,8 @@
  script_id(65806);
  script_cve_id("CVE-2009-3229", "CVE-2009-3230", "CVE-2009-3231");
  script_version ("$Revision$");
- script_tag(name:"cvss_base", value:"6.8");
- script_tag(name:"risk_factor", value:"High");
+ script_tag(name:"cvss_base", value:"4.0");
+ script_tag(name:"risk_factor", value:"Medium");
  script_name("SLES10: Security update for PostgreSQL");
 
  desc = "The remote host is missing updates to packages that affect
@@ -56,7 +56,7 @@
 
 Please install the updates provided by SuSE.
 
-Risk factor : High";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/sles10_postgresql1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles10_postgresql1.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/sles10_postgresql1.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -31,7 +31,7 @@
  script_id(65971);
  script_cve_id("CVE-2007-6600", "CVE-2007-4772", "CVE-2007-6067", "CVE-2007-4769", "CVE-2007-6601");
  script_version ("$Revision$");
- script_tag(name:"cvss_base", value:"7.2");
+ script_tag(name:"cvss_base", value:"6.5");
  script_tag(name:"risk_factor", value:"High");
  script_name("SLES10: Security update for PostgreSQL");
 

Modified: trunk/openvas-plugins/scripts/sles10_python.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles10_python.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/sles10_python.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -31,8 +31,8 @@
  script_id(65883);
  script_cve_id("CVE-2008-1679", "CVE-2008-1887", "CVE-2008-3143", "CVE-2008-3142", "CVE-2008-3144", "CVE-2008-2315", "CVE-2008-2316");
  script_version ("$Revision$");
- script_tag(name:"cvss_base", value:"9.3");
- script_tag(name:"risk_factor", value:"Critical");
+ script_tag(name:"cvss_base", value:"6.8");
+ script_tag(name:"risk_factor", value:"High");
  script_name("SLES10: Security update for Python");
 
  desc = "The remote host is missing updates to packages that affect

Modified: trunk/openvas-plugins/scripts/sles10_python0.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles10_python0.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/sles10_python0.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -31,8 +31,8 @@
  script_id(65933);
  script_cve_id("CVE-2008-4864", "CVE-2008-5031");
  script_version ("$Revision$");
- script_tag(name:"cvss_base", value:"10.0");
- script_tag(name:"risk_factor", value:"Critical");
+ script_tag(name:"cvss_base", value:"7.5");
+ script_tag(name:"risk_factor", value:"High");
  script_name("SLES10: Security update for Python");
 
  desc = "The remote host is missing updates to packages that affect

Modified: trunk/openvas-plugins/scripts/sles10_rsync.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles10_rsync.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/sles10_rsync.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -31,7 +31,7 @@
  script_id(65976);
  script_cve_id("CVE-2007-6199", "CVE-2007-6200");
  script_version ("$Revision$");
- script_tag(name:"cvss_base", value:"10.0");
+ script_tag(name:"cvss_base", value:"9.3");
  script_tag(name:"risk_factor", value:"Critical");
  script_name("SLES10: Security update for rsync");
 
@@ -50,7 +50,7 @@
 
 Please install the updates provided by SuSE.
 
-Risk factor : High";
+Risk factor : Critical";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/sles10_xorg-x11-Xnest.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles10_xorg-x11-Xnest.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/sles10_xorg-x11-Xnest.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -31,7 +31,7 @@
  script_id(65763);
  script_cve_id("CVE-2008-2360", "CVE-2008-2361", "CVE-2008-2362", "CVE-2008-1379", "CVE-2008-1377");
  script_version ("$Revision$");
- script_tag(name:"cvss_base", value:"10.0");
+ script_tag(name:"cvss_base", value:"9.0");
  script_tag(name:"risk_factor", value:"Critical");
  script_name("SLES10: Security update for X.org");
 
@@ -53,7 +53,7 @@
 
 Please install the updates provided by SuSE.
 
-Risk factor : High";
+Risk factor : Critical";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/sles10_xpdf1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles10_xpdf1.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/sles10_xpdf1.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -31,8 +31,8 @@
  script_id(65958);
  script_cve_id("CVE-2007-4352", "CVE-2007-5392", "CVE-2007-5393");
  script_version ("$Revision$");
- script_tag(name:"cvss_base", value:"9.3");
- script_tag(name:"risk_factor", value:"Critical");
+ script_tag(name:"cvss_base", value:"7.6");
+ script_tag(name:"risk_factor", value:"High");
  script_name("SLES10: Security update for xpdf");
 
  desc = "The remote host is missing updates to packages that affect

Modified: trunk/openvas-plugins/scripts/sles11_MozillaFirefox1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles11_MozillaFirefox1.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/sles11_MozillaFirefox1.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -31,8 +31,8 @@
  script_id(65660);
  script_cve_id("CVE-2009-1302", "CVE-2009-1303", "CVE-2009-1304", "CVE-2009-1305", "CVE-2009-1307", "CVE-2009-1308", "CVE-2009-1309", "CVE-2009-1311", "CVE-2009-1312", "CVE-2009-0652");
  script_version ("$Revision$");
- script_tag(name:"cvss_base", value:"6.8");
- script_tag(name:"risk_factor", value:"High");
+ script_tag(name:"cvss_base", value:"5.0");
+ script_tag(name:"risk_factor", value:"Medium");
  script_name("SLES11: Security update for MozillaFirefox");
 
  desc = "The remote host is missing updates to packages that affect
@@ -53,7 +53,7 @@
 
 Please install the updates provided by SuSE.
 
-Risk factor : High";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/sles11_MozillaFirefox5.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles11_MozillaFirefox5.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/sles11_MozillaFirefox5.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -31,8 +31,8 @@
  script_id(65706);
  script_cve_id("CVE-2009-2654", "CVE-2009-2662", "CVE-2009-2663", "CVE-2009-2664");
  script_version ("$Revision$");
- script_tag(name:"cvss_base", value:"10.0");
- script_tag(name:"risk_factor", value:"Critical");
+ script_tag(name:"cvss_base", value:"5.8");
+ script_tag(name:"risk_factor", value:"High");
  script_name("SLES11: Security update for Mozilla Firefox");
 
  desc = "The remote host is missing updates to packages that affect

Modified: trunk/openvas-plugins/scripts/sles11_MozillaFirefox7.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles11_MozillaFirefox7.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/sles11_MozillaFirefox7.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -31,8 +31,8 @@
  script_id(66228);
  script_cve_id("CVE-2009-3370", "CVE-2009-3274", "CVE-2009-3371", "CVE-2009-3372", "CVE-2009-3373", "CVE-2009-3374", "CVE-2009-1563", "CVE-2009-3375", "CVE-2009-3376", "CVE-2009-3377", "CVE-2009-3379", "CVE-2009-3378", "CVE-2009-3380", "CVE-2009-3381", "CVE-2009-3382", "CVE-2009-3383");
  script_version ("$Revision$");
- script_tag(name:"cvss_base", value:"10.0");
- script_tag(name:"risk_factor", value:"Critical");
+ script_tag(name:"cvss_base", value:"5.0");
+ script_tag(name:"risk_factor", value:"Medium");
  script_name("SLES11: Security update for Mozilla Firefox");
 
  desc = "The remote host is missing updates to packages that affect
@@ -56,7 +56,7 @@
 
 Please install the updates provided by SuSE.
 
-Risk factor : High";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/sles11_NetworkManager.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles11_NetworkManager.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/sles11_NetworkManager.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -31,8 +31,8 @@
  script_id(65652);
  script_cve_id("CVE-2009-0365", "CVE-2009-0578");
  script_version ("$Revision$");
- script_tag(name:"cvss_base", value:"6.2");
- script_tag(name:"risk_factor", value:"High");
+ script_tag(name:"cvss_base", value:"4.6");
+ script_tag(name:"risk_factor", value:"Medium");
  script_name("SLES11: Security update for NetworkManager");
 
  desc = "The remote host is missing updates to packages that affect
@@ -58,7 +58,7 @@
 
 Please install the updates provided by SuSE.
 
-Risk factor : High";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/sles11_apache2.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles11_apache2.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/sles11_apache2.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -31,8 +31,8 @@
  script_id(66081);
  script_cve_id("CVE-2009-1195", "CVE-2009-1890", "CVE-2009-1891", "CVE-2009-3094", "CVE-2009-3095");
  script_version ("$Revision$");
- script_tag(name:"cvss_base", value:"7.5");
- script_tag(name:"risk_factor", value:"High");
+ script_tag(name:"cvss_base", value:"4.9");
+ script_tag(name:"risk_factor", value:"Medium");
  script_name("SLES11: Security update for Apache 2");
 
  desc = "The remote host is missing updates to packages that affect
@@ -62,7 +62,7 @@
 
 Please install the updates provided by SuSE.
 
-Risk factor : High";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/sles11_bind0.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles11_bind0.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/sles11_bind0.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -31,7 +31,7 @@
  script_id(66349);
  script_cve_id("CVE-2009-4022");
  script_version ("$Revision$");
- script_tag(name:"cvss_base", value:"4.0");
+ script_tag(name:"cvss_base", value:"2.6");
  script_tag(name:"risk_factor", value:"Medium");
  script_name("SLES11: Security update for bind");
 
@@ -56,7 +56,7 @@
 
 Please install the updates provided by SuSE.
 
-Risk factor : High";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/sles11_ext4dev-kmp-def.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles11_ext4dev-kmp-def.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/sles11_ext4dev-kmp-def.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -31,8 +31,8 @@
  script_id(65649);
  script_cve_id("CVE-2009-1072", "CVE-2009-0676", "CVE-2009-0835");
  script_version ("$Revision$");
- script_tag(name:"cvss_base", value:"7.2");
- script_tag(name:"risk_factor", value:"High");
+ script_tag(name:"cvss_base", value:"4.9");
+ script_tag(name:"risk_factor", value:"Medium");
  script_name("SLES11: Security update for Linux kernel");
 
  desc = "The remote host is missing updates to packages that affect
@@ -110,7 +110,7 @@
 
 Please install the updates provided by SuSE.
 
-Risk factor : High";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/sles11_ext4dev-kmp-def1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles11_ext4dev-kmp-def1.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/sles11_ext4dev-kmp-def1.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -31,8 +31,8 @@
  script_id(65695);
  script_cve_id("CVE-2009-1961", "CVE-2009-1389", "CVE-2009-1385", "CVE-2009-1630");
  script_version ("$Revision$");
- script_tag(name:"cvss_base", value:"7.8");
- script_tag(name:"risk_factor", value:"High");
+ script_tag(name:"cvss_base", value:"1.9");
+ script_tag(name:"risk_factor", value:"Low");
  script_name("SLES11: Security update for Linux kernel");
 
  desc = "The remote host is missing updates to packages that affect
@@ -107,7 +107,7 @@
 
 Please install the updates provided by SuSE.
 
-Risk factor : High";
+Risk factor : Low";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/sles11_ext4dev-kmp-def2.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles11_ext4dev-kmp-def2.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/sles11_ext4dev-kmp-def2.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -31,7 +31,7 @@
  script_id(65709);
  script_cve_id("CVE-2009-2692", "CVE-2009-2406", "CVE-2009-2407", "CVE-2009-1389");
  script_version ("$Revision$");
- script_tag(name:"cvss_base", value:"7.8");
+ script_tag(name:"cvss_base", value:"7.2");
  script_tag(name:"risk_factor", value:"High");
  script_name("SLES11: Security update for Linux kernel");
 

Modified: trunk/openvas-plugins/scripts/sles11_ext4dev-kmp-def4.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles11_ext4dev-kmp-def4.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/sles11_ext4dev-kmp-def4.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -31,7 +31,7 @@
  script_id(66352);
  script_cve_id("CVE-2009-3547", "CVE-2009-2910", "CVE-2009-2903", "CVE-2009-3621", "CVE-2009-3612", "CVE-2005-4881", "CVE-2009-3620", "CVE-2009-3726", "CVE-2009-3286");
  script_version ("$Revision$");
- script_tag(name:"cvss_base", value:"7.8");
+ script_tag(name:"cvss_base", value:"6.9");
  script_tag(name:"risk_factor", value:"High");
  script_name("SLES11: Security update for Linux kernel");
 

Modified: trunk/openvas-plugins/scripts/sles11_java-1_4_2-ibm.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles11_java-1_4_2-ibm.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/sles11_java-1_4_2-ibm.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -31,8 +31,8 @@
  script_id(65640);
  script_cve_id("CVE-2008-5350", "CVE-2008-5346", "CVE-2008-5343", "CVE-2008-5344", "CVE-2008-5359", "CVE-2008-5339", "CVE-2008-5340", "CVE-2008-5348", "CVE-2008-2086", "CVE-2008-5345", "CVE-2008-5351", "CVE-2008-5360", "CVE-2008-5353", "CVE-2008-5356", "CVE-2008-5354", "CVE-2008-5357", "CVE-2008-5342");
  script_version ("$Revision$");
- script_tag(name:"cvss_base", value:"10.0");
- script_tag(name:"risk_factor", value:"Critical");
+ script_tag(name:"cvss_base", value:"5.0");
+ script_tag(name:"risk_factor", value:"Medium");
  script_name("SLES11: Security update for IBM Java 1.4.2");
 
  desc = "The remote host is missing updates to packages that affect
@@ -55,7 +55,7 @@
 
 Please install the updates provided by SuSE.
 
-Risk factor : High";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/sles11_java-1_4_2-ibm0.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles11_java-1_4_2-ibm0.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/sles11_java-1_4_2-ibm0.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -31,8 +31,8 @@
  script_id(65728);
  script_cve_id("CVE-2009-2625", "CVE-2008-5349");
  script_version ("$Revision$");
- script_tag(name:"cvss_base", value:"7.1");
- script_tag(name:"risk_factor", value:"High");
+ script_tag(name:"cvss_base", value:"5.0");
+ script_tag(name:"risk_factor", value:"Medium");
  script_name("SLES11: Security update for IBM Java 1.4.2");
 
  desc = "The remote host is missing updates to packages that affect
@@ -54,7 +54,7 @@
 
 Please install the updates provided by SuSE.
 
-Risk factor : High";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/sles11_java-1_6_0-ibm.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles11_java-1_6_0-ibm.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/sles11_java-1_6_0-ibm.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -31,8 +31,8 @@
  script_id(65641);
  script_cve_id("CVE-2008-5341", "CVE-2008-5340", "CVE-2008-5351", "CVE-2008-5356", "CVE-2008-5357", "CVE-2008-5358", "CVE-2008-5342");
  script_version ("$Revision$");
- script_tag(name:"cvss_base", value:"10.0");
- script_tag(name:"risk_factor", value:"Critical");
+ script_tag(name:"cvss_base", value:"5.0");
+ script_tag(name:"risk_factor", value:"Medium");
  script_name("SLES11: Security update for IBM Java 1.6.0");
 
  desc = "The remote host is missing updates to packages that affect
@@ -56,7 +56,7 @@
 
 Please install the updates provided by SuSE.
 
-Risk factor : High";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/sles11_java-1_6_0-ibm0.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles11_java-1_6_0-ibm0.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/sles11_java-1_6_0-ibm0.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -31,8 +31,8 @@
  script_id(65682);
  script_cve_id("CVE-2009-1093", "CVE-2009-1094", "CVE-2009-1095", "CVE-2009-1096", "CVE-2009-1097", "CVE-2009-1098", "CVE-2009-1099", "CVE-2009-1100", "CVE-2009-1101", "CVE-2009-1103", "CVE-2009-1104", "CVE-2009-1105", "CVE-2009-1106", "CVE-2009-1107");
  script_version ("$Revision$");
- script_tag(name:"cvss_base", value:"10.0");
- script_tag(name:"risk_factor", value:"Critical");
+ script_tag(name:"cvss_base", value:"5.0");
+ script_tag(name:"risk_factor", value:"Medium");
  script_name("SLES11: Security update for IBM Java 1.6.0");
 
  desc = "The remote host is missing updates to packages that affect
@@ -57,7 +57,7 @@
 
 Please install the updates provided by SuSE.
 
-Risk factor : High";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/sles11_java-1_6_0-ibm1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles11_java-1_6_0-ibm1.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/sles11_java-1_6_0-ibm1.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -31,8 +31,8 @@
  script_id(66230);
  script_cve_id("CVE-2009-2676", "CVE-2009-2493", "CVE-2009-2670", "CVE-2009-0217", "CVE-2009-2671", "CVE-2009-2672", "CVE-2009-2673", "CVE-2009-2674", "CVE-2009-2675", "CVE-2009-2625");
  script_version ("$Revision$");
- script_tag(name:"cvss_base", value:"10.0");
- script_tag(name:"risk_factor", value:"Critical");
+ script_tag(name:"cvss_base", value:"6.8");
+ script_tag(name:"risk_factor", value:"High");
  script_name("SLES11: Security update for IBM Java 1.6.0");
 
  desc = "The remote host is missing updates to packages that affect

Modified: trunk/openvas-plugins/scripts/sles11_krb5.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles11_krb5.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/sles11_krb5.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -31,8 +31,8 @@
  script_id(65638);
  script_cve_id("CVE-2009-0845", "CVE-2009-0844", "CVE-2009-0847", "CVE-2009-0846");
  script_version ("$Revision$");
- script_tag(name:"cvss_base", value:"10.0");
- script_tag(name:"risk_factor", value:"Critical");
+ script_tag(name:"cvss_base", value:"5.0");
+ script_tag(name:"risk_factor", value:"Medium");
  script_name("SLES11: Security update for Kerberos");
 
  desc = "The remote host is missing updates to packages that affect
@@ -58,7 +58,7 @@
 
 Please install the updates provided by SuSE.
 
-Risk factor : High";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/sles11_libopenssl0_9_82.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles11_libopenssl0_9_82.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/sles11_libopenssl0_9_82.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -31,7 +31,7 @@
  script_id(66285);
  script_cve_id("CVE-2009-3555");
  script_version ("$Revision$");
- script_tag(name:"cvss_base", value:"6.4");
+ script_tag(name:"cvss_base", value:"5.8");
  script_tag(name:"risk_factor", value:"High");
  script_name("SLES11: Security update for libopenssl");
 

Modified: trunk/openvas-plugins/scripts/sles11_libpoppler4.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles11_libpoppler4.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/sles11_libpoppler4.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -31,8 +31,8 @@
  script_id(65679);
  script_cve_id("CVE-2009-0146", "CVE-2009-0147", "CVE-2009-0165", "CVE-2009-0166", "CVE-2009-0799", "CVE-2009-0800", "CVE-2009-1179", "CVE-2009-1180", "CVE-2009-1181", "CVE-2009-1182", "CVE-2009-1183", "CVE-2009-0755", "CVE-2009-0756");
  script_version ("$Revision$");
- script_tag(name:"cvss_base", value:"10.0");
- script_tag(name:"risk_factor", value:"Critical");
+ script_tag(name:"cvss_base", value:"4.3");
+ script_tag(name:"risk_factor", value:"Medium");
  script_name("SLES11: Security update for libpoppler4");
 
  desc = "The remote host is missing updates to packages that affect
@@ -54,7 +54,7 @@
 
 Please install the updates provided by SuSE.
 
-Risk factor : High";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/sles11_mozilla-xulrunn.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles11_mozilla-xulrunn.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/sles11_mozilla-xulrunn.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -31,8 +31,8 @@
  script_id(65661);
  script_cve_id("CVE-2009-1302", "CVE-2009-1303", "CVE-2009-1304", "CVE-2009-1305", "CVE-2009-1307", "CVE-2009-1308", "CVE-2009-1309", "CVE-2009-1311", "CVE-2009-1312", "CVE-2009-0652");
  script_version ("$Revision$");
- script_tag(name:"cvss_base", value:"6.8");
- script_tag(name:"risk_factor", value:"High");
+ script_tag(name:"cvss_base", value:"5.0");
+ script_tag(name:"risk_factor", value:"Medium");
  script_name("SLES11: Security update for Mozilla");
 
  desc = "The remote host is missing updates to packages that affect
@@ -54,7 +54,7 @@
 
 Please install the updates provided by SuSE.
 
-Risk factor : High";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/sles11_mozilla-xulrunn1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles11_mozilla-xulrunn1.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/sles11_mozilla-xulrunn1.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -31,8 +31,8 @@
  script_id(66229);
  script_cve_id("CVE-2009-3370", "CVE-2009-3274", "CVE-2009-3371", "CVE-2009-3372", "CVE-2009-3373", "CVE-2009-3374", "CVE-2009-1563", "CVE-2009-3375", "CVE-2009-3376", "CVE-2009-3380", "CVE-2009-3381", "CVE-2009-3382", "CVE-2009-3383");
  script_version ("$Revision$");
- script_tag(name:"cvss_base", value:"10.0");
- script_tag(name:"risk_factor", value:"Critical");
+ script_tag(name:"cvss_base", value:"5.0");
+ script_tag(name:"risk_factor", value:"Medium");
  script_name("SLES11: Security update for Mozilla XULRunner");
 
  desc = "The remote host is missing updates to packages that affect
@@ -54,7 +54,7 @@
 
 Please install the updates provided by SuSE.
 
-Risk factor : High";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/sles11_postgresql0.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles11_postgresql0.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/sles11_postgresql0.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -31,8 +31,8 @@
  script_id(65725);
  script_cve_id("CVE-2009-3229", "CVE-2009-3230", "CVE-2009-3231");
  script_version ("$Revision$");
- script_tag(name:"cvss_base", value:"6.8");
- script_tag(name:"risk_factor", value:"High");
+ script_tag(name:"cvss_base", value:"4.0");
+ script_tag(name:"risk_factor", value:"Medium");
  script_name("SLES11: Security update for PostgreSQL");
 
  desc = "The remote host is missing updates to packages that affect
@@ -56,7 +56,7 @@
 
 Please install the updates provided by SuSE.
 
