[Openvas-commits] r11570 - in trunk/openvas-plugins: . scripts

scm-commit@wald.intevation.org scm-commit at wald.intevation.org
Tue Sep 6 14:09:15 CEST 2011


Author: reinke
Date: 2011-09-06 14:05:16 +0200 (Tue, 06 Sep 2011)
New Revision: 11570

Modified:
   trunk/openvas-plugins/ChangeLog
   trunk/openvas-plugins/scripts/12planet_chat_server_xss.nasl
   trunk/openvas-plugins/scripts/4images_171_directory_traversal.nasl
   trunk/openvas-plugins/scripts/CA_License_Service_Stack_Overflow.nasl
   trunk/openvas-plugins/scripts/DDI_PIX_Firewall_Manager.nasl
   trunk/openvas-plugins/scripts/FormMail_34929.nasl
   trunk/openvas-plugins/scripts/RHSA_2008_0787.nasl
   trunk/openvas-plugins/scripts/RHSA_2009_0001.nasl
   trunk/openvas-plugins/scripts/RHSA_2009_0009.nasl
   trunk/openvas-plugins/scripts/RHSA_2009_0010.nasl
   trunk/openvas-plugins/scripts/RHSA_2009_0012.nasl
   trunk/openvas-plugins/scripts/RHSA_2009_0014.nasl
   trunk/openvas-plugins/scripts/RHSA_2009_0015.nasl
   trunk/openvas-plugins/scripts/RHSA_2009_0016.nasl
   trunk/openvas-plugins/scripts/RHSA_2009_0021.nasl
   trunk/openvas-plugins/scripts/RHSA_2009_0053.nasl
   trunk/openvas-plugins/scripts/RHSA_2009_0225.nasl
   trunk/openvas-plugins/scripts/RHSA_2009_0264.nasl
   trunk/openvas-plugins/scripts/RHSA_2009_0313.nasl
   trunk/openvas-plugins/scripts/RHSA_2009_0315.nasl
   trunk/openvas-plugins/scripts/RHSA_2009_0325.nasl
   trunk/openvas-plugins/scripts/RHSA_2009_0326.nasl
   trunk/openvas-plugins/scripts/RHSA_2009_0329.nasl
   trunk/openvas-plugins/scripts/RHSA_2009_0331.nasl
   trunk/openvas-plugins/scripts/RHSA_2009_0337.nasl
   trunk/openvas-plugins/scripts/RHSA_2009_0338.nasl
   trunk/openvas-plugins/scripts/RHSA_2009_0339.nasl
   trunk/openvas-plugins/scripts/RHSA_2009_0350.nasl
   trunk/openvas-plugins/scripts/RHSA_2009_0354.nasl
   trunk/openvas-plugins/scripts/RHSA_2009_0355.nasl
   trunk/openvas-plugins/scripts/RHSA_2009_0358.nasl
   trunk/openvas-plugins/scripts/RHSA_2009_0361.nasl
   trunk/openvas-plugins/scripts/RHSA_2009_0377.nasl
   trunk/openvas-plugins/scripts/RHSA_2009_0392.nasl
   trunk/openvas-plugins/scripts/RHSA_2009_0394.nasl
   trunk/openvas-plugins/scripts/RHSA_2009_0402.nasl
   trunk/openvas-plugins/scripts/RHSA_2009_0408.nasl
   trunk/openvas-plugins/scripts/RHSA_2009_0411.nasl
   trunk/openvas-plugins/scripts/RHSA_2009_0420.nasl
   trunk/openvas-plugins/scripts/RHSA_2009_0421.nasl
   trunk/openvas-plugins/scripts/RHSA_2009_0429.nasl
   trunk/openvas-plugins/scripts/RHSA_2009_0430.nasl
   trunk/openvas-plugins/scripts/RHSA_2009_0431.nasl
   trunk/openvas-plugins/scripts/RHSA_2009_0436.nasl
   trunk/openvas-plugins/scripts/RHSA_2009_0437.nasl
   trunk/openvas-plugins/scripts/RHSA_2009_0444.nasl
   trunk/openvas-plugins/scripts/RHSA_2009_0445.nasl
   trunk/openvas-plugins/scripts/RHSA_2009_0451.nasl
   trunk/openvas-plugins/scripts/RHSA_2009_0458.nasl
   trunk/openvas-plugins/scripts/RHSA_2009_0459.nasl
   trunk/openvas-plugins/scripts/RHSA_2009_0473.nasl
   trunk/openvas-plugins/scripts/RHSA_2009_0480.nasl
   trunk/openvas-plugins/scripts/RHSA_2009_1038.nasl
   trunk/openvas-plugins/scripts/RHSA_2009_1059.nasl
   trunk/openvas-plugins/scripts/RHSA_2009_1060.nasl
   trunk/openvas-plugins/scripts/RHSA_2009_1062.nasl
   trunk/openvas-plugins/scripts/RHSA_2009_1066.nasl
   trunk/openvas-plugins/scripts/RHSA_2009_1067.nasl
   trunk/openvas-plugins/scripts/RHSA_2009_1081.nasl
   trunk/openvas-plugins/scripts/RHSA_2009_1101.nasl
   trunk/openvas-plugins/scripts/RHSA_2009_1102.nasl
   trunk/openvas-plugins/scripts/RHSA_2009_1106.nasl
   trunk/openvas-plugins/scripts/RHSA_2009_1107.nasl
   trunk/openvas-plugins/scripts/RHSA_2009_1108.nasl
   trunk/openvas-plugins/scripts/RHSA_2009_1109.nasl
   trunk/openvas-plugins/scripts/RHSA_2009_1125.nasl
   trunk/openvas-plugins/scripts/RHSA_2009_1126.nasl
   trunk/openvas-plugins/scripts/RHSA_2009_1132.nasl
   trunk/openvas-plugins/scripts/RHSA_2009_1140.nasl
   trunk/openvas-plugins/scripts/RHSA_2009_1148.nasl
   trunk/openvas-plugins/scripts/RHSA_2009_1156.nasl
   trunk/openvas-plugins/scripts/RHSA_2009_1159.nasl
   trunk/openvas-plugins/scripts/RHSA_2009_1176.nasl
   trunk/openvas-plugins/scripts/RHSA_2009_1177.nasl
   trunk/openvas-plugins/scripts/RHSA_2009_1178.nasl
   trunk/openvas-plugins/scripts/RHSA_2009_1193.nasl
   trunk/openvas-plugins/scripts/RHSA_2009_1198.nasl
   trunk/openvas-plugins/scripts/RHSA_2009_1199.nasl
   trunk/openvas-plugins/scripts/RHSA_2009_1200.nasl
   trunk/openvas-plugins/scripts/RHSA_2009_1201.nasl
   trunk/openvas-plugins/scripts/RHSA_2009_1205.nasl
   trunk/openvas-plugins/scripts/RHSA_2009_1236.nasl
   trunk/openvas-plugins/scripts/RHSA_2009_1289.nasl
   trunk/openvas-plugins/scripts/RHSA_2009_1341.nasl
   trunk/openvas-plugins/scripts/RHSA_2009_1427.nasl
   trunk/openvas-plugins/scripts/RHSA_2009_1430.nasl
   trunk/openvas-plugins/scripts/RHSA_2009_1431.nasl
   trunk/openvas-plugins/scripts/RHSA_2009_1432.nasl
   trunk/openvas-plugins/scripts/RHSA_2009_1438.nasl
   trunk/openvas-plugins/scripts/RHSA_2009_1452.nasl
   trunk/openvas-plugins/scripts/RHSA_2009_1459.nasl
   trunk/openvas-plugins/scripts/RHSA_2009_1461.nasl
   trunk/openvas-plugins/scripts/RHSA_2009_1471.nasl
   trunk/openvas-plugins/scripts/RHSA_2009_1484.nasl
   trunk/openvas-plugins/scripts/RHSA_2009_1499.nasl
   trunk/openvas-plugins/scripts/RHSA_2009_1500.nasl
   trunk/openvas-plugins/scripts/RHSA_2009_1501.nasl
   trunk/openvas-plugins/scripts/RHSA_2009_1502.nasl
   trunk/openvas-plugins/scripts/RHSA_2009_1503.nasl
   trunk/openvas-plugins/scripts/RHSA_2009_1512.nasl
   trunk/openvas-plugins/scripts/RHSA_2009_1529.nasl
   trunk/openvas-plugins/scripts/RHSA_2009_1540.nasl
   trunk/openvas-plugins/scripts/RHSA_2009_1548.nasl
   trunk/openvas-plugins/scripts/RHSA_2009_1550.nasl
   trunk/openvas-plugins/scripts/RHSA_2009_1560.nasl
   trunk/openvas-plugins/scripts/RHSA_2009_1571.nasl
   trunk/openvas-plugins/scripts/RHSA_2009_1579.nasl
   trunk/openvas-plugins/scripts/RHSA_2009_1580.nasl
   trunk/openvas-plugins/scripts/RHSA_2009_1582.nasl
   trunk/openvas-plugins/scripts/RHSA_2009_1584.nasl
   trunk/openvas-plugins/scripts/RHSA_2009_1585.nasl
   trunk/openvas-plugins/scripts/RHSA_2009_1595.nasl
   trunk/openvas-plugins/scripts/RHSA_2009_1620.nasl
   trunk/openvas-plugins/scripts/RHSA_2009_1670.nasl
   trunk/openvas-plugins/scripts/RHSA_2009_1671.nasl
   trunk/openvas-plugins/scripts/RHSA_2009_1694.nasl
   trunk/openvas-plugins/scripts/SHN_Sendmail_DoublePipe.nasl
   trunk/openvas-plugins/scripts/aardvark_422_remote_file_include.nasl
   trunk/openvas-plugins/scripts/agora.nasl