-Risk factor : High";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/sles11_ruby.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles11_ruby.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/sles11_ruby.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -31,7 +31,7 @@
  script_id(65687);
  script_cve_id("CVE-2009-0642", "CVE-2008-3905", "CVE-2008-3790", "CVE-2008-3656", "CVE-2008-3443", "CVE-2008-3655", "CVE-2008-3657", "CVE-2009-1904");
  script_version ("$Revision$");
- script_tag(name:"cvss_base", value:"7.8");
+ script_tag(name:"cvss_base", value:"6.8");
  script_tag(name:"risk_factor", value:"High");
  script_name("SLES11: Security update for ruby");
 

Modified: trunk/openvas-plugins/scripts/sles11_wireshark.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles11_wireshark.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/sles11_wireshark.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -31,8 +31,8 @@
  script_id(65667);
  script_cve_id("CVE-2009-1269", "CVE-2009-1268", "CVE-2009-1267", "CVE-2009-1210", "CVE-2009-1266");
  script_version ("$Revision$");
- script_tag(name:"cvss_base", value:"10.0");
- script_tag(name:"risk_factor", value:"Critical");
+ script_tag(name:"cvss_base", value:"5.0");
+ script_tag(name:"risk_factor", value:"Medium");
  script_name("SLES11: Security update for wireshark");
 
  desc = "The remote host is missing updates to packages that affect
@@ -52,7 +52,7 @@
 
 Please install the updates provided by SuSE.
 
-Risk factor : High";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/sles11_wireshark1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles11_wireshark1.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/sles11_wireshark1.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -31,8 +31,8 @@
  script_id(66532);
  script_cve_id("CVE-2009-3549", "CVE-2009-3550", "CVE-2009-3551", "CVE-2009-2560", "CVE-2009-3829");
  script_version ("$Revision$");
- script_tag(name:"cvss_base", value:"9.3");
- script_tag(name:"risk_factor", value:"Critical");
+ script_tag(name:"cvss_base", value:"5.0");
+ script_tag(name:"risk_factor", value:"Medium");
  script_name("SLES11: Security update for wireshark");
 
  desc = "The remote host is missing updates to packages that affect
@@ -53,7 +53,7 @@
 
 Please install the updates provided by SuSE.
 
-Risk factor : High";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/sles9p5009131.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles9p5009131.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/sles9p5009131.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -30,8 +30,8 @@
  script_id(65551);
  script_cve_id("CVE-2007-3389", "CVE-2007-3390", "CVE-2007-3391", "CVE-2007-3392", "CVE-2007-3393");
  script_version ("$Revision$");
- script_tag(name:"cvss_base", value:"7.8");
- script_tag(name:"risk_factor", value:"High");
+ script_tag(name:"cvss_base", value:"5.0");
+ script_tag(name:"risk_factor", value:"Medium");
  script_name("SLES9: Security update for ethereal");
 
  desc = "The remote host is missing updates to packages that affect
@@ -51,7 +51,7 @@
 
 Please install the updates provided by SuSE.
 
-Risk factor : High";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/sles9p5009158.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles9p5009158.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/sles9p5009158.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -30,8 +30,8 @@
  script_id(65488);
  script_cve_id("CVE-2005-2919", "CVE-2005-2920");
  script_version ("$Revision$");
- script_tag(name:"cvss_base", value:"7.5");
- script_tag(name:"risk_factor", value:"High");
+ script_tag(name:"cvss_base", value:"5.0");
+ script_tag(name:"risk_factor", value:"Medium");
  script_name("SLES9: Security update for clamav");
 
  desc = "The remote host is missing updates to packages that affect
@@ -51,7 +51,7 @@
 
 Please install the updates provided by SuSE.
 
-Risk factor : High";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/sles9p5009300.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles9p5009300.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/sles9p5009300.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -30,8 +30,8 @@
  script_id(65146);
  script_cve_id("CVE-2007-0906", "CVE-2007-0907", "CVE-2007-0908", "CVE-2007-0909", "CVE-2007-0910", "CVE-2007-0911", "CVE-2006-6383");
  script_version ("$Revision$");
- script_tag(name:"cvss_base", value:"10.0");
- script_tag(name:"risk_factor", value:"Critical");
+ script_tag(name:"cvss_base", value:"7.5");
+ script_tag(name:"risk_factor", value:"High");
  script_name("SLES9: Security update for PHP4");
 
  desc = "The remote host is missing updates to packages that affect

Modified: trunk/openvas-plugins/scripts/sles9p5009301.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles9p5009301.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/sles9p5009301.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -30,8 +30,8 @@
  script_id(65499);
  script_cve_id("CVE-2006-5793", "CVE-2006-3334");
  script_version ("$Revision$");
- script_tag(name:"cvss_base", value:"7.5");
- script_tag(name:"risk_factor", value:"High");
+ script_tag(name:"cvss_base", value:"2.6");
+ script_tag(name:"risk_factor", value:"Medium");
  script_name("SLES9: Security update for libpng");
 
  desc = "The remote host is missing updates to packages that affect
@@ -52,7 +52,7 @@
 
 Please install the updates provided by SuSE.
 
-Risk factor : High";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/sles9p5009598.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles9p5009598.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/sles9p5009598.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -30,8 +30,8 @@
  script_id(65038);
  script_cve_id("CVE-2005-0400", "CVE-2005-0749", "CVE-2005-1263");
  script_version ("$Revision$");
- script_tag(name:"cvss_base", value:"7.2");
- script_tag(name:"risk_factor", value:"High");
+ script_tag(name:"cvss_base", value:"2.1");
+ script_tag(name:"risk_factor", value:"Medium");
  script_name("SLES9: Security update for kernel");
 
  desc = "The remote host is missing updates to packages that affect
@@ -59,7 +59,7 @@
 
 Please install the updates provided by SuSE.
 
-Risk factor : High";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/sles9p5009713.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles9p5009713.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/sles9p5009713.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -30,8 +30,8 @@
  script_id(65450);
  script_cve_id("CVE-2004-0942", "CVE-2004-0885");
  script_version ("$Revision$");
- script_tag(name:"cvss_base", value:"7.5");
- script_tag(name:"risk_factor", value:"High");
+ script_tag(name:"cvss_base", value:"5.0");
+ script_tag(name:"risk_factor", value:"Medium");
  script_name("SLES9: Security update for apache2");
 
  desc = "The remote host is missing updates to packages that affect
@@ -57,7 +57,7 @@
 
 Please install the updates provided by SuSE.
 
-Risk factor : High";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/sles9p5010460.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles9p5010460.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/sles9p5010460.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -30,8 +30,8 @@
  script_id(65461);
  script_cve_id("CVE-2004-0689", "CVE-2004-0690", "CVE-2004-0721");
  script_version ("$Revision$");
- script_tag(name:"cvss_base", value:"7.5");
- script_tag(name:"risk_factor", value:"High");
+ script_tag(name:"cvss_base", value:"4.6");
+ script_tag(name:"risk_factor", value:"Medium");
  script_name("SLES9: Security update for KDE");
 
  desc = "The remote host is missing updates to packages that affect
@@ -54,7 +54,7 @@
 
 Please install the updates provided by SuSE.
 
-Risk factor : High";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/sles9p5010771.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles9p5010771.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/sles9p5010771.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -30,8 +30,8 @@
  script_id(65242);
  script_cve_id("CVE-2005-3353", "CVE-2005-3389", "CVE-2005-3390");
  script_version ("$Revision$");
- script_tag(name:"cvss_base", value:"7.5");
- script_tag(name:"risk_factor", value:"High");
+ script_tag(name:"cvss_base", value:"5.0");
+ script_tag(name:"risk_factor", value:"Medium");
  script_name("SLES9: Security update for PHP4");
 
  desc = "The remote host is missing updates to packages that affect
@@ -64,7 +64,7 @@
 
 Please install the updates provided by SuSE.
 
-Risk factor : High";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/sles9p5010939.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles9p5010939.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/sles9p5010939.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -30,8 +30,8 @@
  script_id(65026);
  script_cve_id("CVE-2005-3356", "CVE-2005-3358", "CVE-2005-3623", "CVE-2005-3848", "CVE-2005-3858");
  script_version ("$Revision$");
- script_tag(name:"cvss_base", value:"7.8");
- script_tag(name:"risk_factor", value:"High");
+ script_tag(name:"cvss_base", value:"2.1");
+ script_tag(name:"risk_factor", value:"Medium");
  script_name("SLES9: Security update for Linux kernel");
 
  desc = "The remote host is missing updates to packages that affect
@@ -59,7 +59,7 @@
 
 Please install the updates provided by SuSE.
 
-Risk factor : High";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/sles9p5010966.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles9p5010966.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/sles9p5010966.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -30,8 +30,8 @@
  script_id(65364);
  script_cve_id("CVE-2004-1139", "CVE-2004-1140", "CVE-2004-1141", "CVE-2004-1142", "CVE-2005-0006", "CVE-2005-0007", "CVE-2005-0008", "CVE-2005-0009", "CVE-2005-0010", "CVE-2005-0084");
  script_version ("$Revision$");
- script_tag(name:"cvss_base", value:"7.5");
- script_tag(name:"risk_factor", value:"High");
+ script_tag(name:"cvss_base", value:"5.0");
+ script_tag(name:"risk_factor", value:"Medium");
  script_name("SLES9: Security update for ethereal");
 
  desc = "The remote host is missing updates to packages that affect
@@ -51,7 +51,7 @@
 
 Please install the updates provided by SuSE.
 
-Risk factor : High";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/sles9p5010972.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles9p5010972.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/sles9p5010972.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -30,8 +30,8 @@
  script_id(65135);
  script_cve_id("CVE-2005-0227", "CVE-2005-0244", "CVE-2005-0245", "CVE-2005-0246", "CVE-2005-0247", "CVE-2005-1409", "CVE-2005-1410");
  script_version ("$Revision$");
- script_tag(name:"cvss_base", value:"7.5");
- script_tag(name:"risk_factor", value:"High");
+ script_tag(name:"cvss_base", value:"4.3");
+ script_tag(name:"risk_factor", value:"Medium");
  script_name("SLES9: Security update for PostgreSQL");
 
  desc = "The remote host is missing updates to packages that affect
@@ -57,7 +57,7 @@
 
 Please install the updates provided by SuSE.
 
-Risk factor : High";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/sles9p5011006.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles9p5011006.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/sles9p5011006.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -30,8 +30,8 @@
  script_id(65616);
  script_cve_id("CVE-2007-0537", "CVE-2007-1564");
  script_version ("$Revision$");
- script_tag(name:"cvss_base", value:"6.8");
- script_tag(name:"risk_factor", value:"High");
+ script_tag(name:"cvss_base", value:"2.6");
+ script_tag(name:"risk_factor", value:"Medium");
  script_name("SLES9: Security update for kdelibs3");
 
  desc = "The remote host is missing updates to packages that affect
@@ -52,7 +52,7 @@
 
 Please install the updates provided by SuSE.
 
-Risk factor : High";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/sles9p5011022.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles9p5011022.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/sles9p5011022.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -30,8 +30,8 @@
  script_id(65164);
  script_cve_id("CVE-2005-2974", "CVE-2005-3350");
  script_version ("$Revision$");
- script_tag(name:"cvss_base", value:"7.5");
- script_tag(name:"risk_factor", value:"High");
+ script_tag(name:"cvss_base", value:"2.6");
+ script_tag(name:"risk_factor", value:"Medium");
  script_name("SLES9: Security update for libungif");
 
  desc = "The remote host is missing updates to packages that affect
@@ -51,7 +51,7 @@
 
 Please install the updates provided by SuSE.
 
-Risk factor : High";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/sles9p5011171.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles9p5011171.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/sles9p5011171.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -30,7 +30,7 @@
  script_id(65101);
  script_cve_id("CVE-2005-0449", "CVE-2005-0209", "CVE-2005-0529", "CVE-2005-0530", "CVE-2005-0136", "CVE-2005-0532", "CVE-2005-0135", "CVE-2005-0384", "CVE-2005-0210", "CVE-2005-0504", "CVE-2004-0814");
  script_version ("$Revision$");
- script_tag(name:"cvss_base", value:"7.8");
+ script_tag(name:"cvss_base", value:"7.1");
  script_tag(name:"risk_factor", value:"High");
  script_name("SLES9: Security update for Linux kernel");
 

Modified: trunk/openvas-plugins/scripts/sles9p5011429.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles9p5011429.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/sles9p5011429.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -30,8 +30,8 @@
  script_id(65237);
  script_cve_id("CVE-2006-2936", "CVE-2006-5871", "CVE-2006-6106", "CVE-2006-6535", "CVE-2006-5749", "CVE-2006-5753", "CVE-2006-5754", "CVE-2007-1357", "CVE-2007-1592", "CVE-2007-1353", "CVE-2006-7203");
  script_version ("$Revision$");
- script_tag(name:"cvss_base", value:"9.4");
- script_tag(name:"risk_factor", value:"Critical");
+ script_tag(name:"cvss_base", value:"7.8");
+ script_tag(name:"risk_factor", value:"High");
  script_name("SLES9: Security update for Linux kernel");
 
  desc = "The remote host is missing updates to packages that affect

Modified: trunk/openvas-plugins/scripts/sles9p5011436.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles9p5011436.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/sles9p5011436.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -30,8 +30,8 @@
  script_id(65191);
  script_cve_id("CVE-2004-1184", "CVE-2004-1185", "CVE-2004-1186");
  script_version ("$Revision$");
- script_tag(name:"cvss_base", value:"7.5");
- script_tag(name:"risk_factor", value:"High");
+ script_tag(name:"cvss_base", value:"4.6");
+ script_tag(name:"risk_factor", value:"Medium");
  script_name("SLES9: Security update for enscript");
 
  desc = "The remote host is missing updates to packages that affect
@@ -51,7 +51,7 @@
 
 Please install the updates provided by SuSE.
 
-Risk factor : High";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/sles9p5011912.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles9p5011912.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/sles9p5011912.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -30,8 +30,8 @@
  script_id(65143);
  script_cve_id("CVE-2004-1145", "CVE-2004-1158");
  script_version ("$Revision$");
- script_tag(name:"cvss_base", value:"7.5");
- script_tag(name:"risk_factor", value:"High");
+ script_tag(name:"cvss_base", value:"5.0");
+ script_tag(name:"risk_factor", value:"Medium");
  script_name("SLES9: Security update for kdelibs3");
 
  desc = "The remote host is missing updates to packages that affect
@@ -51,7 +51,7 @@
 
 Please install the updates provided by SuSE.
 
-Risk factor : High";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/sles9p5012004.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles9p5012004.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/sles9p5012004.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -30,8 +30,8 @@
  script_id(65017);
  script_cve_id("CVE-2005-3352", "CVE-2005-3357");
  script_version ("$Revision$");
- script_tag(name:"cvss_base", value:"5.4");
- script_tag(name:"risk_factor", value:"High");
+ script_tag(name:"cvss_base", value:"4.3");
+ script_tag(name:"risk_factor", value:"Medium");
  script_name("SLES9: Security update for Apache 2");
 
  desc = "The remote host is missing updates to packages that affect
@@ -53,7 +53,7 @@
 
 Please install the updates provided by SuSE.
 
-Risk factor : High";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/sles9p5012110.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles9p5012110.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/sles9p5012110.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -30,8 +30,8 @@
  script_id(65172);
  script_cve_id("CVE-2007-1285", "CVE-2007-3007", "CVE-2007-2756", "CVE-2007-2872", "CVE-2007-1396", "CVE-2007-1864", "CVE-2007-2509");
  script_version ("$Revision$");
- script_tag(name:"cvss_base", value:"7.5");
- script_tag(name:"risk_factor", value:"High");
+ script_tag(name:"cvss_base", value:"5.0");
+ script_tag(name:"risk_factor", value:"Medium");
  script_name("SLES9: Security update for PHP4");
 
  desc = "The remote host is missing updates to packages that affect
@@ -100,7 +100,7 @@
 
 Please install the updates provided by SuSE.
 
-Risk factor : High";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/sles9p5012115.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles9p5012115.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/sles9p5012115.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -30,8 +30,8 @@
  script_id(65589);
  script_cve_id("CVE-2007-0775", "CVE-2007-0776", "CVE-2007-0777", "CVE-2007-0995", "CVE-2007-0996", "CVE-2006-6077", "CVE-2007-0778", "CVE-2007-0779", "CVE-2007-0780", "CVE-2007-0800", "CVE-2007-0008", "CVE-2007-0009", "CVE-2007-0981");
  script_version ("$Revision$");
- script_tag(name:"cvss_base", value:"9.3");
- script_tag(name:"risk_factor", value:"Critical");
+ script_tag(name:"cvss_base", value:"3.7");
+ script_tag(name:"risk_factor", value:"Medium");
  script_name("SLES9: Security update for Mozilla suite");
 
  desc = "The remote host is missing updates to packages that affect
@@ -60,7 +60,7 @@
 
 Please install the updates provided by SuSE.
 
-Risk factor : High";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/sles9p5012138.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles9p5012138.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/sles9p5012138.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -30,8 +30,8 @@
  script_id(65444);
  script_cve_id("CVE-2007-6335", "CVE-2007-6336", "CVE-2007-6337");
  script_version ("$Revision$");
- script_tag(name:"cvss_base", value:"10.0");
- script_tag(name:"risk_factor", value:"Critical");
+ script_tag(name:"cvss_base", value:"7.5");
+ script_tag(name:"risk_factor", value:"High");
  script_name("SLES9: Security update for clamav");
 
  desc = "The remote host is missing updates to packages that affect

Modified: trunk/openvas-plugins/scripts/sles9p5012225.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles9p5012225.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/sles9p5012225.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -30,7 +30,7 @@
  script_id(65302);
  script_cve_id("CVE-2005-3191", "CVE-2005-3192");
  script_version ("$Revision$");
- script_tag(name:"cvss_base", value:"7.5");
+ script_tag(name:"cvss_base", value:"5.1");
  script_tag(name:"risk_factor", value:"High");
  script_name("SLES9: Security update for cups");
 

Modified: trunk/openvas-plugins/scripts/sles9p5012483.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles9p5012483.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/sles9p5012483.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -30,8 +30,8 @@
  script_id(65188);
  script_cve_id("CVE-2007-5958", "CVE-2007-6427", "CVE-2007-6428", "CVE-2007-6429", "CVE-2007-5760");
  script_version ("$Revision$");
- script_tag(name:"cvss_base", value:"9.3");
- script_tag(name:"risk_factor", value:"Critical");
+ script_tag(name:"cvss_base", value:"5.0");
+ script_tag(name:"risk_factor", value:"Medium");
  script_name("SLES9: Security update for XFree86-Xnest");
 
  desc = "The remote host is missing updates to packages that affect
@@ -52,7 +52,7 @@
 
 Please install the updates provided by SuSE.
 
-Risk factor : High";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/sles9p5012650.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles9p5012650.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/sles9p5012650.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -30,8 +30,8 @@
  script_id(65177);
  script_cve_id("CVE-2006-4145", "CVE-2006-3741", "CVE-2006-4538", "CVE-2006-4997", "CVE-2006-5757", "CVE-2006-6060", "CVE-2006-4813", "CVE-2006-5174", "CVE-2006-5648", "CVE-2006-5649", "CVE-2006-5823", "CVE-2006-6053", "CVE-2006-6054", "CVE-2006-6056");
  script_version ("$Revision$");
- script_tag(name:"cvss_base", value:"7.1");
- script_tag(name:"risk_factor", value:"High");
+ script_tag(name:"cvss_base", value:"4.9");
+ script_tag(name:"risk_factor", value:"Medium");
  script_name("SLES9: Security update for Linux kernel");
 
  desc = "The remote host is missing updates to packages that affect
@@ -59,7 +59,7 @@
 
 Please install the updates provided by SuSE.
 
-Risk factor : High";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/sles9p5012664.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles9p5012664.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/sles9p5012664.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -30,7 +30,7 @@
  script_id(65113);
  script_cve_id("CVE-2006-5752", "CVE-2007-1863", "CVE-2007-3304", "CVE-2007-3847", "CVE-2007-4465");
  script_version ("$Revision$");
- script_tag(name:"cvss_base", value:"5.0");
+ script_tag(name:"cvss_base", value:"4.3");
  script_tag(name:"risk_factor", value:"Medium");
  script_name("SLES9: Security update for apache2");
 
@@ -57,7 +57,7 @@
 
 Please install the updates provided by SuSE.
 
-Risk factor : High";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/sles9p5012702.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles9p5012702.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/sles9p5012702.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -30,7 +30,7 @@
  script_id(65598);
  script_cve_id("CVE-2007-6199", "CVE-2007-6200");
  script_version ("$Revision$");
- script_tag(name:"cvss_base", value:"10.0");
+ script_tag(name:"cvss_base", value:"9.3");
  script_tag(name:"risk_factor", value:"Critical");
  script_name("SLES9: Security update for rsync");
 
@@ -51,7 +51,7 @@
 
 Please install the updates provided by SuSE.
 
-Risk factor : High";
+Risk factor : Critical";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/sles9p5012976.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles9p5012976.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/sles9p5012976.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -30,8 +30,8 @@
  script_id(65213);
  script_cve_id("CVE-2006-4334", "CVE-2006-4335", "CVE-2006-4336", "CVE-2006-4337", "CVE-2006-4338");
  script_version ("$Revision$");
- script_tag(name:"cvss_base", value:"7.5");
- script_tag(name:"risk_factor", value:"High");
+ script_tag(name:"cvss_base", value:"5.0");
+ script_tag(name:"risk_factor", value:"Medium");
  script_name("SLES9: Security update for gzip");
 
  desc = "The remote host is missing updates to packages that affect
@@ -51,7 +51,7 @@
 
 Please install the updates provided by SuSE.
 
-Risk factor : High";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/sles9p5013177.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles9p5013177.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/sles9p5013177.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -30,8 +30,8 @@
  script_id(65030);
  script_cve_id("CVE-2006-3627", "CVE-2006-3628", "CVE-2006-3629", "CVE-2006-3630", "CVE-2006-3631", "CVE-2006-3632");
  script_version ("$Revision$");
- script_tag(name:"cvss_base", value:"10.0");
- script_tag(name:"risk_factor", value:"Critical");
+ script_tag(name:"cvss_base", value:"5.0");
+ script_tag(name:"risk_factor", value:"Medium");
  script_name("SLES9: Security update for ethereal");
 
  desc = "The remote host is missing updates to packages that affect
@@ -51,7 +51,7 @@
 
 Please install the updates provided by SuSE.
 
-Risk factor : High";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/sles9p5013194.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles9p5013194.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/sles9p5013194.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -30,8 +30,8 @@
  script_id(65093);
  script_cve_id("CVE-2005-0227", "CVE-2005-0244", "CVE-2005-0245", "CVE-2005-0246", "CVE-2005-0247");
  script_version ("$Revision$");
- script_tag(name:"cvss_base", value:"7.5");
- script_tag(name:"risk_factor", value:"High");
+ script_tag(name:"cvss_base", value:"4.3");
+ script_tag(name:"risk_factor", value:"Medium");
  script_name("SLES9: Security update for postgresql");
 
  desc = "The remote host is missing updates to packages that affect
@@ -57,7 +57,7 @@
 
 Please install the updates provided by SuSE.
 
-Risk factor : High";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/sles9p5013279.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles9p5013279.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/sles9p5013279.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -30,8 +30,8 @@
  script_id(65308);
  script_cve_id("CVE-2007-0243", "CVE-2006-6737", "CVE-2006-6736", "CVE-2006-6745");
  script_version ("$Revision$");
- script_tag(name:"cvss_base", value:"9.3");
- script_tag(name:"risk_factor", value:"Critical");
+ script_tag(name:"cvss_base", value:"6.8");
+ script_tag(name:"risk_factor", value:"High");
  script_name("SLES9: Security update for IBMJava2 SDK and IBMJava2 JRE");
 
  desc = "The remote host is missing updates to packages that affect

Modified: trunk/openvas-plugins/scripts/sles9p5013454.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles9p5013454.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/sles9p5013454.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -30,8 +30,8 @@
  script_id(65575);
  script_cve_id("CVE-2005-3357", "CVE-2005-2700", "CVE-2006-3918");
  script_version ("$Revision$");
- script_tag(name:"cvss_base", value:"10.0");
- script_tag(name:"risk_factor", value:"Critical");
+ script_tag(name:"cvss_base", value:"5.4");
+ script_tag(name:"risk_factor", value:"High");
  script_name("SLES9: Security update for apache2,apache2-prefork,apache2-worker");
 
  desc = "The remote host is missing updates to packages that affect

Modified: trunk/openvas-plugins/scripts/sles9p5013481.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles9p5013481.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/sles9p5013481.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -30,7 +30,7 @@
  script_id(65554);
  script_cve_id("CVE-2005-3651", "CVE-2005-4585");
  script_version ("$Revision$");
- script_tag(name:"cvss_base", value:"7.8");
+ script_tag(name:"cvss_base", value:"7.5");
  script_tag(name:"risk_factor", value:"High");
  script_name("SLES9: Security update for ethereal");
 

Modified: trunk/openvas-plugins/scripts/sles9p5014050.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles9p5014050.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/sles9p5014050.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -30,7 +30,7 @@
  script_id(65132);
  script_cve_id("CVE-2004-0940", "CVE-2004-0885");
  script_version ("$Revision$");
- script_tag(name:"cvss_base", value:"7.5");
+ script_tag(name:"cvss_base", value:"6.9");
  script_tag(name:"risk_factor", value:"High");
  script_name("SLES9: Security update for apache");
 

Modified: trunk/openvas-plugins/scripts/sles9p5014064.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles9p5014064.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/sles9p5014064.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -30,7 +30,7 @@
  script_id(65131);
  script_cve_id("CVE-2005-2088", "CVE-2005-1268");
  script_version ("$Revision$");
- script_tag(name:"cvss_base", value:"5.0");
+ script_tag(name:"cvss_base", value:"4.3");
  script_tag(name:"risk_factor", value:"Medium");
  script_name("SLES9: Security update for Apache 2 oes/CORE");
 
@@ -57,7 +57,7 @@
 
 Please install the updates provided by SuSE.
 
-Risk factor : High";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/sles9p5014078.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles9p5014078.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/sles9p5014078.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -30,8 +30,8 @@
  script_id(65202);
  script_cve_id("CVE-2006-2941", "CVE-2006-3636", "CVE-2006-2191");
  script_version ("$Revision$");
- script_tag(name:"cvss_base", value:"7.5");
- script_tag(name:"risk_factor", value:"High");
+ script_tag(name:"cvss_base", value:"5.0");
+ script_tag(name:"risk_factor", value:"Medium");
  script_name("SLES9: Security update for mailman");
 
  desc = "The remote host is missing updates to packages that affect
@@ -51,7 +51,7 @@
 
 Please install the updates provided by SuSE.
 
-Risk factor : High";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/sles9p5014847.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles9p5014847.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/sles9p5014847.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -30,8 +30,8 @@
  script_id(65377);
  script_cve_id("CVE-2007-5947", "CVE-2007-5959", "CVE-2007-5960");
  script_version ("$Revision$");
- script_tag(name:"cvss_base", value:"9.3");
- script_tag(name:"risk_factor", value:"Critical");
+ script_tag(name:"cvss_base", value:"4.3");
+ script_tag(name:"risk_factor", value:"Medium");
  script_name("SLES9: Security update for Mozilla");
 
  desc = "The remote host is missing updates to packages that affect
@@ -60,7 +60,7 @@
 
 Please install the updates provided by SuSE.
 
-Risk factor : High";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/sles9p5014967.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles9p5014967.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/sles9p5014967.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -30,8 +30,8 @@
  script_id(65581);
  script_cve_id("CVE-2005-3353", "CVE-2005-3389", "CVE-2005-3390", "CVE-2005-3391", "CVE-2005-3392", "CVE-2005-3883");
  script_version ("$Revision$");
- script_tag(name:"cvss_base", value:"7.5");
- script_tag(name:"risk_factor", value:"High");
+ script_tag(name:"cvss_base", value:"5.0");
+ script_tag(name:"risk_factor", value:"Medium");
  script_name("SLES9: Security update for PHP4");
 
  desc = "The remote host is missing updates to packages that affect
@@ -66,7 +66,7 @@
 
 Please install the updates provided by SuSE.
 
-Risk factor : High";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/sles9p5015546.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles9p5015546.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/sles9p5015546.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -30,7 +30,7 @@
  script_id(65297);
  script_cve_id("CVE-2005-1519", "CVE-1999-0710", "CVE-2005-1345", "CVE-2005-0626", "CVE-2005-0718");
  script_version ("$Revision$");
- script_tag(name:"cvss_base", value:"7.5");
+ script_tag(name:"cvss_base", value:"6.4");
  script_tag(name:"risk_factor", value:"High");
  script_name("SLES9: Security update for squid");
 

Modified: trunk/openvas-plugins/scripts/sles9p5015565.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles9p5015565.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/sles9p5015565.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -30,7 +30,7 @@
  script_id(65396);
  script_cve_id("CVE-2006-2563", "CVE-2006-4020");
  script_version ("$Revision$");
- script_tag(name:"cvss_base", value:"4.6");
+ script_tag(name:"cvss_base", value:"2.1");
  script_tag(name:"risk_factor", value:"Medium");
  script_name("SLES9: Security update for PHP4");
 
@@ -70,7 +70,7 @@
 
 Please install the updates provided by SuSE.
 
-Risk factor : High";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/sles9p5015608.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles9p5015608.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/sles9p5015608.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -30,7 +30,7 @@
  script_id(65144);
  script_cve_id("CVE-2007-2727", "CVE-2007-3472", "CVE-2007-3475", "CVE-2007-3476", "CVE-2007-3477", "CVE-2007-3478", "CVE-2007-3799");
  script_version ("$Revision$");
- script_tag(name:"cvss_base", value:"5.0");
+ script_tag(name:"cvss_base", value:"2.6");
  script_tag(name:"risk_factor", value:"Medium");
  script_name("SLES9: Security update for PHP4");
 
@@ -100,7 +100,7 @@
 
 Please install the updates provided by SuSE.
 
-Risk factor : High";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/sles9p5015662.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles9p5015662.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/sles9p5015662.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -30,7 +30,7 @@
  script_id(65266);
  script_cve_id("CVE-2007-1660", "CVE-2006-7225", "CVE-2006-7224", "CVE-2006-7226", "CVE-2007-1659", "CVE-2006-7230", "CVE-2007-5898", "CVE-2007-4825", "CVE-2007-4782", "CVE-2007-4840", "CVE-2007-4784", "CVE-2007-3998", "CVE-2007-4661", "CVE-2007-2872", "CVE-2007-3996", "CVE-2007-4658");
  script_version ("$Revision$");
- script_tag(name:"cvss_base", value:"7.5");
+ script_tag(name:"cvss_base", value:"6.8");
  script_tag(name:"risk_factor", value:"High");
  script_name("SLES9: Security update for PHP4");
 

Modified: trunk/openvas-plugins/scripts/sles9p5015723.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles9p5015723.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/sles9p5015723.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -30,8 +30,8 @@
  script_id(65407);
  script_cve_id("CVE-2005-3783", "CVE-2005-3784", "CVE-2005-2973", "CVE-2005-3806", "CVE-2005-3055", "CVE-2005-3180", "CVE-2005-3044", "CVE-2005-3275", "CVE-2005-2490", "CVE-2005-3110", "CVE-2005-1041", "CVE-2005-2800", "CVE-2005-2872");
  script_version ("$Revision$");
- script_tag(name:"cvss_base", value:"6.6");
- script_tag(name:"risk_factor", value:"High");
+ script_tag(name:"cvss_base", value:"4.9");
+ script_tag(name:"risk_factor", value:"Medium");
  script_name("SLES9: Security update for Linux kernel");
 
  desc = "The remote host is missing updates to packages that affect
@@ -59,7 +59,7 @@
 
 Please install the updates provided by SuSE.
 
-Risk factor : High";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/sles9p5015871.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles9p5015871.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/sles9p5015871.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -30,8 +30,8 @@
  script_id(65256);
  script_cve_id("CVE-2005-2360", "CVE-2005-2361", "CVE-2005-2362", "CVE-2005-2363", "CVE-2005-2364", "CVE-2005-2365", "CVE-2005-2366", "CVE-2005-2367");
  script_version ("$Revision$");
- script_tag(name:"cvss_base", value:"7.5");
- script_tag(name:"risk_factor", value:"High");
+ script_tag(name:"cvss_base", value:"5.0");
+ script_tag(name:"risk_factor", value:"Medium");
  script_name("SLES9: Security update for ethereal");
 
  desc = "The remote host is missing updates to packages that affect
@@ -51,7 +51,7 @@
 
 Please install the updates provided by SuSE.
 
-Risk factor : High";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/sles9p5015996.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles9p5015996.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/sles9p5015996.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -30,8 +30,8 @@
  script_id(65566);
  script_cve_id("CVE-2004-0835", "CVE-2004-0836", "CVE-2004-0837", "CVE-2004-0956", "CVE-2004-0957", "CVE-2005-0709", "CVE-2005-0710", "CVE-2005-0711");
  script_version ("$Revision$");
- script_tag(name:"cvss_base", value:"10.0");
- script_tag(name:"risk_factor", value:"Critical");
+ script_tag(name:"cvss_base", value:"7.5");
+ script_tag(name:"risk_factor", value:"High");
  script_name("SLES9: Security update for MySQL");
 
  desc = "The remote host is missing updates to packages that affect

Modified: trunk/openvas-plugins/scripts/sles9p5016282.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles9p5016282.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/sles9p5016282.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -30,8 +30,8 @@
  script_id(65104);
  script_cve_id("CVE-2007-0897", "CVE-2007-0898");
  script_version ("$Revision$");
- script_tag(name:"cvss_base", value:"6.4");
- script_tag(name:"risk_factor", value:"High");
+ script_tag(name:"cvss_base", value:"4.3");
+ script_tag(name:"risk_factor", value:"Medium");
  script_name("SLES9: Security update for clamav");
 
  desc = "The remote host is missing updates to packages that affect
@@ -51,7 +51,7 @@
 
 Please install the updates provided by SuSE.
 
-Risk factor : High";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/sles9p5016317.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles9p5016317.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/sles9p5016317.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -30,8 +30,8 @@
  script_id(65037);
  script_cve_id("CVE-2007-2871", "CVE-2007-2870", "CVE-2007-1558", "CVE-2007-1362", "CVE-2007-2869", "CVE-2007-2867", "CVE-2007-2868", "CVE-2007-1562");
  script_version ("$Revision$");
- script_tag(name:"cvss_base", value:"9.3");
- script_tag(name:"risk_factor", value:"Critical");
+ script_tag(name:"cvss_base", value:"4.3");
+ script_tag(name:"risk_factor", value:"Medium");
  script_name("SLES9: Security update for Mozilla suite");
 
  desc = "The remote host is missing updates to packages that affect
@@ -60,7 +60,7 @@
 
 Please install the updates provided by SuSE.
 
-Risk factor : High";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/sles9p5016546.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles9p5016546.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/sles9p5016546.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -30,8 +30,8 @@
  script_id(65531);
  script_cve_id("CVE-2004-0718", "CVE-2004-0722", "CVE-2004-0757", "CVE-2004-0758", "CVE-2004-0759", "CVE-2004-0760", "CVE-2004-0761", "CVE-2004-0762", "CVE-2004-0763", "CVE-2004-0764", "CVE-2004-0765");
  script_version ("$Revision$");
- script_tag(name:"cvss_base", value:"10.0");
- script_tag(name:"risk_factor", value:"Critical");
+ script_tag(name:"cvss_base", value:"7.5");
+ script_tag(name:"risk_factor", value:"High");
  script_name("SLES9: Security update for Mozilla");
 
  desc = "The remote host is missing updates to packages that affect

Modified: trunk/openvas-plugins/scripts/sles9p5016608.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles9p5016608.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/sles9p5016608.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -30,8 +30,8 @@
  script_id(65346);
  script_cve_id("CVE-2007-4352", "CVE-2007-5392", "CVE-2007-5393");
  script_version ("$Revision$");
- script_tag(name:"cvss_base", value:"9.3");
- script_tag(name:"risk_factor", value:"Critical");
+ script_tag(name:"cvss_base", value:"7.6");
+ script_tag(name:"risk_factor", value:"High");
  script_name("SLES9: Security update for Cups");
 
  desc = "The remote host is missing updates to packages that affect

Modified: trunk/openvas-plugins/scripts/sles9p5016846.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles9p5016846.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/sles9p5016846.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -30,8 +30,8 @@
  script_id(65257);
  script_cve_id("CVE-2004-1139", "CVE-2004-1140", "CVE-2004-1141", "CVE-2004-1142", "CVE-2005-0006", "CVE-2005-0007", "CVE-2005-0008", "CVE-2005-0009", "CVE-2005-0010", "CVE-2005-0084", "CVE-2005-0699", "CVE-2005-0739");
  script_version ("$Revision$");
- script_tag(name:"cvss_base", value:"7.5");
- script_tag(name:"risk_factor", value:"High");
+ script_tag(name:"cvss_base", value:"5.0");
+ script_tag(name:"risk_factor", value:"Medium");
  script_name("SLES9: Security update for ethereal");
 
  desc = "The remote host is missing updates to packages that affect
@@ -51,7 +51,7 @@
 
 Please install the updates provided by SuSE.
 
-Risk factor : High";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/sles9p5017209.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles9p5017209.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/sles9p5017209.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -30,7 +30,7 @@
  script_id(65028);
  script_cve_id("CVE-2006-3548", "CVE-2006-3549");
  script_version ("$Revision$");
- script_tag(name:"cvss_base", value:"5.0");
+ script_tag(name:"cvss_base", value:"4.3");
  script_tag(name:"risk_factor", value:"Medium");
  script_name("SLES9: Security update for horde");
 
@@ -51,7 +51,7 @@
 
 Please install the updates provided by SuSE.
 
-Risk factor : High";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/sles9p5017544.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles9p5017544.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/sles9p5017544.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -30,8 +30,8 @@
  script_id(65204);
  script_cve_id("CVE-2006-6169", "CVE-2006-6235");
  script_version ("$Revision$");
- script_tag(name:"cvss_base", value:"10.0");
- script_tag(name:"risk_factor", value:"Critical");
+ script_tag(name:"cvss_base", value:"6.8");
+ script_tag(name:"risk_factor", value:"High");
  script_name("SLES9: Security update for gpg");
 
  desc = "The remote host is missing updates to packages that affect

Modified: trunk/openvas-plugins/scripts/sles9p5017742.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles9p5017742.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/sles9p5017742.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -30,8 +30,8 @@
  script_id(65096);
  script_cve_id("CVE-2004-0803", "CVE-2004-0804", "CVE-2004-0886", "CVE-2004-0929");
  script_version ("$Revision$");
- script_tag(name:"cvss_base", value:"10.0");
- script_tag(name:"risk_factor", value:"Critical");
+ script_tag(name:"cvss_base", value:"7.5");
+ script_tag(name:"risk_factor", value:"High");
  script_name("SLES9: Security update for libtiff");
 
  desc = "The remote host is missing updates to packages that affect

Modified: trunk/openvas-plugins/scripts/sles9p5018289.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles9p5018289.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/sles9p5018289.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -30,7 +30,7 @@
  script_id(65459);
  script_cve_id("CVE-2005-3186", "CVE-2005-2975", "CVE-2005-2976");
  script_version ("$Revision$");
- script_tag(name:"cvss_base", value:"7.8");
+ script_tag(name:"cvss_base", value:"7.5");
  script_tag(name:"risk_factor", value:"High");
  script_name("SLES9: Security update for gdk-pixbuf");
 

Modified: trunk/openvas-plugins/scripts/sles9p5018527.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles9p5018527.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/sles9p5018527.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -30,8 +30,8 @@
  script_id(65522);
  script_cve_id("CVE-2007-3844", "CVE-2007-5339", "CVE-2007-5340", "CVE-2007-1095", "CVE-2007-2292", "CVE-2007-3511", "CVE-2006-2894", "CVE-2007-5334", "CVE-2007-5337", "CVE-2007-5338", "CVE-2007-3845", "CVE-2006-4965", "CVE-2007-4841");
  script_version ("$Revision$");
- script_tag(name:"cvss_base", value:"9.3");
- script_tag(name:"risk_factor", value:"Critical");
+ script_tag(name:"cvss_base", value:"4.3");
+ script_tag(name:"risk_factor", value:"Medium");
  script_name("SLES9: Security update for Mozilla");
 
  desc = "The remote host is missing updates to packages that affect
@@ -60,7 +60,7 @@
 
 Please install the updates provided by SuSE.
 
-Risk factor : High";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/sles9p5018586.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles9p5018586.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/sles9p5018586.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -30,8 +30,8 @@
  script_id(65603);
  script_cve_id("CVE-2006-2937", "CVE-2006-2940", "CVE-2006-3738", "CVE-2006-4343");
  script_version ("$Revision$");
- script_tag(name:"cvss_base", value:"10.0");
- script_tag(name:"risk_factor", value:"Critical");
+ script_tag(name:"cvss_base", value:"7.8");
+ script_tag(name:"risk_factor", value:"High");
  script_name("SLES9: Security update for OpenSSL");
 
  desc = "The remote host is missing updates to packages that affect

Modified: trunk/openvas-plugins/scripts/sles9p5018750.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles9p5018750.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/sles9p5018750.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -30,7 +30,7 @@
  script_id(65268);
  script_cve_id("CVE-2007-3472", "CVE-2007-3475", "CVE-2007-3476", "CVE-2007-3477", "CVE-2007-3478");
  script_version ("$Revision$");
- script_tag(name:"cvss_base", value:"5.0");
+ script_tag(name:"cvss_base", value:"4.3");
  script_tag(name:"risk_factor", value:"Medium");
  script_name("SLES9: Security update for gd");
 
@@ -52,7 +52,7 @@
 
 Please install the updates provided by SuSE.
 
-Risk factor : High";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/sles9p5018824.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles9p5018824.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/sles9p5018824.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -30,8 +30,8 @@
  script_id(65161);
  script_cve_id("CVE-2006-0582", "CVE-2006-0677");
  script_version ("$Revision$");
- script_tag(name:"cvss_base", value:"7.8");
- script_tag(name:"risk_factor", value:"High");
+ script_tag(name:"cvss_base", value:"2.1");
+ script_tag(name:"risk_factor", value:"Medium");
  script_name("SLES9: Security update for heimdal");
 
  desc = "The remote host is missing updates to packages that affect
@@ -53,7 +53,7 @@
 
 Please install the updates provided by SuSE.
 
-Risk factor : High";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/sles9p5019053.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles9p5019053.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/sles9p5019053.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -30,8 +30,8 @@
  script_id(65411);
  script_cve_id("CVE-2004-1068", "CVE-2004-1016", "CVE-2004-1137", "CVE-2004-1151");
  script_version ("$Revision$");
- script_tag(name:"cvss_base", value:"10.0");
- script_tag(name:"risk_factor", value:"Critical");
+ script_tag(name:"cvss_base", value:"6.2");
+ script_tag(name:"risk_factor", value:"High");
  script_name("SLES9: Security update for Linux kernel");
 
  desc = "The remote host is missing updates to packages that affect

Modified: trunk/openvas-plugins/scripts/sles9p5019327.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles9p5019327.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/sles9p5019327.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -30,7 +30,7 @@
  script_id(65406);
  script_cve_id("CVE-2007-1745", "CVE-2007-1997");
  script_version ("$Revision$");
- script_tag(name:"cvss_base", value:"7.5");
+ script_tag(name:"cvss_base", value:"7.1");
  script_tag(name:"risk_factor", value:"High");
  script_name("SLES9: Security update for clamav");
 

Modified: trunk/openvas-plugins/scripts/sles9p5019431.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles9p5019431.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/sles9p5019431.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -30,8 +30,8 @@
  script_id(65379);
  script_cve_id("CVE-2004-0504", "CVE-2004-0505", "CVE-2004-0506", "CVE-2004-0507");
  script_version ("$Revision$");
- script_tag(name:"cvss_base", value:"10.0");
- script_tag(name:"risk_factor", value:"Critical");
+ script_tag(name:"cvss_base", value:"5.0");
+ script_tag(name:"risk_factor", value:"Medium");
  script_name("SLES9: Security update for ethereal");
 
  desc = "The remote host is missing updates to packages that affect
@@ -51,7 +51,7 @@
 
 Please install the updates provided by SuSE.
 