   trunk/openvas-plugins/scripts/apache_Tomcat_Servlet_XSS.nasl
   trunk/openvas-plugins/scripts/apache_Tomcat_TroubleShooter.nasl
   trunk/openvas-plugins/scripts/apcupsd_overflows.nasl
   trunk/openvas-plugins/scripts/articlelive_xss.nasl
   trunk/openvas-plugins/scripts/aspdev_imgtag.nasl
   trunk/openvas-plugins/scripts/asterisk_sdp_header_overflow.nasl
   trunk/openvas-plugins/scripts/atutor_multiple_flaws.nasl
   trunk/openvas-plugins/scripts/atutor_password_reminder_sql.nasl
   trunk/openvas-plugins/scripts/atutor_xss.nasl
   trunk/openvas-plugins/scripts/basilix_arbitrary_file_disclosure.nasl
   trunk/openvas-plugins/scripts/basilix_attachment_disclosure.nasl
   trunk/openvas-plugins/scripts/basilix_message_content_script_injection.nasl
   trunk/openvas-plugins/scripts/basilix_sql_injection.nasl
   trunk/openvas-plugins/scripts/basilix_webmail.nasl
   trunk/openvas-plugins/scripts/bind_37118.nasl
   trunk/openvas-plugins/scripts/bookreview_xss.nasl
   trunk/openvas-plugins/scripts/calendar_express_flaws.nasl
   trunk/openvas-plugins/scripts/calendar_scheduler_xss.nasl
   trunk/openvas-plugins/scripts/cart32_xss.nasl
   trunk/openvas-plugins/scripts/cesarftp_mkd_command_buffer_overflow.nasl
   trunk/openvas-plugins/scripts/cgiwrap.nasl
   trunk/openvas-plugins/scripts/chargen.nasl
   trunk/openvas-plugins/scripts/cherokee_0_4_7.nasl
   trunk/openvas-plugins/scripts/cisco_default_pw.nasl
   trunk/openvas-plugins/scripts/cisco_ios_ftp_server_auth_bypass.nasl
   trunk/openvas-plugins/scripts/cisco_vpn_client_priv_escalation.nasl
   trunk/openvas-plugins/scripts/codethatshoppingcart_sql.nasl
   trunk/openvas-plugins/scripts/comersus_xss.nasl
   trunk/openvas-plugins/scripts/cubecart_xss.nasl
   trunk/openvas-plugins/scripts/cutenews_dir_traversal.nasl
   trunk/openvas-plugins/scripts/cutenews_indexphp_xss.nasl
   trunk/openvas-plugins/scripts/cutenews_show_news_xss.nasl
   trunk/openvas-plugins/scripts/deb_2070_1.nasl
   trunk/openvas-plugins/scripts/deb_2122_1.nasl
   trunk/openvas-plugins/scripts/deb_2190_1.nasl
   trunk/openvas-plugins/scripts/deb_2192_1.nasl
   trunk/openvas-plugins/scripts/deb_2197_1.nasl
   trunk/openvas-plugins/scripts/deb_2277_1.nasl
   trunk/openvas-plugins/scripts/deb_2279_1.nasl
   trunk/openvas-plugins/scripts/deb_2284_1.nasl
   trunk/openvas-plugins/scripts/e107_sql_injection.nasl
   trunk/openvas-plugins/scripts/easy_message_board_cmd_exec.nasl
   trunk/openvas-plugins/scripts/fcore_2008_11923.nasl
   trunk/openvas-plugins/scripts/fcore_2009_0059.nasl
   trunk/openvas-plugins/scripts/fcore_2009_0091.nasl
   trunk/openvas-plugins/scripts/fcore_2009_0154.nasl
   trunk/openvas-plugins/scripts/fcore_2009_0160.nasl
   trunk/openvas-plugins/scripts/fcore_2009_0268.nasl
   trunk/openvas-plugins/scripts/fcore_2009_0350.nasl
   trunk/openvas-plugins/scripts/fcore_2009_0483.nasl
   trunk/openvas-plugins/scripts/fcore_2009_0542.nasl
   trunk/openvas-plugins/scripts/fcore_2009_0544.nasl
   trunk/openvas-plugins/scripts/fcore_2009_0547.nasl
   trunk/openvas-plugins/scripts/fcore_2009_0814.nasl
   trunk/openvas-plugins/scripts/fcore_2009_0816.nasl
   trunk/openvas-plugins/scripts/fcore_2009_0819.nasl
   trunk/openvas-plugins/scripts/fcore_2009_0923.nasl
   trunk/openvas-plugins/scripts/fcore_2009_10165.nasl
   trunk/openvas-plugins/scripts/fcore_2009_10172.nasl
   trunk/openvas-plugins/scripts/fcore_2009_10525.nasl
   trunk/openvas-plugins/scripts/fcore_2009_10639.nasl
   trunk/openvas-plugins/scripts/fcore_2009_10648.nasl
   trunk/openvas-plugins/scripts/fcore_2009_10662.nasl
   trunk/openvas-plugins/scripts/fcore_2009_10694.nasl
   trunk/openvas-plugins/scripts/fcore_2009_10702.nasl
   trunk/openvas-plugins/scripts/fcore_2009_10737.nasl
   trunk/openvas-plugins/scripts/fcore_2009_10761.nasl
   trunk/openvas-plugins/scripts/fcore_2009_10891.nasl
   trunk/openvas-plugins/scripts/fcore_2009_11032.nasl
   trunk/openvas-plugins/scripts/fcore_2009_11038.nasl
   trunk/openvas-plugins/scripts/fcore_2009_11062.nasl
   trunk/openvas-plugins/scripts/fcore_2009_11314.nasl
   trunk/openvas-plugins/scripts/fcore_2009_11486.nasl
   trunk/openvas-plugins/scripts/fcore_2009_11487.nasl
   trunk/openvas-plugins/scripts/fcore_2009_11488.nasl
   trunk/openvas-plugins/scripts/fcore_2009_11489.nasl
   trunk/openvas-plugins/scripts/fcore_2009_11490.nasl
   trunk/openvas-plugins/scripts/fcore_2009_11491.nasl
   trunk/openvas-plugins/scripts/fcore_2009_12017.nasl
   trunk/openvas-plugins/scripts/fcore_2009_12180.nasl
   trunk/openvas-plugins/scripts/fcore_2009_12218.nasl
   trunk/openvas-plugins/scripts/fcore_2009_12229.nasl
   trunk/openvas-plugins/scripts/fcore_2009_12233.nasl
   trunk/openvas-plugins/scripts/fcore_2009_12305.nasl
   trunk/openvas-plugins/scripts/fcore_2009_12461.nasl
   trunk/openvas-plugins/scripts/fcore_2009_12506.nasl
   trunk/openvas-plugins/scripts/fcore_2009_12604.nasl
   trunk/openvas-plugins/scripts/fcore_2009_12606.nasl
   trunk/openvas-plugins/scripts/fcore_2009_12652.nasl
   trunk/openvas-plugins/scripts/fcore_2009_12750.nasl
   trunk/openvas-plugins/scripts/fcore_2009_12783.nasl
   trunk/openvas-plugins/scripts/fcore_2009_12817.nasl
   trunk/openvas-plugins/scripts/fcore_2009_12827.nasl
   trunk/openvas-plugins/scripts/fcore_2009_12966.nasl
   trunk/openvas-plugins/scripts/fcore_2009_12968.nasl
   trunk/openvas-plugins/scripts/fcore_2009_13040.nasl
   trunk/openvas-plugins/scripts/fcore_2009_13090.nasl
   trunk/openvas-plugins/scripts/fcore_2009_13098.nasl
   trunk/openvas-plugins/scripts/fcore_2009_13121.nasl
   trunk/openvas-plugins/scripts/fcore_2009_13236.nasl
   trunk/openvas-plugins/scripts/fcore_2009_13250.nasl
   trunk/openvas-plugins/scripts/fcore_2009_13466.nasl
   trunk/openvas-plugins/scripts/fcore_2009_13504.nasl
   trunk/openvas-plugins/scripts/fcore_2009_13694.nasl
   trunk/openvas-plugins/scripts/fcore_2009_1641.nasl
   trunk/openvas-plugins/scripts/fcore_2009_1699.nasl
   trunk/openvas-plugins/scripts/fcore_2009_1776.nasl
   trunk/openvas-plugins/scripts/fcore_2009_1824.nasl
   trunk/openvas-plugins/scripts/fcore_2009_2045.nasl
   trunk/openvas-plugins/scripts/fcore_2009_2128.nasl
   trunk/openvas-plugins/scripts/fcore_2009_2179.nasl
   trunk/openvas-plugins/scripts/fcore_2009_2231.nasl
   trunk/openvas-plugins/scripts/fcore_2009_2237.nasl
   trunk/openvas-plugins/scripts/fcore_2009_2417.nasl
   trunk/openvas-plugins/scripts/fcore_2009_2418.nasl
   trunk/openvas-plugins/scripts/fcore_2009_2419.nasl
   trunk/openvas-plugins/scripts/fcore_2009_2420.nasl
   trunk/openvas-plugins/scripts/fcore_2009_2784.nasl
   trunk/openvas-plugins/scripts/fcore_2009_2792.nasl
   trunk/openvas-plugins/scripts/fcore_2009_2834.nasl