-Risk factor : High";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/sles9p5019505.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles9p5019505.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/sles9p5019505.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -30,8 +30,8 @@
  script_id(65248);
  script_cve_id("CVE-2006-4924", "CVE-2006-4925", "CVE-2006-5051", "CVE-2006-5052");
  script_version ("$Revision$");
- script_tag(name:"cvss_base", value:"9.3");
- script_tag(name:"risk_factor", value:"Critical");
+ script_tag(name:"cvss_base", value:"7.8");
+ script_tag(name:"risk_factor", value:"High");
  script_name("SLES9: Security update for OpenSSH");
 
  desc = "The remote host is missing updates to packages that affect

Modified: trunk/openvas-plugins/scripts/sles9p5019559.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles9p5019559.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/sles9p5019559.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -30,8 +30,8 @@
  script_id(65608);
  script_cve_id("CVE-2006-1727", "CVE-2006-1728", "CVE-2006-1729", "CVE-2006-1730", "CVE-2006-1731", "CVE-2006-0749", "CVE-2006-1732", "CVE-2006-1733", "CVE-2006-1734", "CVE-2006-1735", "CVE-2006-1736", "CVE-2006-1740", "CVE-2006-1739", "CVE-2006-1737", "CVE-2006-1738", "CVE-2006-1790", "CVE-2006-1742", "CVE-2006-1741");
  script_version ("$Revision$");
- script_tag(name:"cvss_base", value:"10.0");
- script_tag(name:"risk_factor", value:"Critical");
+ script_tag(name:"cvss_base", value:"7.6");
+ script_tag(name:"risk_factor", value:"High");
  script_name("SLES9: Security update for Mozilla suite");
 
  desc = "The remote host is missing updates to packages that affect

Modified: trunk/openvas-plugins/scripts/sles9p5019905.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles9p5019905.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/sles9p5019905.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -30,7 +30,7 @@
  script_id(65130);
  script_cve_id("CVE-2006-3745", "CVE-2006-4093", "CVE-2006-3468");
  script_version ("$Revision$");
- script_tag(name:"cvss_base", value:"7.8");
+ script_tag(name:"cvss_base", value:"7.2");
  script_tag(name:"risk_factor", value:"High");
  script_name("SLES9: Security update for Linux kernel");
 

Modified: trunk/openvas-plugins/scripts/sles9p5019909.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles9p5019909.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/sles9p5019909.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -30,7 +30,7 @@
  script_id(65609);
  script_cve_id("CVE-2005-0013", "CVE-2005-0014");
  script_version ("$Revision$");
- script_tag(name:"cvss_base", value:"7.5");
+ script_tag(name:"cvss_base", value:"7.2");
  script_tag(name:"risk_factor", value:"High");
  script_name("SLES9: Security update for ncpfs");
 

Modified: trunk/openvas-plugins/scripts/sles9p5019924.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles9p5019924.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/sles9p5019924.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -30,8 +30,8 @@
  script_id(65110);
  script_cve_id("CVE-2005-3570");
  script_version ("$Revision$");
- script_tag(name:"cvss_base", value:"9.3");
- script_tag(name:"risk_factor", value:"Critical");
+ script_tag(name:"cvss_base", value:"4.3");
+ script_tag(name:"risk_factor", value:"Medium");
  script_name("SLES9: Security update for horde");
 
  desc = "The remote host is missing updates to packages that affect
@@ -51,7 +51,7 @@
 
 Please install the updates provided by SuSE.
 
-Risk factor : High";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/sles9p5020045.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles9p5020045.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/sles9p5020045.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -30,7 +30,7 @@
  script_id(65521);
  script_cve_id("CVE-2006-3459", "CVE-2006-3460", "CVE-2006-3461", "CVE-2006-3462", "CVE-2006-3463", "CVE-2006-3464", "CVE-2006-3465");
  script_version ("$Revision$");
- script_tag(name:"cvss_base", value:"7.8");
+ script_tag(name:"cvss_base", value:"7.5");
  script_tag(name:"risk_factor", value:"High");
  script_name("SLES9: Security update for libtiff");
 

Modified: trunk/openvas-plugins/scripts/sles9p5020427.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles9p5020427.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/sles9p5020427.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -30,8 +30,8 @@
  script_id(65091);
  script_cve_id("CVE-2007-5232", "CVE-2007-5236", "CVE-2007-5237", "CVE-2007-5238", "CVE-2007-5239", "CVE-2007-5240", "CVE-2007-5273", "CVE-2007-5274");
  script_version ("$Revision$");
- script_tag(name:"cvss_base", value:"7.1");
- script_tag(name:"risk_factor", value:"High");
+ script_tag(name:"cvss_base", value:"4.0");
+ script_tag(name:"risk_factor", value:"Medium");
  script_name("SLES9: Security update for Sun Java 2");
 
  desc = "The remote host is missing updates to packages that affect
@@ -52,7 +52,7 @@
 
 Please install the updates provided by SuSE.
 
-Risk factor : High";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/sles9p5020521.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles9p5020521.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/sles9p5020521.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -30,8 +30,8 @@
  script_id(65035);
  script_cve_id("CVE-2006-3626", "CVE-2006-2935", "CVE-2006-2934", "CVE-2006-2451", "CVE-2006-3085", "CVE-2006-2448", "CVE-2006-2444", "CVE-2006-1858", "CVE-2006-1857", "CVE-2006-1528", "CVE-2006-0744");
  script_version ("$Revision$");
- script_tag(name:"cvss_base", value:"9.0");
- script_tag(name:"risk_factor", value:"Critical");
+ script_tag(name:"cvss_base", value:"6.2");
+ script_tag(name:"risk_factor", value:"High");
  script_name("SLES9: Security update for Linux kernel");
 
  desc = "The remote host is missing updates to packages that affect

Modified: trunk/openvas-plugins/scripts/sles9p5020541.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles9p5020541.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/sles9p5020541.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -30,7 +30,7 @@
  script_id(65059);
  script_cve_id("CVE-2007-2876", "CVE-2007-3105", "CVE-2007-2525", "CVE-2007-3848", "CVE-2007-4573", "CVE-2007-4571");
  script_version ("$Revision$");
- script_tag(name:"cvss_base", value:"7.2");
+ script_tag(name:"cvss_base", value:"6.1");
  script_tag(name:"risk_factor", value:"High");
  script_name("SLES9: Security update for Linux kernel");
 

Modified: trunk/openvas-plugins/scripts/sles9p5020714.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles9p5020714.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/sles9p5020714.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -30,8 +30,8 @@
  script_id(65483);
  script_cve_id("CVE-2005-0064", "CVE-2004-1125", "CVE-2004-1268", "CVE-2004-1267");
  script_version ("$Revision$");
- script_tag(name:"cvss_base", value:"9.3");
- script_tag(name:"risk_factor", value:"Critical");
+ script_tag(name:"cvss_base", value:"7.5");
+ script_tag(name:"risk_factor", value:"High");
  script_name("SLES9: Security update for Cups");
 
  desc = "The remote host is missing updates to packages that affect

Modified: trunk/openvas-plugins/scripts/sles9p5020865.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles9p5020865.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/sles9p5020865.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -30,8 +30,8 @@
  script_id(65507);
  script_cve_id("CVE-2004-0835", "CVE-2004-0836", "CVE-2004-0837", "CVE-2004-0956", "CVE-2004-0957");
  script_version ("$Revision$");
- script_tag(name:"cvss_base", value:"10.0");
- script_tag(name:"risk_factor", value:"Critical");
+ script_tag(name:"cvss_base", value:"7.5");
+ script_tag(name:"risk_factor", value:"High");
  script_name("SLES9: Security update for MySQL");
 
  desc = "The remote host is missing updates to packages that affect

Modified: trunk/openvas-plugins/scripts/sles9p5020876.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles9p5020876.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/sles9p5020876.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -30,8 +30,8 @@
  script_id(65088);
  script_cve_id("CVE-2006-6101", "CVE-2006-6102", "CVE-2006-6103");
  script_version ("$Revision$");
- script_tag(name:"cvss_base", value:"10.0");
- script_tag(name:"risk_factor", value:"Critical");
+ script_tag(name:"cvss_base", value:"6.6");
+ script_tag(name:"risk_factor", value:"High");
  script_name("SLES9: Security update for XFree86-server");
 
  desc = "The remote host is missing updates to packages that affect

Modified: trunk/openvas-plugins/scripts/sles9p5020914.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles9p5020914.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/sles9p5020914.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -30,8 +30,8 @@
  script_id(65392);
  script_cve_id("CVE-2007-5958", "CVE-2007-6427", "CVE-2007-6428", "CVE-2007-6429", "CVE-2007-5760");
  script_version ("$Revision$");
- script_tag(name:"cvss_base", value:"9.3");
- script_tag(name:"risk_factor", value:"Critical");
+ script_tag(name:"cvss_base", value:"5.0");
+ script_tag(name:"risk_factor", value:"Medium");
  script_name("SLES9: Security update for XFree86-libs");
 
  desc = "The remote host is missing updates to packages that affect
@@ -52,7 +52,7 @@
 
 Please install the updates provided by SuSE.
 
-Risk factor : High";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/sles9p5021116.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles9p5021116.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/sles9p5021116.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -30,7 +30,7 @@
  script_id(65046);
  script_cve_id("CVE-2007-1003", "CVE-2007-1667", "CVE-2007-1352", "CVE-2007-1351");
  script_version ("$Revision$");
- script_tag(name:"cvss_base", value:"9.3");
+ script_tag(name:"cvss_base", value:"9.0");
  script_tag(name:"risk_factor", value:"Critical");
  script_name("SLES9: Security update for some XFree86 modules");
 
@@ -56,7 +56,7 @@
 
 Please install the updates provided by SuSE.
 
-Risk factor : High";
+Risk factor : Critical";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/sles9p5021388.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles9p5021388.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/sles9p5021388.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -30,8 +30,8 @@
  script_id(65293);
  script_cve_id("CVE-2007-6351", "CVE-2007-6352");
  script_version ("$Revision$");
- script_tag(name:"cvss_base", value:"6.8");
- script_tag(name:"risk_factor", value:"High");
+ script_tag(name:"cvss_base", value:"4.3");
+ script_tag(name:"risk_factor", value:"Medium");
  script_name("SLES9: Security update for libexif");
 
  desc = "The remote host is missing updates to packages that affect
@@ -51,7 +51,7 @@
 
 Please install the updates provided by SuSE.
 
-Risk factor : High";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/sles9p5021652.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles9p5021652.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/sles9p5021652.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -30,8 +30,8 @@
  script_id(65363);
  script_cve_id("CVE-2005-2491", "CVE-2005-2728", "CVE-2005-2700");
  script_version ("$Revision$");
- script_tag(name:"cvss_base", value:"10.0");
- script_tag(name:"risk_factor", value:"Critical");
+ script_tag(name:"cvss_base", value:"7.5");
+ script_tag(name:"risk_factor", value:"High");
  script_name("SLES9: Security update for Apache2");
 
  desc = "The remote host is missing updates to packages that affect

Modified: trunk/openvas-plugins/scripts/sles9p5021746.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles9p5021746.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/sles9p5021746.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -30,8 +30,8 @@
  script_id(65124);
  script_cve_id("CVE-2005-3241", "CVE-2005-3242", "CVE-2005-3243", "CVE-2005-3244", "CVE-2005-3245", "CVE-2005-3246", "CVE-2005-3247", "CVE-2005-3248", "CVE-2005-3249", "CVE-2005-3184", "CVE-2005-3313");
  script_version ("$Revision$");
- script_tag(name:"cvss_base", value:"10.0");
- script_tag(name:"risk_factor", value:"Critical");
+ script_tag(name:"cvss_base", value:"5.0");
+ script_tag(name:"risk_factor", value:"Medium");
  script_name("SLES9: Security update for ethereal");
 
  desc = "The remote host is missing updates to packages that affect
@@ -51,7 +51,7 @@
 
 Please install the updates provided by SuSE.
 
-Risk factor : High";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/sles9p5021793.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles9p5021793.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/sles9p5021793.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -30,8 +30,8 @@
  script_id(65440);
  script_cve_id("CVE-2007-1860", "CVE-2007-3382", "CVE-2007-3385", "CVE-2007-5641", "CVE-2005-2090", "CVE-2008-0128");
  script_version ("$Revision$");
- script_tag(name:"cvss_base", value:"6.8");
- script_tag(name:"risk_factor", value:"High");
+ script_tag(name:"cvss_base", value:"5.0");
+ script_tag(name:"risk_factor", value:"Medium");
  script_name("SLES9: Security update for Tomcat");
 
  desc = "The remote host is missing updates to packages that affect
@@ -55,7 +55,7 @@
 
 Please install the updates provided by SuSE.
 
-Risk factor : High";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/sles9p5021809.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles9p5021809.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/sles9p5021809.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -30,7 +30,7 @@
  script_id(65378);
  script_cve_id("CVE-2007-6600", "CVE-2007-4772", "CVE-2007-6067", "CVE-2007-4769", "CVE-2007-6601");
  script_version ("$Revision$");
- script_tag(name:"cvss_base", value:"7.2");
+ script_tag(name:"cvss_base", value:"6.5");
  script_tag(name:"risk_factor", value:"High");
  script_name("SLES9: Security update for postgresql");
 

Modified: trunk/openvas-plugins/scripts/sles9p5021818.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles9p5021818.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/sles9p5021818.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -30,8 +30,8 @@
  script_id(65313);
  script_cve_id("CVE-2007-5232", "CVE-2007-5274", "CVE-2007-5273", "CVE-2007-5236", "CVE-2007-5238", "CVE-2007-5239", "CVE-2007-5240", "CVE-2007-4381", "CVE-2007-3698");
  script_version ("$Revision$");
- script_tag(name:"cvss_base", value:"9.3");
- script_tag(name:"risk_factor", value:"Critical");
+ script_tag(name:"cvss_base", value:"4.0");
+ script_tag(name:"risk_factor", value:"Medium");
  script_name("SLES9: Security update for IBMJava5-JRE,IBMJava5-SDK");
 
  desc = "The remote host is missing updates to packages that affect
@@ -52,7 +52,7 @@
 
 Please install the updates provided by SuSE.
 
-Risk factor : High";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/sles9p5021882.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles9p5021882.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/sles9p5021882.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -30,8 +30,8 @@
  script_id(65426);
  script_cve_id("CVE-2007-2583", "CVE-2007-2691", "CVE-2007-2692", "CVE-2007-5925", "CVE-2007-5969", "CVE-2007-6303", "CVE-2007-6304");
  script_version ("$Revision$");
- script_tag(name:"cvss_base", value:"6.0");
- script_tag(name:"risk_factor", value:"High");
+ script_tag(name:"cvss_base", value:"4.0");
+ script_tag(name:"risk_factor", value:"Medium");
  script_name("SLES9: Security update for MySQL");
 
  desc = "The remote host is missing updates to packages that affect
@@ -55,7 +55,7 @@
 
 Please install the updates provided by SuSE.
 
-Risk factor : High";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/sles9p5021982.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles9p5021982.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/sles9p5021982.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -30,8 +30,8 @@
  script_id(65196);
  script_cve_id("CVE-2008-0594", "CVE-2008-0593", "CVE-2008-0592", "CVE-2008-0591", "CVE-2008-0419", "CVE-2008-0418", "CVE-2008-0417", "CVE-2008-0415", "CVE-2008-0414", "CVE-2008-0412", "CVE-2008-0413");
  script_version ("$Revision$");
- script_tag(name:"cvss_base", value:"9.3");
- script_tag(name:"risk_factor", value:"Critical");
+ script_tag(name:"cvss_base", value:"5.0");
+ script_tag(name:"risk_factor", value:"Medium");
  script_name("SLES9: Security update for Mozilla");
 
  desc = "The remote host is missing updates to packages that affect
@@ -60,7 +60,7 @@
 
 Please install the updates provided by SuSE.
 
-Risk factor : High";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/sles9p5022953.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles9p5022953.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/sles9p5022953.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -30,8 +30,8 @@
  script_id(65153);
  script_cve_id("CVE-2008-1241", "CVE-2008-1195", "CVE-2008-1240", "CVE-2007-4879", "CVE-2008-1238", "CVE-2008-1236", "CVE-2008-1237", "CVE-2008-1233", "CVE-2008-1234", "CVE-2008-1235");
  script_version ("$Revision$");
- script_tag(name:"cvss_base", value:"9.3");
- script_tag(name:"risk_factor", value:"Critical");
+ script_tag(name:"cvss_base", value:"4.3");
+ script_tag(name:"risk_factor", value:"Medium");
  script_name("SLES9: Security update for Mozilla");
 
  desc = "The remote host is missing updates to packages that affect
@@ -60,7 +60,7 @@
 
 Please install the updates provided by SuSE.
 
-Risk factor : High";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/sles9p5023036.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles9p5023036.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/sles9p5023036.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -30,8 +30,8 @@
  script_id(65018);
  script_cve_id("CVE-2008-1373", "CVE-2008-0053");
  script_version ("$Revision$");
- script_tag(name:"cvss_base", value:"10.0");
- script_tag(name:"risk_factor", value:"Critical");
+ script_tag(name:"cvss_base", value:"5.8");
+ script_tag(name:"risk_factor", value:"High");
  script_name("SLES9: Security update for CUPS");
 
  desc = "The remote host is missing updates to packages that affect

Modified: trunk/openvas-plugins/scripts/sles9p5023078.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles9p5023078.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/sles9p5023078.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -30,8 +30,8 @@
  script_id(65368);
  script_cve_id("CVE-2008-1158", "CVE-2008-1186", "CVE-2008-1185", "CVE-2008-1187", "CVE-2008-1189", "CVE-2008-1188", "CVE-2008-1190", "CVE-2008-1191", "CVE-2008-1192", "CVE-2008-1195", "CVE-2008-1196");
  script_version ("$Revision$");
- script_tag(name:"cvss_base", value:"9.3");
- script_tag(name:"risk_factor", value:"Critical");
+ script_tag(name:"cvss_base", value:"7.8");
+ script_tag(name:"risk_factor", value:"High");
  script_name("SLES9: Security update for Java2");
 
  desc = "The remote host is missing updates to packages that affect

Modified: trunk/openvas-plugins/scripts/sles9p5023300.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles9p5023300.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/sles9p5023300.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -30,8 +30,8 @@
  script_id(65041);
  script_cve_id("CVE-2008-1837", "CVE-2008-1836", "CVE-2008-1835", "CVE-2008-1833", "CVE-2008-1387", "CVE-2008-1100", "CVE-2008-0314", "CVE-2007-6595", "CVE-2007-6596");
  script_version ("$Revision$");
- script_tag(name:"cvss_base", value:"10.0");
- script_tag(name:"risk_factor", value:"Critical");
+ script_tag(name:"cvss_base", value:"5.0");
+ script_tag(name:"risk_factor", value:"Medium");
  script_name("SLES9: Security update for clamav");
 
  desc = "The remote host is missing updates to packages that affect
@@ -51,7 +51,7 @@
 
 Please install the updates provided by SuSE.
 
-Risk factor : High";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/sles9p5023460.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles9p5023460.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/sles9p5023460.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -30,8 +30,8 @@
  script_id(65295);
  script_cve_id("CVE-2008-1196", "CVE-2008-1195", "CVE-2008-1192", "CVE-2008-1190", "CVE-2008-1189", "CVE-2008-1187", "CVE-2007-5232", "CVE-2007-5274", "CVE-2007-5273", "CVE-2007-5236", "CVE-2007-5238", "CVE-2007-5239", "CVE-2007-5240", "CVE-2007-4381", "CVE-2007-3698");
  script_version ("$Revision$");
- script_tag(name:"cvss_base", value:"9.3");
- script_tag(name:"risk_factor", value:"Critical");
+ script_tag(name:"cvss_base", value:"6.8");
+ script_tag(name:"risk_factor", value:"High");
  script_name("SLES9: Security update for IBM Java 5 and JRE");
 
  desc = "The remote host is missing updates to packages that affect

Modified: trunk/openvas-plugins/scripts/sles9p5023603.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles9p5023603.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/sles9p5023603.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -30,8 +30,8 @@
  script_id(65053);
  script_cve_id("CVE-2008-1196", "CVE-2008-1195", "CVE-2008-1192", "CVE-2008-1190", "CVE-2008-1189", "CVE-2008-1187", "CVE-2007-5232", "CVE-2007-5274", "CVE-2007-5273", "CVE-2007-5236", "CVE-2007-5238", "CVE-2007-5239", "CVE-2007-5240", "CVE-2007-4381", "CVE-2007-3698");
  script_version ("$Revision$");
- script_tag(name:"cvss_base", value:"9.3");
- script_tag(name:"risk_factor", value:"Critical");
+ script_tag(name:"cvss_base", value:"6.8");
+ script_tag(name:"risk_factor", value:"High");
  script_name("SLES9: Security update for IBM Java 2 JRE and SDK");
 
  desc = "The remote host is missing updates to packages that affect

Modified: trunk/openvas-plugins/scripts/sles9p5026120.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles9p5026120.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/sles9p5026120.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -30,8 +30,8 @@
  script_id(65280);
  script_cve_id("CVE-2008-1419", "CVE-2008-1420", "CVE-2008-1423");
  script_version ("$Revision$");
- script_tag(name:"cvss_base", value:"9.3");
- script_tag(name:"risk_factor", value:"Critical");
+ script_tag(name:"cvss_base", value:"4.3");
+ script_tag(name:"risk_factor", value:"Medium");
  script_name("SLES9: Security update for libvorbis");
 
  desc = "The remote host is missing updates to packages that affect
@@ -52,7 +52,7 @@
 
 Please install the updates provided by SuSE.
 
-Risk factor : High";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/sles9p5027942.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles9p5027942.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/sles9p5027942.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -30,7 +30,7 @@
  script_id(65321);
  script_cve_id("CVE-2008-2360", "CVE-2008-2361", "CVE-2008-2362", "CVE-2008-1379", "CVE-2008-1377");
  script_version ("$Revision$");
- script_tag(name:"cvss_base", value:"10.0");
+ script_tag(name:"cvss_base", value:"9.0");
  script_tag(name:"risk_factor", value:"Critical");
  script_name("SLES9: Security update for XFree86");
 
@@ -55,7 +55,7 @@
 
 Please install the updates provided by SuSE.
 
-Risk factor : High";
+Risk factor : Critical";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/sles9p5028577.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles9p5028577.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/sles9p5028577.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -30,8 +30,8 @@
  script_id(65330);
  script_cve_id("CVE-2008-1615", "CVE-2008-1375", "CVE-2007-6282", "CVE-2008-1367");
  script_version ("$Revision$");
- script_tag(name:"cvss_base", value:"7.5");
- script_tag(name:"risk_factor", value:"High");
+ script_tag(name:"cvss_base", value:"4.9");
+ script_tag(name:"risk_factor", value:"Medium");
  script_name("SLES9: Security update for Linux kernel");
 
  desc = "The remote host is missing updates to packages that affect
@@ -61,7 +61,7 @@
 
 Please install the updates provided by SuSE.
 
-Risk factor : High";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/sles9p5031860.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles9p5031860.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/sles9p5031860.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -30,8 +30,8 @@
  script_id(65573);
  script_cve_id("CVE-2008-2292", "CVE-2008-0960");
  script_version ("$Revision$");
- script_tag(name:"cvss_base", value:"10.0");
- script_tag(name:"risk_factor", value:"Critical");
+ script_tag(name:"cvss_base", value:"6.8");
+ script_tag(name:"risk_factor", value:"High");
  script_name("SLES9: Security update for net-snmp");
 
  desc = "The remote host is missing updates to packages that affect

Modified: trunk/openvas-plugins/scripts/sles9p5032900.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles9p5032900.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/sles9p5032900.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -30,8 +30,8 @@
  script_id(65027);
  script_cve_id("CVE-2008-1679", "CVE-2008-1887", "CVE-2008-3143", "CVE-2008-3142", "CVE-2008-3144", "CVE-2008-2315", "CVE-2008-2316");
  script_version ("$Revision$");
- script_tag(name:"cvss_base", value:"9.3");
- script_tag(name:"risk_factor", value:"Critical");
+ script_tag(name:"cvss_base", value:"6.8");
+ script_tag(name:"risk_factor", value:"High");
  script_name("SLES9: Security update for Python");
 
  desc = "The remote host is missing updates to packages that affect

Modified: trunk/openvas-plugins/scripts/sles9p5033480.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles9p5033480.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/sles9p5033480.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -30,8 +30,8 @@
  script_id(65417);
  script_cve_id("CVE-2008-1145", "CVE-2008-1891", "CVE-2008-2662", "CVE-2008-2663", "CVE-2008-2664", "CVE-2008-2725", "CVE-2008-2726", "CVE-2008-2727", "CVE-2008-2728");
  script_version ("$Revision$");
- script_tag(name:"cvss_base", value:"10.0");
- script_tag(name:"risk_factor", value:"Critical");
+ script_tag(name:"cvss_base", value:"5.0");
+ script_tag(name:"risk_factor", value:"Medium");
  script_name("SLES9: Security update for Ruby");
 
  desc = "The remote host is missing updates to packages that affect
@@ -51,7 +51,7 @@
 
 Please install the updates provided by SuSE.
 
-Risk factor : High";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/sles9p5033740.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles9p5033740.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/sles9p5033740.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -30,8 +30,8 @@
  script_id(65286);
  script_cve_id("CVE-2008-3114", "CVE-2008-3113", "CVE-2008-3112", "CVE-2008-3111", "CVE-2008-3108", "CVE-2008-3107", "CVE-2008-3104");
  script_version ("$Revision$");
- script_tag(name:"cvss_base", value:"10.0");
- script_tag(name:"risk_factor", value:"Critical");
+ script_tag(name:"cvss_base", value:"5.0");
+ script_tag(name:"risk_factor", value:"Medium");
  script_name("SLES9: Security update for Java2");
 
  desc = "The remote host is missing updates to packages that affect
@@ -52,7 +52,7 @@
 
 Please install the updates provided by SuSE.
 
-Risk factor : High";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/sles9p5033780.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles9p5033780.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/sles9p5033780.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -30,8 +30,8 @@
  script_id(65262);
  script_cve_id("CVE-2008-3137", "CVE-2008-3138", "CVE-2008-3139", "CVE-2008-3140", "CVE-2008-3141", "CVE-2008-3145", "CVE-2008-3146");
  script_version ("$Revision$");
- script_tag(name:"cvss_base", value:"10.0");
- script_tag(name:"risk_factor", value:"Critical");
+ script_tag(name:"cvss_base", value:"4.3");
+ script_tag(name:"risk_factor", value:"Medium");
  script_name("SLES9: Security update for ethereal");
 
  desc = "The remote host is missing updates to packages that affect
@@ -51,7 +51,7 @@
 
 Please install the updates provided by SuSE.
 
-Risk factor : High";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/sles9p5034680.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles9p5034680.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/sles9p5034680.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -30,8 +30,8 @@
  script_id(65275);
  script_cve_id("CVE-2008-3104", "CVE-2008-3106", "CVE-2008-3108", "CVE-2008-3111", "CVE-2008-3112", "CVE-2008-3113", "CVE-2008-3114");
  script_version ("$Revision$");
- script_tag(name:"cvss_base", value:"10.0");
- script_tag(name:"risk_factor", value:"Critical");
+ script_tag(name:"cvss_base", value:"6.8");
+ script_tag(name:"risk_factor", value:"High");
  script_name("SLES9: Security update for IBM Java5 JRE and IBMJava5 SDK");
 
  desc = "The remote host is missing updates to packages that affect

Modified: trunk/openvas-plugins/scripts/sles9p5035180.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles9p5035180.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/sles9p5035180.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -30,8 +30,8 @@
  script_id(65246);
  script_cve_id("CVE-2008-1389", "CVE-2008-3912", "CVE-2008-3913", "CVE-2008-3914");
  script_version ("$Revision$");
- script_tag(name:"cvss_base", value:"10.0");
- script_tag(name:"risk_factor", value:"Critical");
+ script_tag(name:"cvss_base", value:"5.0");
+ script_tag(name:"risk_factor", value:"Medium");
  script_name("SLES9: Security update for clamav");
 
  desc = "The remote host is missing updates to packages that affect
@@ -51,7 +51,7 @@
 
 Please install the updates provided by SuSE.
 
-Risk factor : High";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/sles9p5035420.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles9p5035420.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/sles9p5035420.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -30,8 +30,8 @@
  script_id(65383);
  script_cve_id("CVE-2008-3104", "CVE-2008-3106", "CVE-2008-3108", "CVE-2008-3111", "CVE-2008-3112", "CVE-2008-3113", "CVE-2008-3114");
  script_version ("$Revision$");
- script_tag(name:"cvss_base", value:"10.0");
- script_tag(name:"risk_factor", value:"Critical");
+ script_tag(name:"cvss_base", value:"6.8");
+ script_tag(name:"risk_factor", value:"High");
  script_name("SLES9: Security update for IBM Java 5");
 
  desc = "The remote host is missing updates to packages that affect

Modified: trunk/openvas-plugins/scripts/sles9p5035440.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles9p5035440.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/sles9p5035440.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -30,8 +30,8 @@
  script_id(65080);
  script_cve_id("CVE-2008-3281", "CVE-2008-3529");
  script_version ("$Revision$");
- script_tag(name:"cvss_base", value:"10.0");
- script_tag(name:"risk_factor", value:"Critical");
+ script_tag(name:"cvss_base", value:"4.3");
+ script_tag(name:"risk_factor", value:"Medium");
  script_name("SLES9: Security update for libxml2");
 
  desc = "The remote host is missing updates to packages that affect
@@ -52,7 +52,7 @@
 
 Please install the updates provided by SuSE.
 
-Risk factor : High";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/sles9p5036146.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles9p5036146.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/sles9p5036146.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -30,8 +30,8 @@
  script_id(65175);
  script_cve_id("CVE-2007-6716", "CVE-2008-3525", "CVE-2008-0598", "CVE-2008-1673", "CVE-2008-3272", "CVE-2008-2812");
  script_version ("$Revision$");
- script_tag(name:"cvss_base", value:"10.0");
- script_tag(name:"risk_factor", value:"Critical");
+ script_tag(name:"cvss_base", value:"4.7");
+ script_tag(name:"risk_factor", value:"Medium");
  script_name("SLES9: Security update for Linux kernel");
 
  desc = "The remote host is missing updates to packages that affect
@@ -61,7 +61,7 @@
 
 Please install the updates provided by SuSE.
 
-Risk factor : High";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/sles9p5036560.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles9p5036560.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/sles9p5036560.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -30,8 +30,8 @@
  script_id(65558);
  script_cve_id("CVE-2008-3639", "CVE-2008-3640", "CVE-2008-3641");
  script_version ("$Revision$");
- script_tag(name:"cvss_base", value:"10.0");
- script_tag(name:"risk_factor", value:"Critical");
+ script_tag(name:"cvss_base", value:"7.5");
+ script_tag(name:"risk_factor", value:"High");
  script_name("SLES9: Security update for CUPS");
 
  desc = "The remote host is missing updates to packages that affect

Modified: trunk/openvas-plugins/scripts/sles9p5036604.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles9p5036604.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/sles9p5036604.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -30,8 +30,8 @@
  script_id(65052);
  script_cve_id("CVE-2008-4069", "CVE-2008-4067", "CVE-2008-4068", "CVE-2008-4065", "CVE-2008-4066", "CVE-2008-4061", "CVE-2008-4062", "CVE-2008-4063", "CVE-2008-4064", "CVE-2008-4058", "CVE-2008-4059", "CVE-2008-4060", "CVE-2008-3837", "CVE-2008-3836", "CVE-2008-3835", "CVE-2008-0016");
  script_version ("$Revision$");
- script_tag(name:"cvss_base", value:"10.0");
- script_tag(name:"risk_factor", value:"Critical");
+ script_tag(name:"cvss_base", value:"5.0");
+ script_tag(name:"risk_factor", value:"Medium");
  script_name("SLES9: Security update for Epiphany and Mozilla");
 
  desc = "The remote host is missing updates to packages that affect
@@ -60,7 +60,7 @@
 
 Please install the updates provided by SuSE.
 
-Risk factor : High";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/sles9p5037740.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles9p5037740.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/sles9p5037740.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -30,8 +30,8 @@
  script_id(65306);
  script_cve_id("CVE-2008-3651", "CVE-2008-3652");
  script_version ("$Revision$");
- script_tag(name:"cvss_base", value:"7.8");
- script_tag(name:"risk_factor", value:"High");
+ script_tag(name:"cvss_base", value:"4.0");
+ script_tag(name:"risk_factor", value:"Medium");
  script_name("SLES9: Security update for ipsec-tools");
 
  desc = "The remote host is missing updates to packages that affect
@@ -51,7 +51,7 @@
 
 Please install the updates provided by SuSE.
 
-Risk factor : High";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/sles9p5038720.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles9p5038720.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/sles9p5038720.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -30,7 +30,7 @@
  script_id(65039);
  script_cve_id("CVE-2008-3520", "CVE-2008-3521", "CVE-2008-3522");
  script_version ("$Revision$");
- script_tag(name:"cvss_base", value:"10.0");
+ script_tag(name:"cvss_base", value:"9.3");
  script_tag(name:"risk_factor", value:"Critical");
  script_name("SLES9: Security update for jasper");
 
@@ -52,7 +52,7 @@
 
 Please install the updates provided by SuSE.
 
-Risk factor : High";
+Risk factor : Critical";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/sles9p5039274.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles9p5039274.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/sles9p5039274.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -30,8 +30,8 @@
  script_id(65259);
  script_cve_id("CVE-2008-4210", "CVE-2008-3528", "CVE-2008-5029");
  script_version ("$Revision$");
- script_tag(name:"cvss_base", value:"7.1");
- script_tag(name:"risk_factor", value:"High");
+ script_tag(name:"cvss_base", value:"4.6");
+ script_tag(name:"risk_factor", value:"Medium");
  script_name("SLES9: Security update for Linux kernel");
 
  desc = "The remote host is missing updates to packages that affect
@@ -61,7 +61,7 @@
 
 Please install the updates provided by SuSE.
 
-Risk factor : High";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/sles9p5039700.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles9p5039700.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/sles9p5039700.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -30,8 +30,8 @@
  script_id(65394);
  script_cve_id("CVE-2008-3104", "CVE-2008-3112", "CVE-2008-3113", "CVE-2008-3114");
  script_version ("$Revision$");
- script_tag(name:"cvss_base", value:"10.0");
- script_tag(name:"risk_factor", value:"Critical");
+ script_tag(name:"cvss_base", value:"6.8");
+ script_tag(name:"risk_factor", value:"High");
  script_name("SLES9: Security update for IBM Java2 JRE and SDK");
 
  desc = "The remote host is missing updates to packages that affect

Modified: trunk/openvas-plugins/scripts/sles9p5040200.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles9p5040200.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/sles9p5040200.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -30,7 +30,7 @@
  script_id(65160);
  script_cve_id("CVE-2008-3933", "CVE-2008-4685");
  script_version ("$Revision$");
- script_tag(name:"cvss_base", value:"5.0");
+ script_tag(name:"cvss_base", value:"3.3");
  script_tag(name:"risk_factor", value:"Medium");
  script_name("SLES9: Security update for ethereal");
 
@@ -51,7 +51,7 @@
 
 Please install the updates provided by SuSE.
 
-Risk factor : High";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/sles9p5040565.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles9p5040565.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/sles9p5040565.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -30,8 +30,8 @@
  script_id(65118);
  script_cve_id("CVE-2008-5360", "CVE-2008-5359", "CVE-2008-5358", "CVE-2008-5357", "CVE-2008-5356", "CVE-2008-5344", "CVE-2008-5343", "CVE-2008-5342", "CVE-2008-5341", "CVE-2008-5340", "CVE-2008-5339", "CVE-2008-2086", "CVE-2008-5355", "CVE-2008-5354", "CVE-2008-5353", "CVE-2008-5352", "CVE-2008-5351", "CVE-2008-5350", "CVE-2008-5349", "CVE-2008-5348", "CVE-2008-5347", "CVE-2008-5345", "CVE-2008-5346");
  script_version ("$Revision$");
- script_tag(name:"cvss_base", value:"10.0");
- script_tag(name:"risk_factor", value:"Critical");
+ script_tag(name:"cvss_base", value:"6.4");
+ script_tag(name:"risk_factor", value:"High");
  script_name("SLES9: Security update for Sun Java");
 
  desc = "The remote host is missing updates to packages that affect

Modified: trunk/openvas-plugins/scripts/sles9p5040780.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles9p5040780.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/sles9p5040780.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -30,8 +30,8 @@
  script_id(65048);
  script_cve_id("CVE-2008-4864", "CVE-2008-5031");
  script_version ("$Revision$");
- script_tag(name:"cvss_base", value:"10.0");
- script_tag(name:"risk_factor", value:"Critical");
+ script_tag(name:"cvss_base", value:"7.5");
+ script_tag(name:"risk_factor", value:"High");
  script_name("SLES9: Security update for Python");
 
  desc = "The remote host is missing updates to packages that affect

Modified: trunk/openvas-plugins/scripts/sles9p5040940.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles9p5040940.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/sles9p5040940.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -30,8 +30,8 @@
  script_id(65054);
  script_cve_id("CVE-2008-5512", "CVE-2008-5511", "CVE-2008-5510", "CVE-2008-5508", "CVE-2008-5507", "CVE-2008-5506", "CVE-2008-5503", "CVE-2008-5500");
  script_version ("$Revision$");
- script_tag(name:"cvss_base", value:"10.0");
- script_tag(name:"risk_factor", value:"Critical");
+ script_tag(name:"cvss_base", value:"6.8");
+ script_tag(name:"risk_factor", value:"High");
  script_name("SLES9: Security update for Epiphany");
 
  desc = "The remote host is missing updates to packages that affect

Modified: trunk/openvas-plugins/scripts/sles9p5041763.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles9p5041763.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/sles9p5041763.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -30,8 +30,8 @@
  script_id(65489);
  script_cve_id("CVE-2008-5350", "CVE-2008-5346", "CVE-2008-5343", "CVE-2008-5344", "CVE-2008-5359", "CVE-2008-5341", "CVE-2008-5339", "CVE-2008-5340", "CVE-2008-5348", "CVE-2008-2086", "CVE-2008-5345", "CVE-2008-5351", "CVE-2008-5360", "CVE-2008-5353", "CVE-2008-5356", "CVE-2008-5354", "CVE-2008-5357", "CVE-2008-5352", "CVE-2008-5342");
  script_version ("$Revision$");
- script_tag(name:"cvss_base", value:"10.0");
- script_tag(name:"risk_factor", value:"Critical");
+ script_tag(name:"cvss_base", value:"5.0");
+ script_tag(name:"risk_factor", value:"Medium");
  script_name("SLES9: Security update for IBM Java5 JRE and SDK");
 
  desc = "The remote host is missing updates to packages that affect
@@ -52,7 +52,7 @@
 
 Please install the updates provided by SuSE.
 
-Risk factor : High";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/sles9p5046186.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles9p5046186.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/sles9p5046186.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -30,7 +30,7 @@
  script_id(65452);
  script_cve_id("CVE-2009-0115");
  script_version ("$Revision$");
- script_tag(name:"cvss_base", value:"6.9");
+ script_tag(name:"cvss_base", value:"7.2");
  script_tag(name:"risk_factor", value:"High");
  script_name("SLES9: Security update for multipath-tools");
 

Modified: trunk/openvas-plugins/scripts/sles9p5046302.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles9p5046302.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/sles9p5046302.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -30,8 +30,8 @@
  script_id(65617);
  script_cve_id("CVE-2009-0028", "CVE-2009-0675", "CVE-2009-0676", "CVE-2009-0322", "CVE-2009-0065");
  script_version ("$Revision$");
- script_tag(name:"cvss_base", value:"10.0");
- script_tag(name:"risk_factor", value:"Critical");
+ script_tag(name:"cvss_base", value:"2.1");
+ script_tag(name:"risk_factor", value:"Medium");
  script_name("SLES9: Security update for Linux kernel");
 
  desc = "The remote host is missing updates to packages that affect
@@ -61,7 +61,7 @@
 
 Please install the updates provided by SuSE.
 
-Risk factor : High";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/sles9p5046860.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles9p5046860.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/sles9p5046860.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -30,8 +30,8 @@
  script_id(65281);
  script_cve_id("CVE-2008-5350", "CVE-2008-5346", "CVE-2008-5343", "CVE-2008-5344", "CVE-2008-5359", "CVE-2008-5339", "CVE-2008-5340", "CVE-2008-5348", "CVE-2008-2086", "CVE-2008-5345", "CVE-2008-5351", "CVE-2008-5360", "CVE-2008-5353", "CVE-2008-5356", "CVE-2008-5354", "CVE-2008-5357", "CVE-2008-5342");
  script_version ("$Revision$");
- script_tag(name:"cvss_base", value:"10.0");
- script_tag(name:"risk_factor", value:"Critical");
+ script_tag(name:"cvss_base", value:"5.0");
+ script_tag(name:"risk_factor", value:"Medium");
  script_name("SLES9: Security update for IBM Java2 JRE and SDK");
 
  desc = "The remote host is missing updates to packages that affect
@@ -52,7 +52,7 @@
 
 Please install the updates provided by SuSE.
 
-Risk factor : High";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/sles9p5047860.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles9p5047860.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/sles9p5047860.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -30,8 +30,8 @@
  script_id(65449);
  script_cve_id("CVE-2009-0163", "CVE-2009-0165", "CVE-2009-0166", "CVE-2009-0146", "CVE-2009-0147", "CVE-2009-0799", "CVE-2009-0800", "CVE-2009-1179", "CVE-2009-1180", "CVE-2009-1181", "CVE-2009-1182", "CVE-2009-1183");
  script_version ("$Revision$");
- script_tag(name:"cvss_base", value:"10.0");
- script_tag(name:"risk_factor", value:"Critical");
+ script_tag(name:"cvss_base", value:"6.8");
+ script_tag(name:"risk_factor", value:"High");
  script_name("SLES9: Security update for CUPS");
 
  desc = "The remote host is missing updates to packages that affect

Modified: trunk/openvas-plugins/scripts/sles9p5050060.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles9p5050060.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/sles9p5050060.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -30,8 +30,8 @@
  script_id(65307);
  script_cve_id("CVE-2009-1100", "CVE-2009-1103", "CVE-2009-1104", "CVE-2009-1093", "CVE-2009-1094", "CVE-2009-1107", "CVE-2009-1095", "CVE-2009-1096", "CVE-2009-1098", "CVE-2009-1099");
  script_version ("$Revision$");
- script_tag(name:"cvss_base", value:"10.0");
- script_tag(name:"risk_factor", value:"Critical");
+ script_tag(name:"cvss_base", value:"5.0");
+ script_tag(name:"risk_factor", value:"Medium");
  script_name("SLES9: Security update for IBM Java 5 JRE and IBM Java 5 SDK");
 
  desc = "The remote host is missing updates to packages that affect
@@ -52,7 +52,7 @@
 
 Please install the updates provided by SuSE.
 