   trunk/openvas-plugins/scripts/fcore_2009_2852.nasl
   trunk/openvas-plugins/scripts/fcore_2009_2882.nasl
   trunk/openvas-plugins/scripts/fcore_2009_2884.nasl
   trunk/openvas-plugins/scripts/fcore_2009_3034.nasl
   trunk/openvas-plugins/scripts/fcore_2009_3101.nasl
   trunk/openvas-plugins/scripts/fcore_2009_3161.nasl
   trunk/openvas-plugins/scripts/fcore_2009_3280.nasl
   trunk/openvas-plugins/scripts/fcore_2009_3283.nasl
   trunk/openvas-plugins/scripts/fcore_2009_3449.nasl
   trunk/openvas-plugins/scripts/fcore_2009_3453.nasl
   trunk/openvas-plugins/scripts/fcore_2009_3753.nasl
   trunk/openvas-plugins/scripts/fcore_2009_3769.nasl
   trunk/openvas-plugins/scripts/fcore_2009_3794.nasl
   trunk/openvas-plugins/scripts/fcore_2009_3820.nasl
   trunk/openvas-plugins/scripts/fcore_2009_3875.nasl
   trunk/openvas-plugins/scripts/fcore_2009_3893.nasl
   trunk/openvas-plugins/scripts/fcore_2009_3914.nasl
   trunk/openvas-plugins/scripts/fcore_2009_3967.nasl
   trunk/openvas-plugins/scripts/fcore_2009_4848.nasl
   trunk/openvas-plugins/scripts/fcore_2009_4870.nasl
   trunk/openvas-plugins/scripts/fcore_2009_4880.nasl
   trunk/openvas-plugins/scripts/fcore_2009_4883.nasl
   trunk/openvas-plugins/scripts/fcore_2009_5118.nasl
   trunk/openvas-plugins/scripts/fcore_2009_5383.nasl
   trunk/openvas-plugins/scripts/fcore_2009_5412.nasl
   trunk/openvas-plugins/scripts/fcore_2009_5423.nasl
   trunk/openvas-plugins/scripts/fcore_2009_5552.nasl
   trunk/openvas-plugins/scripts/fcore_2009_5583.nasl
   trunk/openvas-plugins/scripts/fcore_2009_5597.nasl
   trunk/openvas-plugins/scripts/fcore_2009_5969.nasl
   trunk/openvas-plugins/scripts/fcore_2009_6014.nasl
   trunk/openvas-plugins/scripts/fcore_2009_6261.nasl
   trunk/openvas-plugins/scripts/fcore_2009_6531.nasl
   trunk/openvas-plugins/scripts/fcore_2009_6603.nasl
   trunk/openvas-plugins/scripts/fcore_2009_6846.nasl
   trunk/openvas-plugins/scripts/fcore_2009_6972.nasl
   trunk/openvas-plugins/scripts/fcore_2009_6973.nasl
   trunk/openvas-plugins/scripts/fcore_2009_7335.nasl
   trunk/openvas-plugins/scripts/fcore_2009_7701.nasl
   trunk/openvas-plugins/scripts/fcore_2009_7729.nasl
   trunk/openvas-plugins/scripts/fcore_2009_7750.nasl
   trunk/openvas-plugins/scripts/fcore_2009_8264.nasl
   trunk/openvas-plugins/scripts/fcore_2009_8329.nasl
   trunk/openvas-plugins/scripts/fcore_2009_8337.nasl
   trunk/openvas-plugins/scripts/fcore_2009_8491.nasl
   trunk/openvas-plugins/scripts/fcore_2009_8529.nasl
   trunk/openvas-plugins/scripts/fcore_2009_8538.nasl
   trunk/openvas-plugins/scripts/fcore_2009_8582.nasl
   trunk/openvas-plugins/scripts/fcore_2009_8594.nasl
   trunk/openvas-plugins/scripts/fcore_2009_8647.nasl
   trunk/openvas-plugins/scripts/fcore_2009_8812.nasl
   trunk/openvas-plugins/scripts/fcore_2009_9044.nasl
   trunk/openvas-plugins/scripts/fcore_2009_9231.nasl
   trunk/openvas-plugins/scripts/fcore_2009_9232.nasl
   trunk/openvas-plugins/scripts/fcore_2009_9374.nasl
   trunk/openvas-plugins/scripts/fcore_2009_9391.nasl
   trunk/openvas-plugins/scripts/fcore_2009_9400.nasl
   trunk/openvas-plugins/scripts/fcore_2009_9405.nasl
   trunk/openvas-plugins/scripts/fcore_2009_9474.nasl
   trunk/openvas-plugins/scripts/fcore_2009_9837.nasl
   trunk/openvas-plugins/scripts/fishcart_sql_injection.nasl
   trunk/openvas-plugins/scripts/freebsd_ImageMagick6.nasl
   trunk/openvas-plugins/scripts/freebsd_apache-tomcat0.nasl
   trunk/openvas-plugins/scripts/freebsd_apache13.nasl
   trunk/openvas-plugins/scripts/freebsd_apache15.nasl
   trunk/openvas-plugins/scripts/freebsd_apr.nasl
   trunk/openvas-plugins/scripts/freebsd_awstats.nasl
   trunk/openvas-plugins/scripts/freebsd_bugzilla11.nasl
   trunk/openvas-plugins/scripts/freebsd_bugzilla12.nasl
   trunk/openvas-plugins/scripts/freebsd_bugzilla2.nasl
   trunk/openvas-plugins/scripts/freebsd_bzip2.nasl
   trunk/openvas-plugins/scripts/freebsd_cacti.nasl
   trunk/openvas-plugins/scripts/freebsd_clamav12.nasl
   trunk/openvas-plugins/scripts/freebsd_clamav4.nasl
   trunk/openvas-plugins/scripts/freebsd_clamav6.nasl
   trunk/openvas-plugins/scripts/freebsd_coppermine4.nasl
   trunk/openvas-plugins/scripts/freebsd_cups-base3.nasl
   trunk/openvas-plugins/scripts/freebsd_cups-base6.nasl
   trunk/openvas-plugins/scripts/freebsd_cups-base7.nasl
   trunk/openvas-plugins/scripts/freebsd_cups-lpr.nasl
   trunk/openvas-plugins/scripts/freebsd_cvs+ipv60.nasl
   trunk/openvas-plugins/scripts/freebsd_cyrus-sasl.nasl
   trunk/openvas-plugins/scripts/freebsd_dokuwiki2.nasl
   trunk/openvas-plugins/scripts/freebsd_drupal40.nasl
   trunk/openvas-plugins/scripts/freebsd_egroupware.nasl
   trunk/openvas-plugins/scripts/freebsd_enscript-a4.nasl
   trunk/openvas-plugins/scripts/freebsd_enscript-a40.nasl
   trunk/openvas-plugins/scripts/freebsd_ethereal0.nasl
   trunk/openvas-plugins/scripts/freebsd_ethereal3.nasl
   trunk/openvas-plugins/scripts/freebsd_ethereal5.nasl
   trunk/openvas-plugins/scripts/freebsd_fcron.nasl
   trunk/openvas-plugins/scripts/freebsd_firefox18.nasl
   trunk/openvas-plugins/scripts/freebsd_firefox22.nasl
   trunk/openvas-plugins/scripts/freebsd_firefox25.nasl
   trunk/openvas-plugins/scripts/freebsd_firefox26.nasl
   trunk/openvas-plugins/scripts/freebsd_firefox29.nasl
   trunk/openvas-plugins/scripts/freebsd_firefox32.nasl
   trunk/openvas-plugins/scripts/freebsd_firefox33.nasl
   trunk/openvas-plugins/scripts/freebsd_firefox35.nasl
   trunk/openvas-plugins/scripts/freebsd_firefox38.nasl
   trunk/openvas-plugins/scripts/freebsd_firefox47.nasl
   trunk/openvas-plugins/scripts/freebsd_firefox49.nasl
   trunk/openvas-plugins/scripts/freebsd_firefox50.nasl
   trunk/openvas-plugins/scripts/freebsd_firefox52.nasl
   trunk/openvas-plugins/scripts/freebsd_firefox54.nasl
   trunk/openvas-plugins/scripts/freebsd_firefox8.nasl
   trunk/openvas-plugins/scripts/freebsd_flyspray1.nasl
   trunk/openvas-plugins/scripts/freebsd_freetype2.nasl
   trunk/openvas-plugins/scripts/freebsd_fsplib.nasl
   trunk/openvas-plugins/scripts/freebsd_gd0.nasl
   trunk/openvas-plugins/scripts/freebsd_gd1.nasl
   trunk/openvas-plugins/scripts/freebsd_gforge0.nasl
   trunk/openvas-plugins/scripts/freebsd_gftp0.nasl
   trunk/openvas-plugins/scripts/freebsd_gnutls4.nasl
   trunk/openvas-plugins/scripts/freebsd_gzip.nasl
   trunk/openvas-plugins/scripts/freebsd_gzip0.nasl
   trunk/openvas-plugins/scripts/freebsd_heimdal1.nasl
   trunk/openvas-plugins/scripts/freebsd_ipsec-tools.nasl
   trunk/openvas-plugins/scripts/freebsd_isakmpd.nasl
   trunk/openvas-plugins/scripts/freebsd_jetty.nasl
   trunk/openvas-plugins/scripts/freebsd_joomla1.nasl
   trunk/openvas-plugins/scripts/freebsd_junkbuster.nasl