-Risk factor : High";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/sles9p5050540.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles9p5050540.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/sles9p5050540.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -30,8 +30,8 @@
  script_id(65574);
  script_cve_id("CVE-2009-1269", "CVE-2009-1268", "CVE-2009-1267", "CVE-2009-1210", "CVE-2009-1266");
  script_version ("$Revision$");
- script_tag(name:"cvss_base", value:"10.0");
- script_tag(name:"risk_factor", value:"Critical");
+ script_tag(name:"cvss_base", value:"5.0");
+ script_tag(name:"risk_factor", value:"Medium");
  script_name("SLES9: Security update for ethereal");
 
  desc = "The remote host is missing updates to packages that affect
@@ -51,7 +51,7 @@
 
 Please install the updates provided by SuSE.
 
-Risk factor : High";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/sles9p5051763.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles9p5051763.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/sles9p5051763.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -30,8 +30,8 @@
  script_id(65365);
  script_cve_id("CVE-2009-1072", "CVE-2009-1439", "CVE-2009-1337", "CVE-2009-0859", "CVE-2009-1265");
  script_version ("$Revision$");
- script_tag(name:"cvss_base", value:"7.8");
- script_tag(name:"risk_factor", value:"High");
+ script_tag(name:"cvss_base", value:"4.9");
+ script_tag(name:"risk_factor", value:"Medium");
  script_name("SLES9: Security update for the Linux kernel");
 
  desc = "The remote host is missing updates to packages that affect
@@ -61,7 +61,7 @@
 
 Please install the updates provided by SuSE.
 
-Risk factor : High";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/sles9p5053737.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles9p5053737.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/sles9p5053737.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -30,7 +30,7 @@
  script_id(65331);
  script_cve_id("CVE-2009-0642", "CVE-2008-3905", "CVE-2008-3790", "CVE-2008-3656", "CVE-2008-3443", "CVE-2008-3655", "CVE-2008-3657", "CVE-2009-1904");
  script_version ("$Revision$");
- script_tag(name:"cvss_base", value:"7.8");
+ script_tag(name:"cvss_base", value:"6.8");
  script_tag(name:"risk_factor", value:"High");
  script_name("SLES9: Security update for ruby");
 

Modified: trunk/openvas-plugins/scripts/sles9p5055991.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles9p5055991.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/sles9p5055991.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -30,7 +30,7 @@
  script_id(65354);
  script_cve_id("CVE-2009-2692", "CVE-2009-1389", "CVE-2009-1758");
  script_version ("$Revision$");
- script_tag(name:"cvss_base", value:"7.8");
+ script_tag(name:"cvss_base", value:"7.2");
  script_tag(name:"risk_factor", value:"High");
  script_name("SLES9: Security update for Linux kernel");
 

Modified: trunk/openvas-plugins/scripts/sles9p5059340.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles9p5059340.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/sles9p5059340.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -30,8 +30,8 @@
  script_id(65284);
  script_cve_id("CVE-2009-3229", "CVE-2009-3230", "CVE-2009-3231");
  script_version ("$Revision$");
- script_tag(name:"cvss_base", value:"6.8");
- script_tag(name:"risk_factor", value:"High");
+ script_tag(name:"cvss_base", value:"4.0");
+ script_tag(name:"risk_factor", value:"Medium");
  script_name("SLES9: Security update for PostgreSQL");
 
  desc = "The remote host is missing updates to packages that affect
@@ -57,7 +57,7 @@
 
 Please install the updates provided by SuSE.
 
-Risk factor : High";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/sles9p5059500.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles9p5059500.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/sles9p5059500.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -30,8 +30,8 @@
  script_id(65171);
  script_cve_id("CVE-2009-2625", "CVE-2008-5349");
  script_version ("$Revision$");
- script_tag(name:"cvss_base", value:"7.1");
- script_tag(name:"risk_factor", value:"High");
+ script_tag(name:"cvss_base", value:"5.0");
+ script_tag(name:"risk_factor", value:"Medium");
  script_name("SLES9: Security update for IBM Java2 JRE and SDK");
 
  desc = "The remote host is missing updates to packages that affect
@@ -52,7 +52,7 @@
 
 Please install the updates provided by SuSE.
 
-Risk factor : High";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/sles9p5059920.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles9p5059920.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/sles9p5059920.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -30,8 +30,8 @@
  script_id(65239);
  script_cve_id("CVE-2009-1307", "CVE-2009-1311", "CVE-2009-1392", "CVE-2009-1832", "CVE-2009-1833", "CVE-2009-1835", "CVE-2009-1836", "CVE-2009-1838", "CVE-2009-1841", "CVE-2009-2210");
  script_version ("$Revision$");
- script_tag(name:"cvss_base", value:"9.3");
- script_tag(name:"risk_factor", value:"Critical");
+ script_tag(name:"cvss_base", value:"6.8");
+ script_tag(name:"risk_factor", value:"High");
  script_name("SLES9: Security update for epiphany");
 
  desc = "The remote host is missing updates to packages that affect

Modified: trunk/openvas-plugins/scripts/sles9p5060942.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles9p5060942.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/sles9p5060942.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -30,7 +30,7 @@
  script_id(66070);
  script_cve_id("CVE-2009-1890", "CVE-2009-1891", "CVE-2009-3094", "CVE-2009-3095");
  script_version ("$Revision$");
- script_tag(name:"cvss_base", value:"7.5");
+ script_tag(name:"cvss_base", value:"7.1");
  script_tag(name:"risk_factor", value:"High");
  script_name("SLES9: Security update for Apache 2");
 

Modified: trunk/openvas-plugins/scripts/sles9p5062456.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles9p5062456.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/sles9p5062456.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -30,7 +30,7 @@
  script_id(66276);
  script_cve_id("CVE-2009-3547", "CVE-2009-2910", "CVE-2009-1192", "CVE-2009-2909", "CVE-2009-2848", "CVE-2009-3002", "CVE-2009-1633", "CVE-2009-3726");
  script_version ("$Revision$");
- script_tag(name:"cvss_base", value:"7.8");
+ script_tag(name:"cvss_base", value:"6.9");
  script_tag(name:"risk_factor", value:"High");
  script_name("SLES9: Security update for Linux kernel");
 

Modified: trunk/openvas-plugins/scripts/sles9p5062661.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles9p5062661.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/sles9p5062661.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -30,7 +30,7 @@
  script_id(66310);
  script_cve_id("CVE-2009-3555");
  script_version ("$Revision$");
- script_tag(name:"cvss_base", value:"6.4");
+ script_tag(name:"cvss_base", value:"5.8");
  script_tag(name:"risk_factor", value:"High");
  script_name("SLES9: Security update for OpenSSL");
 

Modified: trunk/openvas-plugins/scripts/smb_nt_ms02-005.nasl
===================================================================
--- trunk/openvas-plugins/scripts/smb_nt_ms02-005.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/smb_nt_ms02-005.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -46,8 +46,8 @@
  script_bugtraq_id(11388, 11385, 11383, 11381, 11377, 11367, 11366, 10473, 8565, 
                    9009, 9012, 9013, 9014, 9015, 9182, 9663, 9798, 12477, 12475, 
                    12473, 12530, 13123, 13117, 13120);
- script_tag(name:"cvss_base", value:"10.0");
- script_tag(name:"risk_factor", value:"Critical");
+ script_tag(name:"cvss_base", value:"7.5");
+ script_tag(name:"risk_factor", value:"High");
 
  script_xref(name:"IAVA", value:"2003-A-0014");
  script_xref(name:"IAVA", value:"2004-A-0016");

Modified: trunk/openvas-plugins/scripts/smb_nt_ms02-006.nasl
===================================================================
--- trunk/openvas-plugins/scripts/smb_nt_ms02-006.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/smb_nt_ms02-006.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -26,8 +26,8 @@
 {
  script_id(10865);
  script_version("$Revision$");
- script_tag(name:"cvss_base", value:"10.0");
- script_tag(name:"risk_factor", value:"Critical");
+ script_tag(name:"cvss_base", value:"7.5");
+ script_tag(name:"risk_factor", value:"High");
  script_cve_id("CVE-2002-0053");
  name = "Checks for MS HOTFIX for snmp buffer overruns";
  

Modified: trunk/openvas-plugins/scripts/smb_reg_service_pack_XP.nasl
===================================================================
--- trunk/openvas-plugins/scripts/smb_reg_service_pack_XP.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/smb_reg_service_pack_XP.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -65,8 +65,8 @@
  script_id(11119);
  script_bugtraq_id(10897, 11202);
  script_version ("$Revision$");
- script_tag(name:"cvss_base", value:"6.0");
- script_tag(name:"risk_factor", value:"High");
+ script_tag(name:"cvss_base", value:"10.0");
+ script_tag(name:"risk_factor", value:"Critical");
  script_cve_id("CVE-1999-0662");
  
  name = "SMB Registry : XP Service Pack version";
@@ -78,7 +78,7 @@
 to determine the Service Pack the host is running.
 
 Sensitive servers should always run the latest service pack for security reasons.
-Risk factor : High 
+Risk factor : Critical 
 ";
 
  script_description(desc);

Modified: trunk/openvas-plugins/scripts/smbcl_flash_player_CB-A08-0059.nasl
===================================================================
--- trunk/openvas-plugins/scripts/smbcl_flash_player_CB-A08-0059.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/smbcl_flash_player_CB-A08-0059.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -30,8 +30,8 @@
 {
   script_id(90019);
   script_version ("$Revision: 03 $");
-  script_tag(name:"cvss_base", value:"9.3");
-  script_tag(name:"risk_factor", value:"Critical");
+  script_tag(name:"cvss_base", value:"5.0");
+  script_tag(name:"risk_factor", value:"Medium");
   script_cve_id("CVE-2007-5275", "CVE-2007-6019", "CVE-2007-6243",
                 "CVE-2007-6637", "CVE-2008-1654", "CVE-2008-1655");
   script_bugtraq_id(26930, 28694, 26966, 27034, 28696, 28697);
@@ -89,7 +89,7 @@
   All Adobe Flash Player users should upgrade to the latest version:
   http://get.adobe.com/flashplayer/
 
-  Risk factor : High";
+  Risk factor : Medium";
 
   script_description(desc);
   script_summary("Determine the version of Flashplayer");

Modified: trunk/openvas-plugins/scripts/smtp_relay2.nasl
===================================================================
--- trunk/openvas-plugins/scripts/smtp_relay2.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/smtp_relay2.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -37,9 +37,10 @@
 if(description)
 {
  script_id(11852);
- script_version ("$Revision$");
+ script_tag(name:"cvss_base", value:"10.0");
+ script_version("$Revision$");
  script_cve_id("CVE-1999-0512");
- script_tag(name:"risk_factor", value:"Medium");
+ script_tag(name:"risk_factor", value:"Critical");
  name = "Mail relaying (thorough test)";
  script_name(name);
 
@@ -48,7 +49,7 @@
 This means that spammers might be able to use your mail server
 to send their mails to the world.
 
-Risk factor : Medium
+Risk factor : Critical
 
 Solution : upgrade your software or improve the configuration so that
 your SMTP server cannot be used as a relay any more.";
@@ -197,7 +198,7 @@
 OpenVAS was able to relay mails by sending those sequences:
 
 ",
-	rep, "Risk factor : Medium
+	rep, "Risk factor : Critical
 
 Solution : upgrade your software or improve the configuration so that
 	your SMTP server cannot be used as a relay any more.");

Modified: trunk/openvas-plugins/scripts/spip_sql_injection.nasl
===================================================================
--- trunk/openvas-plugins/scripts/spip_sql_injection.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/spip_sql_injection.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -28,8 +28,8 @@
 {
  script_id(20978);
  script_version ("$Revision$");
- script_tag(name:"cvss_base", value:"4.0");
- script_tag(name:"risk_factor", value:"Medium");
+ script_tag(name:"cvss_base", value:"7.5");
+ script_tag(name:"risk_factor", value:"High");
 
  script_cve_id("CVE-2006-0517", "CVE-2006-0518", "CVE-2006-0519");
  script_bugtraq_id(16458, 16461);

Modified: trunk/openvas-plugins/scripts/squirrelmail_144.nasl
===================================================================
--- trunk/openvas-plugins/scripts/squirrelmail_144.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/squirrelmail_144.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -26,8 +26,8 @@
   script_id(16228);
   script_bugtraq_id(12337);
   script_version("$Revision$");
-  script_tag(name:"cvss_base", value:"7.5");
-  script_tag(name:"risk_factor", value:"High");
+  script_tag(name:"cvss_base", value:"5.0");
+  script_tag(name:"risk_factor", value:"Medium");
 
   script_cve_id(
     "CVE-2005-0075",

Modified: trunk/openvas-plugins/scripts/squirremail_cross_site_scripting.nasl
===================================================================
--- trunk/openvas-plugins/scripts/squirremail_cross_site_scripting.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/squirremail_cross_site_scripting.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -29,8 +29,8 @@
  script_id(11415);
  script_bugtraq_id(6302, 7019);
  script_version ("$Revision$");
- script_tag(name:"cvss_base", value:"6.8");
- script_tag(name:"risk_factor", value:"High");
+ script_tag(name:"cvss_base", value:"4.3");
+ script_tag(name:"risk_factor", value:"Medium");
  script_cve_id("CVE-2002-1276", "CVE-2002-1341");
  script_xref(name:"RHSA", value:"RHSA-2003:0042-07");
 

Modified: trunk/openvas-plugins/scripts/sugarcrm_remote_file_inclusion.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sugarcrm_remote_file_inclusion.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/sugarcrm_remote_file_inclusion.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -25,7 +25,7 @@
 if (description) {
 script_id(20286);
 script_version("$Revision$");
- script_tag(name:"cvss_base", value:"6.0");
+ script_tag(name:"cvss_base", value:"7.5");
  script_tag(name:"risk_factor", value:"High");
 
 script_cve_id("CVE-2005-4087",

Modified: trunk/openvas-plugins/scripts/suse_sa_2009_001.nasl
===================================================================
--- trunk/openvas-plugins/scripts/suse_sa_2009_001.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/suse_sa_2009_001.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -30,7 +30,7 @@
  script_id(63151);
  script_cve_id("CVE-2008-2086", "CVE-2008-5339", "CVE-2008-5340", "CVE-2008-5341", "CVE-2008-5342", "CVE-2008-5343", "CVE-2008-5344", "CVE-2008-5345", "CVE-2008-5346", "CVE-2008-5347", "CVE-2008-5348", "CVE-2008-5349", "CVE-2008-5350", "CVE-2008-5351", "CVE-2008-5352", "CVE-2008-5353", "CVE-2008-5354", "CVE-2008-5355", "CVE-2008-5356", "CVE-2008-5357", "CVE-2008-5358", "CVE-2008-5359", "CVE-2008-5360");
  script_version ("$");
- script_tag(name:"cvss_base", value:"10.0");
+ script_tag(name:"cvss_base", value:"9.3");
  script_tag(name:"risk_factor", value:"Critical");
  name = "SuSE Security Advisory SUSE-SA:2009:001 (Sun Java)";
  script_name(name);
@@ -60,7 +60,7 @@
 
 https://secure1.securityspace.com/smysecure/catid.html?in=SUSE-SA:2009:001
 
-Risk factor : High";
+Risk factor : Critical";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/suse_sa_2009_003.nasl
===================================================================
--- trunk/openvas-plugins/scripts/suse_sa_2009_003.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/suse_sa_2009_003.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -30,8 +30,8 @@
  script_id(63224);
  script_cve_id("CVE-2008-3831", "CVE-2008-4554", "CVE-2008-4933", "CVE-2008-5025", "CVE-2008-5029", "CVE-2008-5079", "CVE-2008-5182", "CVE-2008-5300", "CVE-2008-5700", "CVE-2008-5702");
  script_version ("$");
- script_tag(name:"cvss_base", value:"7.8");
- script_tag(name:"risk_factor", value:"High");
+ script_tag(name:"cvss_base", value:"4.7");
+ script_tag(name:"risk_factor", value:"Medium");
  name = "SuSE Security Advisory SUSE-SA:2009:003 (kernel-debug)";
  script_name(name);
 
@@ -53,7 +53,7 @@
 
 https://secure1.securityspace.com/smysecure/catid.html?in=SUSE-SA:2009:003
 
-Risk factor : High";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/suse_sa_2009_004.nasl
===================================================================
--- trunk/openvas-plugins/scripts/suse_sa_2009_004.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/suse_sa_2009_004.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -30,8 +30,8 @@
  script_id(63273);
  script_cve_id("CVE-2008-4933", "CVE-2008-5025", "CVE-2008-5029", "CVE-2008-5079", "CVE-2008-5134", "CVE-2008-5182");
  script_version ("$");
- script_tag(name:"cvss_base", value:"10.0");
- script_tag(name:"risk_factor", value:"Critical");
+ script_tag(name:"cvss_base", value:"7.8");
+ script_tag(name:"risk_factor", value:"High");
  name = "SuSE Security Advisory SUSE-SA:2009:004 (kernel)";
  script_name(name);
 

Modified: trunk/openvas-plugins/scripts/suse_sa_2009_010.nasl
===================================================================
--- trunk/openvas-plugins/scripts/suse_sa_2009_010.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/suse_sa_2009_010.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -30,8 +30,8 @@
  script_id(63467);
  script_cve_id("CVE-2008-5079", "CVE-2008-5700", "CVE-2008-5702", "CVE-2009-0028", "CVE-2009-0029", "CVE-2009-0031", "CVE-2009-0065", "CVE-2009-0269", "CVE-2009-0322");
  script_version ("$");
- script_tag(name:"cvss_base", value:"10.0");
- script_tag(name:"risk_factor", value:"Critical");
+ script_tag(name:"cvss_base", value:"4.9");
+ script_tag(name:"risk_factor", value:"Medium");
  name = "SuSE Security Advisory SUSE-SA:2009:010 (kernel)";
  script_name(name);
 
@@ -56,7 +56,7 @@
 
 https://secure1.securityspace.com/smysecure/catid.html?in=SUSE-SA:2009:010
 
-Risk factor : High";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/suse_sa_2009_012.nasl
===================================================================
--- trunk/openvas-plugins/scripts/suse_sa_2009_012.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/suse_sa_2009_012.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -30,8 +30,8 @@
  script_id(63610);
  script_cve_id("CVE-2009-0040", "CVE-2009-0771", "CVE-2009-0772", "CVE-2009-0773", "CVE-2009-0774", "CVE-2009-0775", "CVE-2009-0776", "CVE-2009-0777");
  script_version ("$");
- script_tag(name:"cvss_base", value:"10.0");
- script_tag(name:"risk_factor", value:"Critical");
+ script_tag(name:"cvss_base", value:"6.8");
+ script_tag(name:"risk_factor", value:"High");
  name = "SuSE Security Advisory SUSE-SA:2009:012 (MozillaFirefox)";
  script_name(name);
 

Modified: trunk/openvas-plugins/scripts/suse_sa_2009_013.nasl
===================================================================
--- trunk/openvas-plugins/scripts/suse_sa_2009_013.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/suse_sa_2009_013.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -30,8 +30,8 @@
  script_id(63611);
  script_cve_id("CVE-2008-4311", "CVE-2009-0365", "CVE-2009-0578");
  script_version ("$");
- script_tag(name:"cvss_base", value:"6.2");
- script_tag(name:"risk_factor", value:"High");
+ script_tag(name:"cvss_base", value:"4.6");
+ script_tag(name:"risk_factor", value:"Medium");
  name = "SuSE Security Advisory SUSE-SA:2009:013 (dbus-1, hal, NetworkManager, PackageKit, ...)";
  script_name(name);
 
@@ -63,7 +63,7 @@
 
 https://secure1.securityspace.com/smysecure/catid.html?in=SUSE-SA:2009:013
 
-Risk factor : High";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/suse_sa_2009_014.nasl
===================================================================
--- trunk/openvas-plugins/scripts/suse_sa_2009_014.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/suse_sa_2009_014.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -30,7 +30,7 @@
  script_id(63686);
  script_cve_id("CVE-2009-0193", "CVE-2009-0658", "CVE-2009-0927", "CVE-2009-0928", "CVE-2009-1061", "CVE-2009-1062");
  script_version ("$");
- script_tag(name:"cvss_base", value:"10.0");
+ script_tag(name:"cvss_base", value:"9.3");
  script_tag(name:"risk_factor", value:"Critical");
  name = "SuSE Security Advisory SUSE-SA:2009:014 (acroread)";
  script_name(name);
@@ -59,7 +59,7 @@
 
 https://secure1.securityspace.com/smysecure/catid.html?in=SUSE-SA:2009:014
 
-Risk factor : High";
+Risk factor : Critical";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/suse_sa_2009_016.nasl
===================================================================
--- trunk/openvas-plugins/scripts/suse_sa_2009_016.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/suse_sa_2009_016.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -30,8 +30,8 @@
  script_id(63735);
  script_cve_id("CVE-2009-1093", "CVE-2009-1094", "CVE-2009-1095", "CVE-2009-1096", "CVE-2009-1097", "CVE-2009-1098", "CVE-2009-1099", "CVE-2009-1100", "CVE-2009-1101", "CVE-2009-1102", "CVE-2009-1103", "CVE-2009-1104", "CVE-2009-1105", "CVE-2009-1106", "CVE-2009-1107");
  script_version ("$");
- script_tag(name:"cvss_base", value:"10.0");
- script_tag(name:"risk_factor", value:"Critical");
+ script_tag(name:"cvss_base", value:"5.0");
+ script_tag(name:"risk_factor", value:"Medium");
  name = "SuSE Security Advisory SUSE-SA:2009:016 (Sun Java 5 and 6)";
  script_name(name);
 