   trunk/openvas-plugins/scripts/freebsd_kdebase3.nasl
   trunk/openvas-plugins/scripts/freebsd_ktorrent.nasl
   trunk/openvas-plugins/scripts/freebsd_lha.nasl
   trunk/openvas-plugins/scripts/freebsd_libvorbis0.nasl
   trunk/openvas-plugins/scripts/freebsd_libvorbis1.nasl
   trunk/openvas-plugins/scripts/freebsd_libxine12.nasl
   trunk/openvas-plugins/scripts/freebsd_libxine5.nasl
   trunk/openvas-plugins/scripts/freebsd_libxml20.nasl
   trunk/openvas-plugins/scripts/freebsd_libxml21.nasl
   trunk/openvas-plugins/scripts/freebsd_linux-flashplugin0.nasl
   trunk/openvas-plugins/scripts/freebsd_linux-flashplugin1.nasl
   trunk/openvas-plugins/scripts/freebsd_linux-flashplugin2.nasl
   trunk/openvas-plugins/scripts/freebsd_linux-flashplugin4.nasl
   trunk/openvas-plugins/scripts/freebsd_linux-flashplugin8.nasl
   trunk/openvas-plugins/scripts/freebsd_linux_base.nasl
   trunk/openvas-plugins/scripts/freebsd_mailman7.nasl
   trunk/openvas-plugins/scripts/freebsd_mantis4.nasl
   trunk/openvas-plugins/scripts/freebsd_mediawiki2.nasl
   trunk/openvas-plugins/scripts/freebsd_moinmoin1.nasl
   trunk/openvas-plugins/scripts/freebsd_mysql-server10.nasl
   trunk/openvas-plugins/scripts/freebsd_mysql-server17.nasl
   trunk/openvas-plugins/scripts/freebsd_openfire1.nasl
   trunk/openvas-plugins/scripts/freebsd_openoffice.org.nasl
   trunk/openvas-plugins/scripts/freebsd_opensaml2.nasl
   trunk/openvas-plugins/scripts/freebsd_openssh.nasl
   trunk/openvas-plugins/scripts/freebsd_openssl2.nasl
   trunk/openvas-plugins/scripts/freebsd_opera23.nasl
   trunk/openvas-plugins/scripts/freebsd_opera5.nasl
   trunk/openvas-plugins/scripts/freebsd_pcre0.nasl
   trunk/openvas-plugins/scripts/freebsd_php40.nasl
   trunk/openvas-plugins/scripts/freebsd_php5-imap.nasl
   trunk/openvas-plugins/scripts/freebsd_php51.nasl
   trunk/openvas-plugins/scripts/freebsd_php56.nasl
   trunk/openvas-plugins/scripts/freebsd_php57.nasl
   trunk/openvas-plugins/scripts/freebsd_phpMyAdmin20.nasl
   trunk/openvas-plugins/scripts/freebsd_phpMyAdmin24.nasl
   trunk/openvas-plugins/scripts/freebsd_phpbb8.nasl
   trunk/openvas-plugins/scripts/freebsd_phpbb9.nasl
   trunk/openvas-plugins/scripts/freebsd_phpmyadmin1.nasl
   trunk/openvas-plugins/scripts/freebsd_phpmyadmin11.nasl
   trunk/openvas-plugins/scripts/freebsd_phpnuke.nasl
   trunk/openvas-plugins/scripts/freebsd_pidgin.nasl
   trunk/openvas-plugins/scripts/freebsd_png0.nasl
   trunk/openvas-plugins/scripts/freebsd_postfix-policyd-weight.nasl
   trunk/openvas-plugins/scripts/freebsd_postgresql-client.nasl
   trunk/openvas-plugins/scripts/freebsd_postgresql3.nasl
   trunk/openvas-plugins/scripts/freebsd_postgresql4.nasl
   trunk/openvas-plugins/scripts/freebsd_postnuke1.nasl
   trunk/openvas-plugins/scripts/freebsd_powerdns-recursor0.nasl
   trunk/openvas-plugins/scripts/freebsd_quake2forge.nasl
   trunk/openvas-plugins/scripts/freebsd_rt.nasl
   trunk/openvas-plugins/scripts/freebsd_samba12.nasl
   trunk/openvas-plugins/scripts/freebsd_sdl_image.nasl
   trunk/openvas-plugins/scripts/freebsd_seamonkey.nasl
   trunk/openvas-plugins/scripts/freebsd_seamonkey0.nasl
   trunk/openvas-plugins/scripts/freebsd_shtool.nasl
   trunk/openvas-plugins/scripts/freebsd_skype.nasl
   trunk/openvas-plugins/scripts/freebsd_squirrelmail.nasl
   trunk/openvas-plugins/scripts/freebsd_thunderbird0.nasl
   trunk/openvas-plugins/scripts/freebsd_tikiwik.nasl
   trunk/openvas-plugins/scripts/freebsd_tikiwiki.nasl
   trunk/openvas-plugins/scripts/freebsd_tomcat.nasl
   trunk/openvas-plugins/scripts/freebsd_tor5.nasl
   trunk/openvas-plugins/scripts/freebsd_tptest.nasl
   trunk/openvas-plugins/scripts/freebsd_twiki2.nasl
   trunk/openvas-plugins/scripts/freebsd_typo31.nasl
   trunk/openvas-plugins/scripts/freebsd_typo32.nasl
   trunk/openvas-plugins/scripts/freebsd_vim0.nasl
   trunk/openvas-plugins/scripts/freebsd_webkit-gtk2.nasl
   trunk/openvas-plugins/scripts/freebsd_webkit-gtk21.nasl
   trunk/openvas-plugins/scripts/freebsd_websvn.nasl
   trunk/openvas-plugins/scripts/freebsd_wireshark0.nasl
   trunk/openvas-plugins/scripts/freebsd_wordpress0.nasl
   trunk/openvas-plugins/scripts/freebsd_xfce4-panel.nasl
   trunk/openvas-plugins/scripts/freebsd_xorg-server1.nasl
   trunk/openvas-plugins/scripts/freebsd_xpdf3.nasl
   trunk/openvas-plugins/scripts/freebsdsa_bind10.nasl
   trunk/openvas-plugins/scripts/freebsdsa_bind8.nasl
   trunk/openvas-plugins/scripts/freebsdsa_ssl.nasl
   trunk/openvas-plugins/scripts/freesshd_key_exchange_overflow.nasl
   trunk/openvas-plugins/scripts/gb_CESA-2011_0841_systemtap_centos5_i386.nasl
   trunk/openvas-plugins/scripts/gb_CESA-2011_1155_xorg-x11_centos4_i386.nasl
   trunk/openvas-plugins/scripts/gb_CESA-2011_1161_freetype_centos4_i386.nasl
   trunk/openvas-plugins/scripts/gb_CESA-2011_1164_firefox_centos4_i386.nasl
   trunk/openvas-plugins/scripts/gb_CESA-2011_1165_thunderbird_centos4_i386.nasl
   trunk/openvas-plugins/scripts/gb_CESA-2011_1167_seamonkey_centos4_i386.nasl
   trunk/openvas-plugins/scripts/gb_CESA-2011_1196_system-config-printer_centos4_i386.nasl
   trunk/openvas-plugins/scripts/gb_RHSA-2011_0841-01_systemtap.nasl
   trunk/openvas-plugins/scripts/gb_RHSA-2011_1154-01_libXfont.nasl
   trunk/openvas-plugins/scripts/gb_RHSA-2011_1155-01_xorg-x11.nasl
   trunk/openvas-plugins/scripts/gb_RHSA-2011_1161-01_freetype.nasl
   trunk/openvas-plugins/scripts/gb_RHSA-2011_1164-01_firefox.nasl
   trunk/openvas-plugins/scripts/gb_RHSA-2011_1165-01_thunderbird.nasl
   trunk/openvas-plugins/scripts/gb_RHSA-2011_1167-01_seamonkey.nasl
   trunk/openvas-plugins/scripts/gb_RHSA-2011_1196-01_system-config-printer.nasl
   trunk/openvas-plugins/scripts/gb_fedora_2011_10782_gimp_fc14.nasl
   trunk/openvas-plugins/scripts/gb_fedora_2011_10788_gimp_fc15.nasl
   trunk/openvas-plugins/scripts/gb_fedora_2011_7289_systemtap_fc13.nasl
   trunk/openvas-plugins/scripts/gb_fedora_2011_7302_systemtap_fc14.nasl
   trunk/openvas-plugins/scripts/gb_fedora_2011_7820_libxml_fc15.nasl
   trunk/openvas-plugins/scripts/gb_fedora_2011_7856_libxml_fc14.nasl
   trunk/openvas-plugins/scripts/gb_fedora_2011_9130_kernel_fc15.nasl
   trunk/openvas-plugins/scripts/gb_fedora_2011_9763_libsoup_fc15.nasl
   trunk/openvas-plugins/scripts/gb_hp_performance_insight_49096.nasl
   trunk/openvas-plugins/scripts/gb_mandriva_MDVSA_2011_127.nasl
   trunk/openvas-plugins/scripts/gb_orion_npm_45257.nasl
   trunk/openvas-plugins/scripts/gb_otrs_49251.nasl
   trunk/openvas-plugins/scripts/gb_phpmyadmin_49306.nasl
   trunk/openvas-plugins/scripts/gb_ubuntu_USN_1153_1.nasl
   trunk/openvas-plugins/scripts/gb_ubuntu_USN_1181_1.nasl