@@ -53,7 +53,7 @@
 
 https://secure1.securityspace.com/smysecure/catid.html?in=SUSE-SA:2009:016
 
-Risk factor : High";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/suse_sa_2009_019.nasl
===================================================================
--- trunk/openvas-plugins/scripts/suse_sa_2009_019.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/suse_sa_2009_019.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -30,8 +30,8 @@
  script_id(63799);
  script_cve_id("CVE-2009-0844", "CVE-2009-0845", "CVE-2009-0846", "CVE-2009-0847");
  script_version ("$");
- script_tag(name:"cvss_base", value:"10.0");
- script_tag(name:"risk_factor", value:"Critical");
+ script_tag(name:"cvss_base", value:"5.8");
+ script_tag(name:"risk_factor", value:"High");
  name = "SuSE Security Advisory SUSE-SA:2009:019 (krb5)";
  script_name(name);
 

Modified: trunk/openvas-plugins/scripts/suse_sa_2009_021.nasl
===================================================================
--- trunk/openvas-plugins/scripts/suse_sa_2009_021.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/suse_sa_2009_021.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -30,8 +30,8 @@
  script_id(63846);
  script_cve_id("CVE-2009-0676", "CVE-2009-0835", "CVE-2009-1072");
  script_version ("$");
- script_tag(name:"cvss_base", value:"7.2");
- script_tag(name:"risk_factor", value:"High");
+ script_tag(name:"cvss_base", value:"2.1");
+ script_tag(name:"risk_factor", value:"Medium");
  name = "SuSE Security Advisory SUSE-SA:2009:021 (kernel)";
  script_name(name);
 
@@ -71,7 +71,7 @@
 
 https://secure1.securityspace.com/smysecure/catid.html?in=SUSE-SA:2009:021
 
-Risk factor : High";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/suse_sa_2009_023.nasl
===================================================================
--- trunk/openvas-plugins/scripts/suse_sa_2009_023.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/suse_sa_2009_023.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -30,8 +30,8 @@
  script_id(63848);
  script_cve_id("CVE-2009-0040", "CVE-2009-0352", "CVE-2009-0353", "CVE-2009-0772", "CVE-2009-0774", "CVE-2009-0776", "CVE-2009-1169");
  script_version ("$");
- script_tag(name:"cvss_base", value:"10.0");
- script_tag(name:"risk_factor", value:"Critical");
+ script_tag(name:"cvss_base", value:"6.8");
+ script_tag(name:"risk_factor", value:"High");
  name = "SuSE Security Advisory SUSE-SA:2009:023 (MozillaFirefox)";
  script_name(name);
 

Modified: trunk/openvas-plugins/scripts/suse_sa_2009_024.nasl
===================================================================
--- trunk/openvas-plugins/scripts/suse_sa_2009_024.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/suse_sa_2009_024.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -30,8 +30,8 @@
  script_id(63889);
  script_cve_id("CVE-2009-0146", "CVE-2009-0147", "CVE-2009-0163", "CVE-2009-0165", "CVE-2009-0166", "CVE-2009-0799", "CVE-2009-0800", "CVE-2009-1179", "CVE-2009-1180", "CVE-2009-1181", "CVE-2009-1182", "CVE-2009-1183");
  script_version ("$");
- script_tag(name:"cvss_base", value:"10.0");
- script_tag(name:"risk_factor", value:"Critical");
+ script_tag(name:"cvss_base", value:"4.3");
+ script_tag(name:"risk_factor", value:"Medium");
  name = "SuSE Security Advisory SUSE-SA:2009:024 (cups)";
  script_name(name);
 
@@ -66,7 +66,7 @@
 
 https://secure1.securityspace.com/smysecure/catid.html?in=SUSE-SA:2009:024
 
-Risk factor : High";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/suse_sa_2009_030.nasl
===================================================================
--- trunk/openvas-plugins/scripts/suse_sa_2009_030.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/suse_sa_2009_030.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -30,8 +30,8 @@
  script_id(64187);
  script_cve_id("CVE-2008-4554", "CVE-2008-5702", "CVE-2009-0028", "CVE-2009-0065", "CVE-2009-0269", "CVE-2009-0322", "CVE-2009-0676", "CVE-2009-0834", "CVE-2009-0835", "CVE-2009-0859", "CVE-2009-1072", "CVE-2009-1265", "CVE-2009-1337", "CVE-2009-1439", "CVE-2009-1961");
  script_version ("$");
- script_tag(name:"cvss_base", value:"10.0");
- script_tag(name:"risk_factor", value:"Critical");
+ script_tag(name:"cvss_base", value:"4.6");
+ script_tag(name:"risk_factor", value:"Medium");
  name = "SuSE Security Advisory SUSE-SA:2009:030 (kernel)";
  script_name(name);
 
@@ -50,7 +50,7 @@
 
 https://secure1.securityspace.com/smysecure/catid.html?in=SUSE-SA:2009:030
 
-Risk factor : High";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/suse_sa_2009_031.nasl
===================================================================
--- trunk/openvas-plugins/scripts/suse_sa_2009_031.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/suse_sa_2009_031.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -30,8 +30,8 @@
  script_id(64188);
  script_cve_id("CVE-2009-0028", "CVE-2009-0065", "CVE-2009-0269", "CVE-2009-0322", "CVE-2009-0675", "CVE-2009-0676", "CVE-2009-0834", "CVE-2009-0835", "CVE-2009-0859", "CVE-2009-1072", "CVE-2009-1242", "CVE-2009-1265", "CVE-2009-1337", "CVE-2009-1439", "CVE-2009-1630", "CVE-2009-1961");
  script_version ("$");
- script_tag(name:"cvss_base", value:"10.0");
- script_tag(name:"risk_factor", value:"Critical");
+ script_tag(name:"cvss_base", value:"2.1");
+ script_tag(name:"risk_factor", value:"Medium");
  name = "SuSE Security Advisory SUSE-SA:2009:031 (kernel)";
  script_name(name);
 
@@ -52,7 +52,7 @@
 
 https://secure1.securityspace.com/smysecure/catid.html?in=SUSE-SA:2009:031
 
-Risk factor : High";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/suse_sa_2009_032.nasl
===================================================================
--- trunk/openvas-plugins/scripts/suse_sa_2009_032.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/suse_sa_2009_032.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -30,8 +30,8 @@
  script_id(64189);
  script_cve_id("CVE-2009-1192", "CVE-2009-1242", "CVE-2009-1265", "CVE-2009-1337", "CVE-2009-1360", "CVE-2009-1439");
  script_version ("$");
- script_tag(name:"cvss_base", value:"7.8");
- script_tag(name:"risk_factor", value:"High");
+ script_tag(name:"cvss_base", value:"4.9");
+ script_tag(name:"risk_factor", value:"Medium");
  name = "SuSE Security Advisory SUSE-SA:2009:032 (kernel)";
  script_name(name);
 
@@ -92,7 +92,7 @@
 
 https://secure1.securityspace.com/smysecure/catid.html?in=SUSE-SA:2009:032
 
-Risk factor : High";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/suse_sa_2009_039.nasl
===================================================================
--- trunk/openvas-plugins/scripts/suse_sa_2009_039.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/suse_sa_2009_039.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -30,8 +30,8 @@
  script_id(64484);
  script_cve_id("CVE-2009-1194", "CVE-2009-2462", "CVE-2009-2463", "CVE-2009-2464", "CVE-2009-2465", "CVE-2009-2466", "CVE-2009-2467", "CVE-2009-2469", "CVE-2009-2471", "CVE-2009-2472");
  script_version ("$");
- script_tag(name:"cvss_base", value:"10.0");
- script_tag(name:"risk_factor", value:"Critical");
+ script_tag(name:"cvss_base", value:"6.8");
+ script_tag(name:"risk_factor", value:"High");
  script_name("SuSE Security Advisory SUSE-SA:2009:039 (MozillaFirefox)");
 
  desc = "The remote host is missing updates announced in

Modified: trunk/openvas-plugins/scripts/suse_sa_2009_041.nasl
===================================================================
--- trunk/openvas-plugins/scripts/suse_sa_2009_041.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/suse_sa_2009_041.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -30,8 +30,8 @@
  script_id(64565);
  script_cve_id("CVE-2009-0114", "CVE-2009-0519", "CVE-2009-0520", "CVE-2009-0521");
  script_version ("$");
- script_tag(name:"cvss_base", value:"9.3");
- script_tag(name:"risk_factor", value:"Critical");
+ script_tag(name:"cvss_base", value:"5.8");
+ script_tag(name:"risk_factor", value:"High");
  script_name("SuSE Security Advisory SUSE-SA:2009:041 (flash-player)");
 
  desc = "The remote host is missing updates announced in

Modified: trunk/openvas-plugins/scripts/suse_sa_2009_043.nasl
===================================================================
--- trunk/openvas-plugins/scripts/suse_sa_2009_043.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/suse_sa_2009_043.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -30,8 +30,8 @@
  script_id(64641);
  script_cve_id("CVE-2009-2670", "CVE-2009-2671", "CVE-2009-2672", "CVE-2009-2673", "CVE-2009-2674", "CVE-2009-2675", "CVE-2009-2676");
  script_version ("$Revision$");
- script_tag(name:"cvss_base", value:"10.0");
- script_tag(name:"risk_factor", value:"Critical");
+ script_tag(name:"cvss_base", value:"5.0");
+ script_tag(name:"risk_factor", value:"Medium");
  script_name("SuSE Security Advisory SUSE-SA:2009:043 (java-1_5_0-sun,java-1_6_0-sun)");
 
  desc = "The remote host is missing updates announced in
@@ -90,7 +90,7 @@
 
 https://secure1.securityspace.com/smysecure/catid.html?in=SUSE-SA:2009:043
 
-Risk factor : High";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/suse_sa_2009_048.nasl
===================================================================
--- trunk/openvas-plugins/scripts/suse_sa_2009_048.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/suse_sa_2009_048.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -30,7 +30,7 @@
  script_id(66104);
  script_cve_id("CVE-2009-2404", "CVE-2009-2408", "CVE-2009-2654", "CVE-2009-2662", "CVE-2009-2663", "CVE-2009-2664", "CVE-2009-3069", "CVE-2009-3070", "CVE-2009-3071", "CVE-2009-3072", "CVE-2009-3073", "CVE-2009-3075", "CVE-2009-3076", "CVE-2009-3077", "CVE-2009-3078", "CVE-2009-3079");
  script_version ("$Revision$");
- script_tag(name:"cvss_base", value:"10.0");
+ script_tag(name:"cvss_base", value:"9.3");
  script_tag(name:"risk_factor", value:"Critical");
  script_name("SuSE Security Advisory SUSE-SA:2009:048 (MozillaFirefox)");
 
@@ -59,7 +59,7 @@
 
 https://secure1.securityspace.com/smysecure/catid.html?in=SUSE-SA:2009:048
 
-Risk factor : High";
+Risk factor : Critical";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/suse_sa_2009_049.nasl
===================================================================
--- trunk/openvas-plugins/scripts/suse_sa_2009_049.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/suse_sa_2009_049.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -30,8 +30,8 @@
  script_id(66105);
  script_cve_id("CVE-2007-0045", "CVE-2007-0048", "CVE-2009-2564", "CVE-2009-2979", "CVE-2009-2980", "CVE-2009-2981", "CVE-2009-2982", "CVE-2009-2983", "CVE-2009-2985", "CVE-2009-2986", "CVE-2009-2988", "CVE-2009-2990", "CVE-2009-2991", "CVE-2009-2992", "CVE-2009-2993", "CVE-2009-2994", "CVE-2009-2996", "CVE-2009-2997", "CVE-2009-2998", "CVE-2009-3431", "CVE-2009-3458", "CVE-2009-3459", "CVE-2009-3462");
  script_version ("$Revision$");
- script_tag(name:"cvss_base", value:"9.3");
- script_tag(name:"risk_factor", value:"Critical");
+ script_tag(name:"cvss_base", value:"4.3");
+ script_tag(name:"risk_factor", value:"Medium");
  script_name("SuSE Security Advisory SUSE-SA:2009:049 (acroread, acroread_ja)");
 
  desc = "The remote host is missing updates announced in
@@ -48,7 +48,7 @@
 
 https://secure1.securityspace.com/smysecure/catid.html?in=SUSE-SA:2009:049
 
-Risk factor : High";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/suse_sa_2009_050.nasl
===================================================================
--- trunk/openvas-plugins/scripts/suse_sa_2009_050.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/suse_sa_2009_050.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -30,8 +30,8 @@
  script_id(66106);
  script_cve_id("CVE-2009-1195", "CVE-2009-1890", "CVE-2009-1891", "CVE-2009-2412", "CVE-2009-3094", "CVE-2009-3095");
  script_version ("$Revision$");
- script_tag(name:"cvss_base", value:"10.0");
- script_tag(name:"risk_factor", value:"Critical");
+ script_tag(name:"cvss_base", value:"4.9");
+ script_tag(name:"risk_factor", value:"Medium");
  script_name("SuSE Security Advisory SUSE-SA:2009:050 (apache2,libapr1)");
 
  desc = "The remote host is missing updates announced in
@@ -60,7 +60,7 @@
 
 https://secure1.securityspace.com/smysecure/catid.html?in=SUSE-SA:2009:050
 
-Risk factor : High";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/suse_sa_2009_057.nasl
===================================================================
--- trunk/openvas-plugins/scripts/suse_sa_2009_057.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/suse_sa_2009_057.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -30,7 +30,7 @@
  script_id(66302);
  script_cve_id("CVE-2009-3555");
  script_version ("$Revision$");
- script_tag(name:"cvss_base", value:"6.4");
+ script_tag(name:"cvss_base", value:"5.8");
  script_tag(name:"risk_factor", value:"High");
  script_name("SuSE Security Advisory SUSE-SA:2009:057 (openssl)");
 

Modified: trunk/openvas-plugins/scripts/suse_sa_2009_058.nasl
===================================================================
--- trunk/openvas-plugins/scripts/suse_sa_2009_058.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/suse_sa_2009_058.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -30,8 +30,8 @@
  script_id(66303);
  script_cve_id("CVE-2009-3864", "CVE-2009-3865", "CVE-2009-3866", "CVE-2009-3867", "CVE-2009-3868", "CVE-2009-3869", "CVE-2009-3871", "CVE-2009-3872", "CVE-2009-3873", "CVE-2009-3874", "CVE-2009-3875", "CVE-2009-3876", "CVE-2009-3877");
  script_version ("$Revision$");
- script_tag(name:"cvss_base", value:"9.3");
- script_tag(name:"risk_factor", value:"Critical");
+ script_tag(name:"cvss_base", value:"7.5");
+ script_tag(name:"risk_factor", value:"High");
  script_name("SuSE Security Advisory SUSE-SA:2009:058 (java-1_6_0-sun)");
 
  desc = "The remote host is missing updates announced in

Modified: trunk/openvas-plugins/scripts/suse_sa_2009_059.nasl
===================================================================
--- trunk/openvas-plugins/scripts/suse_sa_2009_059.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/suse_sa_2009_059.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -30,7 +30,7 @@
  script_id(66459);
  script_cve_id("CVE-2009-4022");
  script_version ("$Revision$");
- script_tag(name:"cvss_base", value:"4.0");
+ script_tag(name:"cvss_base", value:"2.6");
  script_tag(name:"risk_factor", value:"Medium");
  script_name("SuSE Security Advisory SUSE-SA:2009:059 (bind)");
 
@@ -61,7 +61,7 @@
 
 https://secure1.securityspace.com/smysecure/catid.html?in=SUSE-SA:2009:059
 
-Risk factor : High";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/suse_sa_2009_060.nasl
===================================================================
--- trunk/openvas-plugins/scripts/suse_sa_2009_060.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/suse_sa_2009_060.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -30,8 +30,8 @@
  script_id(66460);
  script_cve_id("CVE-2005-4881", "CVE-2009-2903", "CVE-2009-2910", "CVE-2009-3286", "CVE-2009-3547", "CVE-2009-3612", "CVE-2009-3620", "CVE-2009-3621", "CVE-2009-3726");
  script_version ("$Revision$");
- script_tag(name:"cvss_base", value:"7.8");
- script_tag(name:"risk_factor", value:"High");
+ script_tag(name:"cvss_base", value:"4.9");
+ script_tag(name:"risk_factor", value:"Medium");
  script_name("SuSE Security Advisory SUSE-SA:2009:060 (kernel)");
 
  desc = "The remote host is missing updates announced in
@@ -50,7 +50,7 @@
 
 https://secure1.securityspace.com/smysecure/catid.html?in=SUSE-SA:2009:060
 
-Risk factor : High";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/suse_sr_2009_001.nasl
===================================================================
--- trunk/openvas-plugins/scripts/suse_sr_2009_001.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/suse_sr_2009_001.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -30,8 +30,8 @@
  script_id(63186);
  script_cve_id("CVE-2008-2380", "CVE-2008-3933", "CVE-2008-3934", "CVE-2008-3963", "CVE-2008-4097", "CVE-2008-4098", "CVE-2008-4225", "CVE-2008-4314", "CVE-2008-4552", "CVE-2008-4575", "CVE-2008-4639", "CVE-2008-4640", "CVE-2008-4641", "CVE-2008-4680", "CVE-2008-4681", "CVE-2008-4682", "CVE-2008-4683", "CVE-2008-4684", "CVE-2008-4685", "CVE-2008-4864", "CVE-2008-5006", "CVE-2008-5031", "CVE-2008-5285", "CVE-2008-5514", "CVE-2008-5517", "CVE-2008-5617", "CVE-2008-5618", "CVE-2009-0022", "CVE-2008-5660");
  script_version ("$");
- script_tag(name:"cvss_base", value:"10.0");
- script_tag(name:"risk_factor", value:"Critical");
+ script_tag(name:"cvss_base", value:"5.1");
+ script_tag(name:"risk_factor", value:"High");
  name = "SuSE Security Summary SUSE-SR:2009:001 (OpenSuSE 11.1)";
  script_name(name);
 

Modified: trunk/openvas-plugins/scripts/suse_sr_2009_001a.nasl
===================================================================
--- trunk/openvas-plugins/scripts/suse_sr_2009_001a.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/suse_sr_2009_001a.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -30,8 +30,8 @@
  script_id(63187);
  script_cve_id("CVE-2008-2380", "CVE-2008-3933", "CVE-2008-3934", "CVE-2008-3963", "CVE-2008-4097", "CVE-2008-4098", "CVE-2008-4225", "CVE-2008-4314", "CVE-2008-4552", "CVE-2008-4575", "CVE-2008-4639", "CVE-2008-4640", "CVE-2008-4641", "CVE-2008-4680", "CVE-2008-4681", "CVE-2008-4682", "CVE-2008-4683", "CVE-2008-4684", "CVE-2008-4685", "CVE-2008-4864", "CVE-2008-5006", "CVE-2008-5031", "CVE-2008-5285", "CVE-2008-5514", "CVE-2008-5517", "CVE-2008-5617", "CVE-2008-5618", "CVE-2009-0022", "CVE-2008-5660");
  script_version ("$");
- script_tag(name:"cvss_base", value:"10.0");
- script_tag(name:"risk_factor", value:"Critical");
+ script_tag(name:"cvss_base", value:"5.1");
+ script_tag(name:"risk_factor", value:"High");
  name = "SuSE Security Summary SUSE-SR:2009:001 (OpenSuSE 11.0)";
  script_name(name);
 

Modified: trunk/openvas-plugins/scripts/suse_sr_2009_001b.nasl
===================================================================
--- trunk/openvas-plugins/scripts/suse_sr_2009_001b.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/suse_sr_2009_001b.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -30,8 +30,8 @@
  script_id(63188);
  script_cve_id("CVE-2008-2380", "CVE-2008-3933", "CVE-2008-3934", "CVE-2008-3963", "CVE-2008-4097", "CVE-2008-4098", "CVE-2008-4225", "CVE-2008-4314", "CVE-2008-4552", "CVE-2008-4575", "CVE-2008-4639", "CVE-2008-4640", "CVE-2008-4641", "CVE-2008-4680", "CVE-2008-4681", "CVE-2008-4682", "CVE-2008-4683", "CVE-2008-4684", "CVE-2008-4685", "CVE-2008-4864", "CVE-2008-5006", "CVE-2008-5031", "CVE-2008-5285", "CVE-2008-5514", "CVE-2008-5517", "CVE-2008-5617", "CVE-2008-5618", "CVE-2009-0022", "CVE-2008-5660");
  script_version ("$");
- script_tag(name:"cvss_base", value:"10.0");
- script_tag(name:"risk_factor", value:"Critical");
+ script_tag(name:"cvss_base", value:"5.1");
+ script_tag(name:"risk_factor", value:"High");
  name = "SuSE Security Summary SUSE-SR:2009:001 (OpenSuSE 10.3)";
  script_name(name);
 

Modified: trunk/openvas-plugins/scripts/suse_sr_2009_002.nasl
===================================================================
--- trunk/openvas-plugins/scripts/suse_sr_2009_002.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/suse_sr_2009_002.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -30,8 +30,8 @@
  script_id(63247);
  script_cve_id("CVE-2006-7234", "CVE-2007-1320", "CVE-2007-5729", "CVE-2008-2382", "CVE-2008-2383", "CVE-2008-3641", "CVE-2008-4690", "CVE-2008-4865", "CVE-2008-5187", "CVE-2008-5286", "CVE-2008-5714");
  script_version ("$");
- script_tag(name:"cvss_base", value:"10.0");
- script_tag(name:"risk_factor", value:"Critical");
+ script_tag(name:"cvss_base", value:"4.6");
+ script_tag(name:"risk_factor", value:"Medium");
  name = "SuSE Security Summary SUSE-SR:2009:002";
  script_name(name);
 
@@ -46,7 +46,7 @@
 
 Update all out of date packages.
 
-Risk factor : High";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/suse_sr_2009_003.nasl
===================================================================
--- trunk/openvas-plugins/scripts/suse_sr_2009_003.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/suse_sr_2009_003.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -30,8 +30,8 @@
  script_id(63304);
  script_cve_id("CVE-2008-1149", "CVE-2008-1567", "CVE-2008-1924", "CVE-2008-2383", "CVE-2008-2960", "CVE-2008-3197", "CVE-2008-4096", "CVE-2008-4309", "CVE-2008-4326", "CVE-2008-5081", "CVE-2008-5432", "CVE-2008-5621", "CVE-2008-5622", "CVE-2008-5824", "CVE-2008-5902", "CVE-2008-5903", "CVE-2008-5904", "CVE-2008-5907", "CVE-2009-0125", "CVE-2009-0126", "CVE-2009-0135", "CVE-2009-0136", "CVE-2009-0034");
  script_version ("$");
- script_tag(name:"cvss_base", value:"9.3");
- script_tag(name:"risk_factor", value:"Critical");
+ script_tag(name:"cvss_base", value:"5.1");
+ script_tag(name:"risk_factor", value:"High");
  name = "SuSE Security Summary SUSE-SR:2009:003";
  script_name(name);
 

Modified: trunk/openvas-plugins/scripts/suse_sr_2009_004.nasl
===================================================================
--- trunk/openvas-plugins/scripts/suse_sr_2009_004.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/suse_sr_2009_004.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -30,8 +30,8 @@
  script_id(63412);
  script_cve_id("CVE-2006-3835", "CVE-2007-0184", "CVE-2007-0185", "CVE-2007-2377", "CVE-2007-2449", "CVE-2007-2450", "CVE-2007-3382", "CVE-2007-3385", "CVE-2007-3386", "CVE-2007-5333", "CVE-2007-5342", "CVE-2007-5461", "CVE-2007-5613", "CVE-2007-5615", "CVE-2007-6286", "CVE-2008-0002", "CVE-2008-1232", "CVE-2008-1586", "CVE-2008-1947", "CVE-2008-2235", "CVE-2008-2370", "CVE-2008-2938", "CVE-2008-3231", "CVE-2008-3651", "CVE-2008-3652", "CVE-2008-3663", "CVE-2008-3796", "CVE-2008-4577", "CVE-2008-5086", "CVE-2008-5233", "CVE-2008-5234", "CVE-2008-5235", "CVE-2008-5236", "CVE-2008-5237", "CVE-2008-5238", "CVE-2008-5239", "CVE-2008-5240", "CVE-2008-5241", "CVE-2008-5242", "CVE-2008-5243", "CVE-2008-5244", "CVE-2008-5245", "CVE-2008-5246", "CVE-2008-5247", "CVE-2008-5248", "CVE-2008-5250", "CVE-2008-5252", "CVE-2008-5256", "CVE-2008-5302", "CVE-2008-5557", "CVE-2008-5587", "CVE-2008-5658", "CVE-2008-5718", "CVE-2009-0030", "CVE-2009-0310", "CVE-2009-0313", "CVE-2009-0416", "CVE-2009-0490");
  script_version ("$");
- script_tag(name:"cvss_base", value:"10.0");
- script_tag(name:"risk_factor", value:"Critical");
+ script_tag(name:"cvss_base", value:"5.0");
+ script_tag(name:"risk_factor", value:"Medium");
  name = "SuSE Security Summary SUSE-SR:2009:004";
  script_name(name);
 
@@ -46,7 +46,7 @@
 
 Update all out of date packages.
 
-Risk factor : High";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/suse_sr_2009_006.nasl
===================================================================
--- trunk/openvas-plugins/scripts/suse_sr_2009_006.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/suse_sr_2009_006.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -30,8 +30,8 @@
  script_id(63535);
  script_cve_id("CVE-2007-6720", "CVE-2008-2364", "CVE-2008-5101", "CVE-2008-5347", "CVE-2008-5348", "CVE-2008-5349", "CVE-2008-5350", "CVE-2008-5351", "CVE-2008-5352", "CVE-2008-5353", "CVE-2008-5354", "CVE-2008-5356", "CVE-2008-5357", "CVE-2008-5358", "CVE-2008-5359", "CVE-2008-5360", "CVE-2008-6393", "CVE-2009-0037", "CVE-2009-0179", "CVE-2009-0749", "CVE-2009-0848");
  script_version ("$");
- script_tag(name:"cvss_base", value:"10.0");
- script_tag(name:"risk_factor", value:"Critical");
+ script_tag(name:"cvss_base", value:"4.3");
+ script_tag(name:"risk_factor", value:"Medium");
  name = "SuSE Security Summary SUSE-SR:2009:006";
  script_name(name);
 
@@ -46,7 +46,7 @@
 
 Update all out of date packages.
 
-Risk factor : High";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/suse_sr_2009_007.nasl
===================================================================
--- trunk/openvas-plugins/scripts/suse_sr_2009_007.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/suse_sr_2009_007.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -30,8 +30,8 @@
  script_id(63687);
  script_cve_id("CVE-2007-6018", "CVE-2008-2364", "CVE-2008-2712", "CVE-2008-3074", "CVE-2008-3075", "CVE-2008-3076", "CVE-2008-4677", "CVE-2008-5917", "CVE-2008-6235", "CVE-2009-0115", "CVE-2009-0499", "CVE-2009-0500", "CVE-2009-0501", "CVE-2009-0502", "CVE-2009-0581", "CVE-2009-0583", "CVE-2009-0584", "CVE-2009-0723", "CVE-2009-0733", "CVE-2009-0914", "CVE-2009-0915", "CVE-2009-0916", "CVE-2009-0930", "CVE-2009-0932");
  script_version ("$");
- script_tag(name:"cvss_base", value:"10.0");
- script_tag(name:"risk_factor", value:"Critical");
+ script_tag(name:"cvss_base", value:"5.8");
+ script_tag(name:"risk_factor", value:"High");
  name = "SuSE Security Summary SUSE-SR:2009:007";
  script_name(name);
 

Modified: trunk/openvas-plugins/scripts/suse_sr_2009_008.nasl
===================================================================
--- trunk/openvas-plugins/scripts/suse_sr_2009_008.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/suse_sr_2009_008.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -30,8 +30,8 @@
  script_id(63736);
  script_cve_id("CVE-2008-0928", "CVE-2008-1945", "CVE-2008-2025", "CVE-2008-2382", "CVE-2008-4311", "CVE-2008-4539", "CVE-2008-5498", "CVE-2008-5557", "CVE-2008-5714", "CVE-2009-0021", "CVE-2009-0115", "CVE-2009-0186", "CVE-2009-0754", "CVE-2009-1148", "CVE-2009-1149", "CVE-2009-1150", "CVE-2009-1151");
  script_version ("$");
- script_tag(name:"cvss_base", value:"10.0");
- script_tag(name:"risk_factor", value:"Critical");
+ script_tag(name:"cvss_base", value:"4.7");
+ script_tag(name:"risk_factor", value:"Medium");
  name = "SuSE Security Summary SUSE-SR:2009:008";
  script_name(name);
 
@@ -46,7 +46,7 @@
 
 Update all out of date packages.
 
-Risk factor : High";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/suse_sr_2009_009.nasl
===================================================================
--- trunk/openvas-plugins/scripts/suse_sr_2009_009.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/suse_sr_2009_009.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -30,8 +30,8 @@
  script_id(63891);
  script_cve_id("CVE-2008-4311", "CVE-2008-4989", "CVE-2009-0193", "CVE-2009-0196", "CVE-2009-0365", "CVE-2009-0578", "CVE-2009-0586", "CVE-2009-0658", "CVE-2009-0698", "CVE-2009-0790", "CVE-2009-0792", "CVE-2009-0922", "CVE-2009-0927", "CVE-2009-0928", "CVE-2009-1061", "CVE-2009-1062", "CVE-2009-1171", "CVE-2009-1241");
  script_version ("$");
- script_tag(name:"cvss_base", value:"10.0");
- script_tag(name:"risk_factor", value:"Critical");
+ script_tag(name:"cvss_base", value:"4.6");
+ script_tag(name:"risk_factor", value:"Medium");
  name = "SuSE Security Summary SUSE-SR:2009:009";
  script_name(name);
 
@@ -46,7 +46,7 @@
 
 Update all out of date packages.
 
-Risk factor : High";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/suse_sr_2009_010.nasl
===================================================================
--- trunk/openvas-plugins/scripts/suse_sr_2009_010.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/suse_sr_2009_010.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -30,7 +30,7 @@
  script_id(63996);
  script_cve_id("CVE-2008-2086", "CVE-2008-3104", "CVE-2008-3112", "CVE-2008-3113", "CVE-2008-3114", "CVE-2008-5339", "CVE-2008-5340", "CVE-2008-5342", "CVE-2008-5343", "CVE-2008-5344", "CVE-2008-5345", "CVE-2008-5346", "CVE-2008-5348", "CVE-2008-5350", "CVE-2008-5351", "CVE-2008-5353", "CVE-2008-5354", "CVE-2008-5356", "CVE-2008-5357", "CVE-2008-5359", "CVE-2008-5360", "CVE-2009-0146", "CVE-2009-0147", "CVE-2009-0165", "CVE-2009-0166", "CVE-2009-0368", "CVE-2009-0544", "CVE-2009-0582", "CVE-2009-0585", "CVE-2009-0590", "CVE-2009-0591", "CVE-2009-0652", "CVE-2009-0789", "CVE-2009-0799", "CVE-2009-0800", "CVE-2009-0946", "CVE-2009-1086", "CVE-2009-1179", "CVE-2009-1180", "CVE-2009-1181", "CVE-2009-1182", "CVE-2009-1183", "CVE-2009-1295", "CVE-2009-1302", "CVE-2009-1303", "CVE-2009-1304", "CVE-2009-1305", "CVE-2009-1306", "CVE-2009-1307", "CVE-2009-1308", "CVE-2009-1309", "CVE-2009-1310", "CVE-2009-1311", "CVE-2009-1312");
  script_version ("$");
- script_tag(name:"cvss_base", value:"10.0");
+ script_tag(name:"cvss_base", value:"9.3");
  script_tag(name:"risk_factor", value:"Critical");
  name = "SuSE Security Summary SUSE-SR:2009:010";
  script_name(name);
@@ -46,7 +46,7 @@
 
 Update all out of date packages.
 
-Risk factor : High";
+Risk factor : Critical";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/suse_sr_2009_011.nasl
===================================================================
--- trunk/openvas-plugins/scripts/suse_sr_2009_011.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/suse_sr_2009_011.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -30,7 +30,7 @@
  script_id(64196);
  script_cve_id("CVE-2007-5400", "CVE-2007-6725", "CVE-2008-6123", "CVE-2008-6679", "CVE-2009-0159", "CVE-2009-0196", "CVE-2009-0241", "CVE-2009-0688", "CVE-2009-0792", "CVE-2009-1093", "CVE-2009-1094", "CVE-2009-1095", "CVE-2009-1096", "CVE-2009-1098", "CVE-2009-1099", "CVE-2009-1100", "CVE-2009-1103", "CVE-2009-1104", "CVE-2009-1107", "CVE-2009-1210", "CVE-2009-1252", "CVE-2009-1266", "CVE-2009-1267", "CVE-2009-1268", "CVE-2009-1269", "CVE-2009-1274", "CVE-2009-1364", "CVE-2009-1377", "CVE-2009-1378", "CVE-2009-1379", "CVE-2009-1492", "CVE-2009-1493");
  script_version ("$");
- script_tag(name:"cvss_base", value:"10.0");
+ script_tag(name:"cvss_base", value:"9.3");
  script_tag(name:"risk_factor", value:"Critical");
  name = "SuSE Security Summary SUSE-SR:2009:011";
  script_name(name);
@@ -46,7 +46,7 @@
 
 Update all out of date packages.
 
-Risk factor : High";
+Risk factor : Critical";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/suse_sr_2009_012.nasl
===================================================================
--- trunk/openvas-plugins/scripts/suse_sr_2009_012.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/suse_sr_2009_012.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -30,8 +30,8 @@
  script_id(64360);
  script_cve_id("CVE-2008-5515", "CVE-2008-6123", "CVE-2009-0033", "CVE-2009-0146", "CVE-2009-0147", "CVE-2009-0165", "CVE-2009-0166", "CVE-2009-0198", "CVE-2009-0509", "CVE-2009-0510", "CVE-2009-0511", "CVE-2009-0512", "CVE-2009-0580", "CVE-2009-0663", "CVE-2009-0749", "CVE-2009-0755", "CVE-2009-0756", "CVE-2009-0781", "CVE-2009-0783", "CVE-2009-0791", "CVE-2009-0799", "CVE-2009-0800", "CVE-2009-0949", "CVE-2009-1179", "CVE-2009-1180", "CVE-2009-1181", "CVE-2009-1182", "CVE-2009-1183", "CVE-2009-1194", "CVE-2009-1271", "CVE-2009-1272", "CVE-2009-1341", "CVE-2009-1386", "CVE-2009-1387", "CVE-2009-1391", "CVE-2009-1438", "CVE-2009-1572", "CVE-2009-1574", "CVE-2009-1632", "CVE-2009-1648", "CVE-2009-1855", "CVE-2009-1856", "CVE-2009-1857", "CVE-2009-1858", "CVE-2009-1859", "CVE-2009-1861", "CVE-2009-1882", "CVE-2009-1957", "CVE-2009-1958", "CVE-2009-1959");
  script_version ("$");
- script_tag(name:"cvss_base", value:"10.0");
- script_tag(name:"risk_factor", value:"Critical");
+ script_tag(name:"cvss_base", value:"5.0");
+ script_tag(name:"risk_factor", value:"Medium");
  name = "SuSE Security Summary SUSE-SR:2009:012";
  script_name(name);
 
@@ -46,7 +46,7 @@
 
 Update all out of date packages.
 
-Risk factor : High";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/suse_sr_2009_013.nasl
===================================================================
--- trunk/openvas-plugins/scripts/suse_sr_2009_013.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/suse_sr_2009_013.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -30,7 +30,7 @@
  script_id(64643);
  script_cve_id("CVE-2008-5518", "CVE-2009-0023", "CVE-2009-0038", "CVE-2009-0039", "CVE-2009-0781", "CVE-2009-1255", "CVE-2009-1373", "CVE-2009-1375", "CVE-2009-1376", "CVE-2009-1494", "CVE-2009-1788", "CVE-2009-1791", "CVE-2009-1889", "CVE-2009-1955", "CVE-2009-1956", "CVE-2009-2185", "CVE-2009-2285", "CVE-2009-2288", "CVE-2009-2415", "CVE-2009-2416");
  script_version ("$Revision$");
- script_tag(name:"cvss_base", value:"10.0");
+ script_tag(name:"cvss_base", value:"9.4");
  script_tag(name:"risk_factor", value:"Critical");
  script_name("SuSE Security Summary SUSE-SR:2009:013");
 
@@ -45,7 +45,7 @@
 
 Update all out of date packages.
 
-Risk factor : High";
+Risk factor : Critical";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/suse_sr_2009_014.nasl
===================================================================
--- trunk/openvas-plugins/scripts/suse_sr_2009_014.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/suse_sr_2009_014.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -30,8 +30,8 @@
  script_id(64823);
  script_cve_id("CVE-2008-4456", "CVE-2009-0153", "CVE-2009-0198", "CVE-2009-0509", "CVE-2009-0510", "CVE-2009-0511", "CVE-2009-0512", "CVE-2009-0791", "CVE-2009-1381", "CVE-2009-1720", "CVE-2009-1721", "CVE-2009-1855", "CVE-2009-1856", "CVE-2009-1857", "CVE-2009-1858", "CVE-2009-1859", "CVE-2009-1861", "CVE-2009-1885", "CVE-2009-2347", "CVE-2009-2417", "CVE-2009-2446", "CVE-2009-2562", "CVE-2009-2625", "CVE-2009-2688", "CVE-2009-2957", "CVE-2009-2958");
  script_version ("$");
- script_tag(name:"cvss_base", value:"10.0");
- script_tag(name:"risk_factor", value:"Critical");
+ script_tag(name:"cvss_base", value:"2.6");
+ script_tag(name:"risk_factor", value:"Medium");
  script_name("SuSE Security Summary SUSE-SR:2009:014");
 
  desc = "The remote host is missing updates announced in
@@ -45,7 +45,7 @@
 
 Update all out of date packages.
 
-Risk factor : High";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/suse_sr_2009_015.nasl
===================================================================
--- trunk/openvas-plugins/scripts/suse_sr_2009_015.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/suse_sr_2009_015.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -30,8 +30,8 @@
  script_id(64923);
  script_cve_id("CVE-2008-4405", "CVE-2009-0200", "CVE-2009-0201", "CVE-2009-1234", "CVE-2009-2059", "CVE-2009-2063", "CVE-2009-2067", "CVE-2009-2070", "CVE-2009-2406", "CVE-2009-2407", "CVE-2009-2414", "CVE-2009-2416", "CVE-2009-2692", "CVE-2009-2707", "CVE-2009-2730", "CVE-2009-3024");
  script_version ("$");
- script_tag(name:"cvss_base", value:"9.3");
- script_tag(name:"risk_factor", value:"Critical");
+ script_tag(name:"cvss_base", value:"7.2");
+ script_tag(name:"risk_factor", value:"High");
  script_name("SuSE Security Summary SUSE-SR:2009:015");
 
  desc = "The remote host is missing updates announced in

Modified: trunk/openvas-plugins/scripts/suse_sr_2009_016.nasl
===================================================================
--- trunk/openvas-plugins/scripts/suse_sr_2009_016.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/suse_sr_2009_016.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -30,8 +30,8 @@
  script_id(66059);
  script_cve_id("CVE-2008-5349", "CVE-2008-7159", "CVE-2008-7160", "CVE-2009-1297", "CVE-2009-2408", "CVE-2009-2475", "CVE-2009-2476", "CVE-2009-2625", "CVE-2009-2632", "CVE-2009-2661", "CVE-2009-2670", "CVE-2009-2671", "CVE-2009-2672", "CVE-2009-2673", "CVE-2009-2674", "CVE-2009-2675", "CVE-2009-2689", "CVE-2009-2690", "CVE-2009-3051", "CVE-2009-3111", "CVE-2009-3229", "CVE-2009-3230", "CVE-2009-3231", "CVE-2009-3235", "CVE-2009-3241");
  script_version ("$Revision$");
- script_tag(name:"cvss_base", value:"10.0");
- script_tag(name:"risk_factor", value:"Critical");
+ script_tag(name:"cvss_base", value:"7.1");
+ script_tag(name:"risk_factor", value:"High");
  script_name("SuSE Security Summary SUSE-SR:2009:016");
 
  desc = "The remote host is missing updates announced in

Modified: trunk/openvas-plugins/scripts/suse_sr_2009_017.nasl
===================================================================
--- trunk/openvas-plugins/scripts/suse_sr_2009_017.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/suse_sr_2009_017.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -30,7 +30,7 @@
  script_id(66107);
  script_cve_id("CVE-2008-5349", "CVE-2009-2625", "CVE-2009-2687", "CVE-2009-2813", "CVE-2009-2905", "CVE-2009-2906", "CVE-2009-2948", "CVE-2009-3009", "CVE-2009-3086", "CVE-2009-3229", "CVE-2009-3230", "CVE-2009-3231", "CVE-2009-3291", "CVE-2009-3292", "CVE-2009-3293", "CVE-2009-3618", "CVE-2009-3619", "CVE-2009-3696", "CVE-2009-3697");
  script_version ("$Revision$");
- script_tag(name:"cvss_base", value:"7.5");
+ script_tag(name:"cvss_base", value:"7.1");
  script_tag(name:"risk_factor", value:"High");
  script_name("SuSE Security Summary SUSE-SR:2009:017");
 

Modified: trunk/openvas-plugins/scripts/suse_sr_2009_018.nasl
===================================================================
--- trunk/openvas-plugins/scripts/suse_sr_2009_018.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/suse_sr_2009_018.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -30,8 +30,8 @@
  script_id(66215);
  script_cve_id("CVE-2008-5519", "CVE-2009-1563", "CVE-2009-2408", "CVE-2009-2473", "CVE-2009-2661", "CVE-2009-3111", "CVE-2009-3235", "CVE-2009-3603", "CVE-2009-3604", "CVE-2009-3605", "CVE-2009-3606", "CVE-2009-3608", "CVE-2009-3609", "CVE-2009-3720");
  script_version ("$Revision$");
- script_tag(name:"cvss_base", value:"9.3");
- script_tag(name:"risk_factor", value:"Critical");
+ script_tag(name:"cvss_base", value:"2.6");
+ script_tag(name:"risk_factor", value:"Medium");
  script_name("SuSE Security Summary SUSE-SR:2009:018");
 
  desc = "The remote host is missing updates announced in
@@ -45,7 +45,7 @@
 
 Update all out of date packages.
 
-Risk factor : High";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/sympa_new_list_xss.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sympa_new_list_xss.nasl	2011-09-05 16:46:51 UTC (rev 11559)
+++ trunk/openvas-plugins/scripts/sympa_new_list_xss.nasl	2011-09-05 17:14:52 UTC (rev 11560)
@@ -26,7 +26,7 @@
 {
  script_id(80090);;
  script_version ("$Revision: 1.12 $"); 
- script_tag(name:"cvss_base", value:"3.5");
+ script_tag(name:"cvss_base", value:"4.3");
  script_tag(name:"risk_factor", value:"Medium");
 
  script_cve_id("CVE-2004-1735");



More information about the Openvas-commits mailing list