   trunk/openvas-plugins/scripts/gb_ubuntu_USN_1191_1.nasl
   trunk/openvas-plugins/scripts/gb_ubuntu_USN_1192_1.nasl
   trunk/openvas-plugins/scripts/gb_ubuntu_USN_1192_2.nasl
   trunk/openvas-plugins/scripts/gcards_dir_transversal.nasl
   trunk/openvas-plugins/scripts/goaheadwebserver_source_disclosure.nasl
   trunk/openvas-plugins/scripts/guppy_directory_traversal.nasl
   trunk/openvas-plugins/scripts/guppy_request_header_flaws.nasl
   trunk/openvas-plugins/scripts/hcl_file_include.nasl
   trunk/openvas-plugins/scripts/http_w98_devname_dos.nasl
   trunk/openvas-plugins/scripts/icq_installed.nasl
   trunk/openvas-plugins/scripts/idealbb_multiple_flaws.nasl
   trunk/openvas-plugins/scripts/iis_decode_bug.nasl
   trunk/openvas-plugins/scripts/iis_ida_isapi.nasl
   trunk/openvas-plugins/scripts/iis_nat.nasl
   trunk/openvas-plugins/scripts/includer_rcmdexec.nasl
   trunk/openvas-plugins/scripts/ipswitch_whatsup_info_disclosure.nasl
   trunk/openvas-plugins/scripts/kayako_sql_injection.nasl
   trunk/openvas-plugins/scripts/kazaa_installed.nasl
   trunk/openvas-plugins/scripts/kerberos_CB-A08-0044.nasl
   trunk/openvas-plugins/scripts/kerio_webmail_multiple_flaws.nasl
   trunk/openvas-plugins/scripts/kiwi_cattools_dir_traversal.nasl
   trunk/openvas-plugins/scripts/ldap_null_bind.nasl
   trunk/openvas-plugins/scripts/ldu_801.nasl
   trunk/openvas-plugins/scripts/ldu_sql_injection.nasl
   trunk/openvas-plugins/scripts/limbo_multiple_flaws.nasl
   trunk/openvas-plugins/scripts/linksys_multiple_vulns.nasl
   trunk/openvas-plugins/scripts/lotus_domino_ldap_dos.nasl
   trunk/openvas-plugins/scripts/lotus_domino_xss.nasl
   trunk/openvas-plugins/scripts/mailenable_imap_rename_dos.nasl
   trunk/openvas-plugins/scripts/mailgust_sql_injection.nasl
   trunk/openvas-plugins/scripts/mailman_privatepy_directory_traversal.nasl
   trunk/openvas-plugins/scripts/mailreader.nasl
   trunk/openvas-plugins/scripts/mantis_file_incl_sql_inject.nasl
   trunk/openvas-plugins/scripts/mantis_multiple_vulns4.nasl
   trunk/openvas-plugins/scripts/mdksa_2009_003.nasl
   trunk/openvas-plugins/scripts/mdksa_2009_008.nasl
   trunk/openvas-plugins/scripts/mdksa_2009_009.nasl
   trunk/openvas-plugins/scripts/mdksa_2009_016.nasl
   trunk/openvas-plugins/scripts/mdksa_2009_020.nasl
   trunk/openvas-plugins/scripts/mdksa_2009_022.nasl
   trunk/openvas-plugins/scripts/mdksa_2009_023.nasl
   trunk/openvas-plugins/scripts/mdksa_2009_026.nasl
   trunk/openvas-plugins/scripts/mdksa_2009_026_1.nasl
   trunk/openvas-plugins/scripts/mdksa_2009_036.nasl
   trunk/openvas-plugins/scripts/mdksa_2009_041.nasl
   trunk/openvas-plugins/scripts/mdksa_2009_051.nasl
   trunk/openvas-plugins/scripts/mdksa_2009_065.nasl
   trunk/openvas-plugins/scripts/mdksa_2009_075.nasl
   trunk/openvas-plugins/scripts/mdksa_2009_078.nasl
   trunk/openvas-plugins/scripts/mdksa_2009_083.nasl
   trunk/openvas-plugins/scripts/mdksa_2009_085.nasl
   trunk/openvas-plugins/scripts/mdksa_2009_094.nasl
   trunk/openvas-plugins/scripts/mdksa_2009_095.nasl
   trunk/openvas-plugins/scripts/mdksa_2009_096.nasl
   trunk/openvas-plugins/scripts/mdksa_2009_096_1.nasl
   trunk/openvas-plugins/scripts/mdksa_2009_097.nasl
   trunk/openvas-plugins/scripts/mdksa_2009_098.nasl
   trunk/openvas-plugins/scripts/mdksa_2009_098_1.nasl
   trunk/openvas-plugins/scripts/mdksa_2009_099.nasl
   trunk/openvas-plugins/scripts/mdksa_2009_099_1.nasl
   trunk/openvas-plugins/scripts/mdksa_2009_101.nasl
   trunk/openvas-plugins/scripts/mdksa_2009_110.nasl
   trunk/openvas-plugins/scripts/mdksa_2009_111.nasl
   trunk/openvas-plugins/scripts/mdksa_2009_111_1.nasl
   trunk/openvas-plugins/scripts/mdksa_2009_115.nasl
   trunk/openvas-plugins/scripts/mdksa_2009_116.nasl
   trunk/openvas-plugins/scripts/mdksa_2009_118.nasl
   trunk/openvas-plugins/scripts/mdksa_2009_119.nasl
   trunk/openvas-plugins/scripts/mdksa_2009_121.nasl
   trunk/openvas-plugins/scripts/mdksa_2009_121_1.nasl
   trunk/openvas-plugins/scripts/mdksa_2009_131.nasl
   trunk/openvas-plugins/scripts/mdksa_2009_131_1.nasl
   trunk/openvas-plugins/scripts/mdksa_2009_135.nasl
   trunk/openvas-plugins/scripts/mdksa_2009_137.nasl
   trunk/openvas-plugins/scripts/mdksa_2009_140.nasl
   trunk/openvas-plugins/scripts/mdksa_2009_141.nasl
   trunk/openvas-plugins/scripts/mdksa_2009_142.nasl
   trunk/openvas-plugins/scripts/mdksa_2009_142_1.nasl
   trunk/openvas-plugins/scripts/mdksa_2009_143.nasl
   trunk/openvas-plugins/scripts/mdksa_2009_144.nasl
   trunk/openvas-plugins/scripts/mdksa_2009_147.nasl
   trunk/openvas-plugins/scripts/mdksa_2009_149.nasl
   trunk/openvas-plugins/scripts/mdksa_2009_150.nasl
   trunk/openvas-plugins/scripts/mdksa_2009_162.nasl
   trunk/openvas-plugins/scripts/mdksa_2009_164.nasl
   trunk/openvas-plugins/scripts/mdksa_2009_165.nasl
   trunk/openvas-plugins/scripts/mdksa_2009_168.nasl
   trunk/openvas-plugins/scripts/mdksa_2009_169.nasl
   trunk/openvas-plugins/scripts/mdksa_2009_169_1.nasl
   trunk/openvas-plugins/scripts/mdksa_2009_173.nasl
   trunk/openvas-plugins/scripts/mdksa_2009_183.nasl
   trunk/openvas-plugins/scripts/mdksa_2009_185.nasl
   trunk/openvas-plugins/scripts/mdksa_2009_194.nasl
   trunk/openvas-plugins/scripts/mdksa_2009_197.nasl
   trunk/openvas-plugins/scripts/mdksa_2009_197_2.nasl
   trunk/openvas-plugins/scripts/mdksa_2009_197_3.nasl
   trunk/openvas-plugins/scripts/mdksa_2009_198.nasl
   trunk/openvas-plugins/scripts/mdksa_2009_203.nasl
   trunk/openvas-plugins/scripts/mdksa_2009_203_1.nasl
   trunk/openvas-plugins/scripts/mdksa_2009_209.nasl
   trunk/openvas-plugins/scripts/mdksa_2009_216.nasl
   trunk/openvas-plugins/scripts/mdksa_2009_230.nasl
   trunk/openvas-plugins/scripts/mdksa_2009_237.nasl
   trunk/openvas-plugins/scripts/mdksa_2009_238.nasl
   trunk/openvas-plugins/scripts/mdksa_2009_239.nasl
   trunk/openvas-plugins/scripts/mdksa_2009_240.nasl
   trunk/openvas-plugins/scripts/mdksa_2009_242.nasl
   trunk/openvas-plugins/scripts/mdksa_2009_242_1.nasl
   trunk/openvas-plugins/scripts/mdksa_2009_246.nasl
   trunk/openvas-plugins/scripts/mdksa_2009_247.nasl
   trunk/openvas-plugins/scripts/mdksa_2009_251_1.nasl
   trunk/openvas-plugins/scripts/mdksa_2009_256.nasl
   trunk/openvas-plugins/scripts/mdksa_2009_256_1.nasl
   trunk/openvas-plugins/scripts/mdksa_2009_258.nasl
   trunk/openvas-plugins/scripts/mdksa_2009_268.nasl
   trunk/openvas-plugins/scripts/mdksa_2009_281.nasl
   trunk/openvas-plugins/scripts/mdksa_2009_282.nasl
   trunk/openvas-plugins/scripts/mdksa_2009_282_1.nasl
   trunk/openvas-plugins/scripts/mdksa_2009_283.nasl
   trunk/openvas-plugins/scripts/mdksa_2009_287.nasl
   trunk/openvas-plugins/scripts/mdksa_2009_287_1.nasl
   trunk/openvas-plugins/scripts/mdksa_2009_292.nasl
   trunk/openvas-plugins/scripts/mdksa_2009_292_1.nasl
   trunk/openvas-plugins/scripts/mdksa_2009_297.nasl
   trunk/openvas-plugins/scripts/mdksa_2009_297_1.nasl
   trunk/openvas-plugins/scripts/mdksa_2009_298.nasl
   trunk/openvas-plugins/scripts/mdksa_2009_299.nasl
   trunk/openvas-plugins/scripts/mdksa_2009_301.nasl
   trunk/openvas-plugins/scripts/mdksa_2009_303.nasl
   trunk/openvas-plugins/scripts/mdksa_2009_308.nasl
   trunk/openvas-plugins/scripts/mdksa_2009_310.nasl
   trunk/openvas-plugins/scripts/mdksa_2009_311.nasl
   trunk/openvas-plugins/scripts/mdksa_2009_313_1.nasl
   trunk/openvas-plugins/scripts/mdksa_2009_317.nasl
   trunk/openvas-plugins/scripts/mdksa_2009_318.nasl
   trunk/openvas-plugins/scripts/mdksa_2009_319.nasl
   trunk/openvas-plugins/scripts/mdksa_2009_320.nasl
   trunk/openvas-plugins/scripts/mdksa_2009_321.nasl
   trunk/openvas-plugins/scripts/mdksa_2009_323.nasl
   trunk/openvas-plugins/scripts/mdksa_2009_324.nasl
   trunk/openvas-plugins/scripts/mdksa_2009_326.nasl
   trunk/openvas-plugins/scripts/mdksa_2009_327.nasl
   trunk/openvas-plugins/scripts/mdksa_2009_330.nasl
   trunk/openvas-plugins/scripts/mdksa_2009_331.nasl
   trunk/openvas-plugins/scripts/mdksa_2009_334.nasl
   trunk/openvas-plugins/scripts/mdksa_2009_335.nasl
   trunk/openvas-plugins/scripts/mdksa_2009_344.nasl
   trunk/openvas-plugins/scripts/merak_multiple_vulns.nasl
   trunk/openvas-plugins/scripts/mercur_imap_buffer_overflow.nasl
   trunk/openvas-plugins/scripts/mercuryboard_multiple_vuln.nasl
   trunk/openvas-plugins/scripts/microsoft-iis-nlst-stack-overflow.nasl
   trunk/openvas-plugins/scripts/moodle_sql_inject.nasl
   trunk/openvas-plugins/scripts/mozilla_firefox_xul_spoof.nasl
   trunk/openvas-plugins/scripts/ms07-016.nasl
   trunk/openvas-plugins/scripts/ms07-045.nasl
   trunk/openvas-plugins/scripts/ms07-057.nasl
   trunk/openvas-plugins/scripts/ms_smb2_highid.nasl
   trunk/openvas-plugins/scripts/mssql_version.nasl
   trunk/openvas-plugins/scripts/mybloggie_sql_injection.nasl
   trunk/openvas-plugins/scripts/mysql_single_row_subselect_dos.nasl
   trunk/openvas-plugins/scripts/nph-publish.nasl
   trunk/openvas-plugins/scripts/nsm2004_dos.nasl
   trunk/openvas-plugins/scripts/openwebmail_logindomain_xss.nasl
   trunk/openvas-plugins/scripts/opera_favicon_address_bar_spoofing.nasl
   trunk/openvas-plugins/scripts/oracle9i_java_process_manager.nasl
   trunk/openvas-plugins/scripts/ovcesa2009_0001_01.nasl
   trunk/openvas-plugins/scripts/ovcesa2009_0010.nasl
   trunk/openvas-plugins/scripts/ovcesa2009_0012.nasl
   trunk/openvas-plugins/scripts/ovcesa2009_0014.nasl
   trunk/openvas-plugins/scripts/ovcesa2009_0313.nasl
   trunk/openvas-plugins/scripts/ovcesa2009_0315.nasl
   trunk/openvas-plugins/scripts/ovcesa2009_0325.nasl
   trunk/openvas-plugins/scripts/ovcesa2009_0325_01.nasl
   trunk/openvas-plugins/scripts/ovcesa2009_0326.nasl
   trunk/openvas-plugins/scripts/ovcesa2009_0329.nasl
   trunk/openvas-plugins/scripts/ovcesa2009_0331.nasl
   trunk/openvas-plugins/scripts/ovcesa2009_0337.nasl
   trunk/openvas-plugins/scripts/ovcesa2009_0338.nasl
   trunk/openvas-plugins/scripts/ovcesa2009_0354.nasl
   trunk/openvas-plugins/scripts/ovcesa2009_0355.nasl
   trunk/openvas-plugins/scripts/ovcesa2009_0358.nasl
   trunk/openvas-plugins/scripts/ovcesa2009_0361.nasl
   trunk/openvas-plugins/scripts/ovcesa2009_0377.nasl
   trunk/openvas-plugins/scripts/ovcesa2009_0402.nasl
   trunk/openvas-plugins/scripts/ovcesa2009_0408.nasl
   trunk/openvas-plugins/scripts/ovcesa2009_0411.nasl
   trunk/openvas-plugins/scripts/ovcesa2009_0420.nasl
   trunk/openvas-plugins/scripts/ovcesa2009_0429.nasl
   trunk/openvas-plugins/scripts/ovcesa2009_0430.nasl
   trunk/openvas-plugins/scripts/ovcesa2009_0431.nasl
   trunk/openvas-plugins/scripts/ovcesa2009_0436.nasl
   trunk/openvas-plugins/scripts/ovcesa2009_0437.nasl
   trunk/openvas-plugins/scripts/ovcesa2009_0437_02.nasl
   trunk/openvas-plugins/scripts/ovcesa2009_0444.nasl
   trunk/openvas-plugins/scripts/ovcesa2009_0458.nasl
   trunk/openvas-plugins/scripts/ovcesa2009_0459.nasl
   trunk/openvas-plugins/scripts/ovcesa2009_0473.nasl
   trunk/openvas-plugins/scripts/ovcesa2009_0480.nasl
   trunk/openvas-plugins/scripts/ovcesa2009_1059.nasl
   trunk/openvas-plugins/scripts/ovcesa2009_1060.nasl
   trunk/openvas-plugins/scripts/ovcesa2009_1066.nasl
   trunk/openvas-plugins/scripts/ovcesa2009_1101.nasl
   trunk/openvas-plugins/scripts/ovcesa2009_1102.nasl
   trunk/openvas-plugins/scripts/ovcesa2009_1106.nasl
   trunk/openvas-plugins/scripts/ovcesa2009_1107.nasl
   trunk/openvas-plugins/scripts/ovcesa2009_1108.nasl
   trunk/openvas-plugins/scripts/ovcesa2009_1126.nasl
   trunk/openvas-plugins/scripts/ovcesa2009_1140.nasl
   trunk/openvas-plugins/scripts/ovcesa2009_1148.nasl
   trunk/openvas-plugins/scripts/ovcesa2009_1159.nasl
   trunk/openvas-plugins/scripts/ovcesa2009_1176.nasl
   trunk/openvas-plugins/scripts/ovcesa2009_1178.nasl
   trunk/openvas-plugins/scripts/ovcesa2009_1193.nasl
   trunk/openvas-plugins/scripts/ovcesa2009_1201.nasl
   trunk/openvas-plugins/scripts/ovcesa2009_1205.nasl
   trunk/openvas-plugins/scripts/ovcesa2009_1289.nasl
   trunk/openvas-plugins/scripts/ovcesa2009_1341.nasl
   trunk/openvas-plugins/scripts/ovcesa2009_1427.nasl
   trunk/openvas-plugins/scripts/ovcesa2009_1430.nasl
   trunk/openvas-plugins/scripts/ovcesa2009_1431.nasl
   trunk/openvas-plugins/scripts/ovcesa2009_1432.nasl
   trunk/openvas-plugins/scripts/ovcesa2009_1438.nasl
   trunk/openvas-plugins/scripts/ovcesa2009_1452.nasl
   trunk/openvas-plugins/scripts/ovcesa2009_1459.nasl
   trunk/openvas-plugins/scripts/ovcesa2009_1471.nasl
   trunk/openvas-plugins/scripts/ovcesa2009_1484.nasl
   trunk/openvas-plugins/scripts/ovcesa2009_1500.nasl
   trunk/openvas-plugins/scripts/ovcesa2009_1501.nasl
   trunk/openvas-plugins/scripts/ovcesa2009_1502.nasl
   trunk/openvas-plugins/scripts/ovcesa2009_1503.nasl
   trunk/openvas-plugins/scripts/ovcesa2009_1512.nasl
   trunk/openvas-plugins/scripts/ovcesa2009_1529.nasl
   trunk/openvas-plugins/scripts/ovcesa2009_1548.nasl
   trunk/openvas-plugins/scripts/ovcesa2009_1550.nasl
   trunk/openvas-plugins/scripts/ovcesa2009_1579.nasl
   trunk/openvas-plugins/scripts/ovcesa2009_1580.nasl
   trunk/openvas-plugins/scripts/ovcesa2009_1584.nasl
   trunk/openvas-plugins/scripts/ovcesa2009_1620.nasl
   trunk/openvas-plugins/scripts/ovcesa2009_1670.nasl
   trunk/openvas-plugins/scripts/ovcesa2009_1671.nasl
   trunk/openvas-plugins/scripts/owa_sqlinject.nasl
   trunk/openvas-plugins/scripts/phpMyAdmin_remote_cmd.nasl
   trunk/openvas-plugins/scripts/phpMyAgenda_30final_file_include.nasl
   trunk/openvas-plugins/scripts/phpSurveyor_sql_inject.nasl
   trunk/openvas-plugins/scripts/php_5_2_13.nasl
   trunk/openvas-plugins/scripts/php_dec_2009.nasl
   trunk/openvas-plugins/scripts/phpdocumentor_1_3_remote_file_inclusion.nasl
   trunk/openvas-plugins/scripts/phpgroupware_35761.nasl
   trunk/openvas-plugins/scripts/phpmyadmin_36658.nasl
   trunk/openvas-plugins/scripts/phpmyadmin_37826.nasl
   trunk/openvas-plugins/scripts/phpmyfaq_action_parameter_flaw.nasl
   trunk/openvas-plugins/scripts/phptonuke_dir_trav.nasl
   trunk/openvas-plugins/scripts/phpweblog_xss.nasl
   trunk/openvas-plugins/scripts/phpwebthings_sql_injection.nasl
   trunk/openvas-plugins/scripts/plumecms_prepend_file_inclusion.nasl
   trunk/openvas-plugins/scripts/qk_smtp_server_dos.nasl
   trunk/openvas-plugins/scripts/quote.nasl
   trunk/openvas-plugins/scripts/rcblog_dir_transversal.nasl
   trunk/openvas-plugins/scripts/remote-MS03-018.nasl
   trunk/openvas-plugins/scripts/remote-MS04-011.nasl
   trunk/openvas-plugins/scripts/rt_37162.nasl
   trunk/openvas-plugins/scripts/secpod_adobe_shockwave_player_mult_code_exec_vuln_aug11.nasl
   trunk/openvas-plugins/scripts/secpod_adobe_shockwave_player_mult_code_exec_vuln_macosx.nasl
   trunk/openvas-plugins/scripts/secpod_ms11-057.nasl
   trunk/openvas-plugins/scripts/secpod_ms11-059.nasl
   trunk/openvas-plugins/scripts/secpod_ms11-060.nasl
   trunk/openvas-plugins/scripts/secpod_ms11-062.nasl
   trunk/openvas-plugins/scripts/secpod_ms11-063.nasl
   trunk/openvas-plugins/scripts/secpod_ms11-065.nasl
   trunk/openvas-plugins/scripts/secpod_ms11-068.nasl
   trunk/openvas-plugins/scripts/sun_dir_server_37699.nasl
   trunk/openvas-plugins/scripts/tftpd_overflow.nasl
   trunk/openvas-plugins/scripts/tikiwiki_multiple_input_flaws.nasl
   trunk/openvas-plugins/scripts/trac_sql_injection.nasl
   trunk/openvas-plugins/scripts/trillian_installed.nasl
   trunk/openvas-plugins/scripts/ubuntu_698_1.nasl
   trunk/openvas-plugins/scripts/ubuntu_698_2.nasl
   trunk/openvas-plugins/scripts/ubuntu_698_3.nasl
   trunk/openvas-plugins/scripts/ubuntu_699_1.nasl
   trunk/openvas-plugins/scripts/ubuntu_700_1.nasl
   trunk/openvas-plugins/scripts/ubuntu_700_2.nasl
   trunk/openvas-plugins/scripts/ubuntu_702_1.nasl
   trunk/openvas-plugins/scripts/ubuntu_707_1.nasl
   trunk/openvas-plugins/scripts/ubuntu_708_1.nasl
   trunk/openvas-plugins/scripts/ubuntu_710_1.nasl
   trunk/openvas-plugins/scripts/ubuntu_711_1.nasl
   trunk/openvas-plugins/scripts/ubuntu_712_1.nasl
   trunk/openvas-plugins/scripts/ubuntu_713_1.nasl
   trunk/openvas-plugins/scripts/ubuntu_715_1.nasl
   trunk/openvas-plugins/scripts/ubuntu_716_1.nasl
   trunk/openvas-plugins/scripts/ubuntu_719_1.nasl
   trunk/openvas-plugins/scripts/ubuntu_720_1.nasl
   trunk/openvas-plugins/scripts/ubuntu_723_1.nasl
   trunk/openvas-plugins/scripts/ubuntu_726_1.nasl
   trunk/openvas-plugins/scripts/ubuntu_726_2.nasl
   trunk/openvas-plugins/scripts/ubuntu_727_1.nasl
   trunk/openvas-plugins/scripts/ubuntu_727_2.nasl
   trunk/openvas-plugins/scripts/ubuntu_728_1.nasl
   trunk/openvas-plugins/scripts/ubuntu_730_1.nasl
   trunk/openvas-plugins/scripts/ubuntu_731_1.nasl
   trunk/openvas-plugins/scripts/ubuntu_732_1.nasl
   trunk/openvas-plugins/scripts/ubuntu_734_1.nasl
   trunk/openvas-plugins/scripts/ubuntu_735_1.nasl
   trunk/openvas-plugins/scripts/ubuntu_737_1.nasl
   trunk/openvas-plugins/scripts/ubuntu_742_1.nasl
   trunk/openvas-plugins/scripts/ubuntu_743_1.nasl
   trunk/openvas-plugins/scripts/ubuntu_744_1.nasl
   trunk/openvas-plugins/scripts/ubuntu_746_1.nasl
   trunk/openvas-plugins/scripts/ubuntu_747_1.nasl
   trunk/openvas-plugins/scripts/ubuntu_748_1.nasl
   trunk/openvas-plugins/scripts/ubuntu_752_1.nasl
   trunk/openvas-plugins/scripts/ubuntu_753_1.nasl
   trunk/openvas-plugins/scripts/ubuntu_755_1.nasl
   trunk/openvas-plugins/scripts/ubuntu_757_1.nasl
   trunk/openvas-plugins/scripts/ubuntu_759_1.nasl
   trunk/openvas-plugins/scripts/ubuntu_761_1.nasl
   trunk/openvas-plugins/scripts/ubuntu_761_2.nasl
   trunk/openvas-plugins/scripts/ubuntu_763_1.nasl
   trunk/openvas-plugins/scripts/ubuntu_764_1.nasl
   trunk/openvas-plugins/scripts/ubuntu_766_1.nasl
   trunk/openvas-plugins/scripts/ubuntu_769_1.nasl
   trunk/openvas-plugins/scripts/ubuntu_771_1.nasl
   trunk/openvas-plugins/scripts/ubuntu_772_1.nasl
   trunk/openvas-plugins/scripts/ubuntu_773_1.nasl
   trunk/openvas-plugins/scripts/ubuntu_774_1.nasl
   trunk/openvas-plugins/scripts/ubuntu_776_1.nasl
   trunk/openvas-plugins/scripts/ubuntu_776_2.nasl
   trunk/openvas-plugins/scripts/ubuntu_781_1.nasl
   trunk/openvas-plugins/scripts/ubuntu_781_2.nasl
   trunk/openvas-plugins/scripts/ubuntu_782_1.nasl
   trunk/openvas-plugins/scripts/ubuntu_785_1.nasl
   trunk/openvas-plugins/scripts/ubuntu_786_1.nasl
   trunk/openvas-plugins/scripts/ubuntu_787_1.nasl
   trunk/openvas-plugins/scripts/ubuntu_789_1.nasl
   trunk/openvas-plugins/scripts/ubuntu_791_1.nasl
   trunk/openvas-plugins/scripts/ubuntu_792_1.nasl
   trunk/openvas-plugins/scripts/ubuntu_799_1.nasl
   trunk/openvas-plugins/scripts/ubuntu_801_1.nasl
   trunk/openvas-plugins/scripts/ubuntu_802_1.nasl
   trunk/openvas-plugins/scripts/ubuntu_802_2.nasl
   trunk/openvas-plugins/scripts/ubuntu_805_1.nasl
   trunk/openvas-plugins/scripts/ubuntu_806_1.nasl
   trunk/openvas-plugins/scripts/ubuntu_809_1.nasl
   trunk/openvas-plugins/scripts/ubuntu_814_1.nasl
   trunk/openvas-plugins/scripts/ubuntu_825_1.nasl
   trunk/openvas-plugins/scripts/ubuntu_826_1.nasl
   trunk/openvas-plugins/scripts/ubuntu_830_1.nasl
   trunk/openvas-plugins/scripts/ubuntu_834_1.nasl
   trunk/openvas-plugins/scripts/ubuntu_838_1.nasl
   trunk/openvas-plugins/scripts/ubuntu_848_1.nasl
   trunk/openvas-plugins/scripts/ubuntu_850_1.nasl
   trunk/openvas-plugins/scripts/ubuntu_851_1.nasl
   trunk/openvas-plugins/scripts/ubuntu_854_1.nasl
   trunk/openvas-plugins/scripts/ubuntu_861_1.nasl
   trunk/openvas-plugins/scripts/ubuntu_862_1.nasl
   trunk/openvas-plugins/scripts/ubuntu_865_1.nasl
   trunk/openvas-plugins/scripts/ubuntu_875_1.nasl
   trunk/openvas-plugins/scripts/upd_xss_sql_injection.nasl
   trunk/openvas-plugins/scripts/uploadskrip.nasl
   trunk/openvas-plugins/scripts/ventrilo_dos.nasl
   trunk/openvas-plugins/scripts/viewvc_37518.nasl
   trunk/openvas-plugins/scripts/visnetic_mailserver_flaws.nasl
   trunk/openvas-plugins/scripts/vtiger_flaws.nasl
   trunk/openvas-plugins/scripts/webgui_remote_cmd_exec.nasl
   trunk/openvas-plugins/scripts/webnews.nasl
   trunk/openvas-plugins/scripts/webspirs_cgi.nasl
   trunk/openvas-plugins/scripts/wowBB_flaws.nasl
   trunk/openvas-plugins/scripts/wowBB_sql_injection.nasl
   trunk/openvas-plugins/scripts/wwwboardpwd.nasl
   trunk/openvas-plugins/scripts/xhp_cms_file_upload.nasl
   trunk/openvas-plugins/scripts/xnews.nasl
   trunk/openvas-plugins/scripts/xoops_viewtopic_xss.nasl
   trunk/openvas-plugins/scripts/xst_http_trace.nasl
   trunk/openvas-plugins/scripts/yabb_xss.nasl
   trunk/openvas-plugins/scripts/yacy_xss.nasl
   trunk/openvas-plugins/scripts/yapig_multiple_flaws.nasl
   trunk/openvas-plugins/scripts/yawcam_dir_traversal.nasl
   trunk/openvas-plugins/scripts/ypupdated_remote_exec.nasl
   trunk/openvas-plugins/scripts/zeroboard_flaws.nasl
   trunk/openvas-plugins/scripts/zeroboard_flaws2.nasl
   trunk/openvas-plugins/scripts/zeroboard_xss.nasl
   trunk/openvas-plugins/scripts/zml_cgi_traversal.nasl
   trunk/openvas-plugins/scripts/zope_zclass.nasl
   trunk/openvas-plugins/scripts/zyxel_http_pwd.nasl
Log:
Updated cvss scoring, risk information

Modified: trunk/openvas-plugins/ChangeLog
===================================================================
--- trunk/openvas-plugins/ChangeLog	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/ChangeLog	2011-09-06 12:05:16 UTC (rev 11570)
@@ -1,3 +1,861 @@
+2011-09-06 Thomas Reinke <reinke at securityspace.com>
+
+	* scripts/12planet_chat_server_xss.nasl,
+	scripts/4images_171_directory_traversal.nasl,
+	scripts/CA_License_Service_Stack_Overflow.nasl,
+	scripts/DDI_PIX_Firewall_Manager.nasl,
+	scripts/FormMail_34929.nasl,
+	scripts/RHSA_2008_0787.nasl,
+	scripts/RHSA_2009_0001.nasl,
+	scripts/RHSA_2009_0009.nasl,
+	scripts/RHSA_2009_0010.nasl,
+	scripts/RHSA_2009_0012.nasl,
+	scripts/RHSA_2009_0014.nasl,
+	scripts/RHSA_2009_0015.nasl,
+	scripts/RHSA_2009_0016.nasl,
+	scripts/RHSA_2009_0021.nasl,
+	scripts/RHSA_2009_0053.nasl,
+	scripts/RHSA_2009_0225.nasl,
+	scripts/RHSA_2009_0264.nasl,
+	scripts/RHSA_2009_0313.nasl,
+	scripts/RHSA_2009_0315.nasl,
+	scripts/RHSA_2009_0325.nasl,
+	scripts/RHSA_2009_0326.nasl,
+	scripts/RHSA_2009_0329.nasl,
+	scripts/RHSA_2009_0331.nasl,
+	scripts/RHSA_2009_0337.nasl,
+	scripts/RHSA_2009_0338.nasl,
+	scripts/RHSA_2009_0339.nasl,
+	scripts/RHSA_2009_0350.nasl,
+	scripts/RHSA_2009_0354.nasl,
+	scripts/RHSA_2009_0355.nasl,
+	scripts/RHSA_2009_0358.nasl,
+	scripts/RHSA_2009_0361.nasl,
+	scripts/RHSA_2009_0377.nasl,
+	scripts/RHSA_2009_0392.nasl,
+	scripts/RHSA_2009_0394.nasl,
+	scripts/RHSA_2009_0402.nasl,
+	scripts/RHSA_2009_0408.nasl,
+	scripts/RHSA_2009_0411.nasl,
+	scripts/RHSA_2009_0420.nasl,
+	scripts/RHSA_2009_0421.nasl,
+	scripts/RHSA_2009_0429.nasl,
+	scripts/RHSA_2009_0430.nasl,
+	scripts/RHSA_2009_0431.nasl,
+	scripts/RHSA_2009_0436.nasl,
+	scripts/RHSA_2009_0437.nasl,
+	scripts/RHSA_2009_0444.nasl,
+	scripts/RHSA_2009_0445.nasl,
+	scripts/RHSA_2009_0451.nasl,
+	scripts/RHSA_2009_0458.nasl,
+	scripts/RHSA_2009_0459.nasl,
+	scripts/RHSA_2009_0473.nasl,
+	scripts/RHSA_2009_0480.nasl,
+	scripts/RHSA_2009_1038.nasl,
+	scripts/RHSA_2009_1059.nasl,
+	scripts/RHSA_2009_1060.nasl,
+	scripts/RHSA_2009_1062.nasl,
+	scripts/RHSA_2009_1066.nasl,
+	scripts/RHSA_2009_1067.nasl,
+	scripts/RHSA_2009_1081.nasl,
+	scripts/RHSA_2009_1101.nasl,
+	scripts/RHSA_2009_1102.nasl,
+	scripts/RHSA_2009_1106.nasl,
+	scripts/RHSA_2009_1107.nasl,
+	scripts/RHSA_2009_1108.nasl,
+	scripts/RHSA_2009_1109.nasl,
+	scripts/RHSA_2009_1125.nasl,
+	scripts/RHSA_2009_1126.nasl,
+	scripts/RHSA_2009_1132.nasl,
+	scripts/RHSA_2009_1140.nasl,
+	scripts/RHSA_2009_1148.nasl,
+	scripts/RHSA_2009_1156.nasl,
+	scripts/RHSA_2009_1159.nasl,
+	scripts/RHSA_2009_1176.nasl,
+	scripts/RHSA_2009_1177.nasl,
+	scripts/RHSA_2009_1178.nasl,
+	scripts/RHSA_2009_1193.nasl,
+	scripts/RHSA_2009_1198.nasl,
+	scripts/RHSA_2009_1199.nasl,
+	scripts/RHSA_2009_1200.nasl,
+	scripts/RHSA_2009_1201.nasl,
+	scripts/RHSA_2009_1205.nasl,
+	scripts/RHSA_2009_1236.nasl,
+	scripts/RHSA_2009_1289.nasl,
+	scripts/RHSA_2009_1341.nasl,
+	scripts/RHSA_2009_1427.nasl,
+	scripts/RHSA_2009_1430.nasl,
+	scripts/RHSA_2009_1431.nasl,
+	scripts/RHSA_2009_1432.nasl,
+	scripts/RHSA_2009_1438.nasl,
+	scripts/RHSA_2009_1452.nasl,
+	scripts/RHSA_2009_1459.nasl,
+	scripts/RHSA_2009_1461.nasl,
+	scripts/RHSA_2009_1471.nasl,
+	scripts/RHSA_2009_1484.nasl,
+	scripts/RHSA_2009_1499.nasl,
+	scripts/RHSA_2009_1500.nasl,
+	scripts/RHSA_2009_1501.nasl,
+	scripts/RHSA_2009_1502.nasl,
+	scripts/RHSA_2009_1503.nasl,
+	scripts/RHSA_2009_1512.nasl,
+	scripts/RHSA_2009_1529.nasl,
+	scripts/RHSA_2009_1540.nasl,
+	scripts/RHSA_2009_1548.nasl,
+	scripts/RHSA_2009_1550.nasl,
+	scripts/RHSA_2009_1560.nasl,
+	scripts/RHSA_2009_1571.nasl,
+	scripts/RHSA_2009_1579.nasl,
+	scripts/RHSA_2009_1580.nasl,
+	scripts/RHSA_2009_1582.nasl,
+	scripts/RHSA_2009_1584.nasl,
+	scripts/RHSA_2009_1585.nasl,
+	scripts/RHSA_2009_1595.nasl,
+	scripts/RHSA_2009_1620.nasl,
+	scripts/RHSA_2009_1670.nasl,
+	scripts/RHSA_2009_1671.nasl,
+	scripts/RHSA_2009_1694.nasl,
+	scripts/SHN_Sendmail_DoublePipe.nasl,
+	scripts/aardvark_422_remote_file_include.nasl,
+	scripts/agora.nasl,
+	scripts/apache_Tomcat_Servlet_XSS.nasl,
+	scripts/apache_Tomcat_TroubleShooter.nasl,
+	scripts/apcupsd_overflows.nasl,
+	scripts/articlelive_xss.nasl,
+	scripts/aspdev_imgtag.nasl,
+	scripts/asterisk_sdp_header_overflow.nasl,
+	scripts/atutor_multiple_flaws.nasl,
+	scripts/atutor_password_reminder_sql.nasl,
+	scripts/atutor_xss.nasl,
+	scripts/basilix_arbitrary_file_disclosure.nasl,
+	scripts/basilix_attachment_disclosure.nasl,
+	scripts/basilix_message_content_script_injection.nasl,
+	scripts/basilix_sql_injection.nasl,
+	scripts/basilix_webmail.nasl,
+	scripts/bind_37118.nasl,
+	scripts/bookreview_xss.nasl,
+	scripts/calendar_express_flaws.nasl,
+	scripts/calendar_scheduler_xss.nasl,
+	scripts/cart32_xss.nasl,
+	scripts/cesarftp_mkd_command_buffer_overflow.nasl,
+	scripts/cgiwrap.nasl,
+	scripts/chargen.nasl,
+	scripts/cherokee_0_4_7.nasl,
+	scripts/cisco_default_pw.nasl,
+	scripts/cisco_ios_ftp_server_auth_bypass.nasl,
+	scripts/cisco_vpn_client_priv_escalation.nasl,
+	scripts/codethatshoppingcart_sql.nasl,
+	scripts/comersus_xss.nasl,
+	scripts/cubecart_xss.nasl,
+	scripts/cutenews_dir_traversal.nasl,
+	scripts/cutenews_indexphp_xss.nasl,
+	scripts/cutenews_show_news_xss.nasl,
+	scripts/deb_2070_1.nasl,
+	scripts/deb_2122_1.nasl,
+	scripts/deb_2190_1.nasl,
+	scripts/deb_2192_1.nasl,
+	scripts/deb_2197_1.nasl,
+	scripts/deb_2277_1.nasl,
+	scripts/deb_2279_1.nasl,
+	scripts/deb_2284_1.nasl,
+	scripts/e107_sql_injection.nasl,
+	scripts/easy_message_board_cmd_exec.nasl,
+	scripts/fcore_2008_11923.nasl,
+	scripts/fcore_2009_0059.nasl,
+	scripts/fcore_2009_0091.nasl,
+	scripts/fcore_2009_0154.nasl,
+	scripts/fcore_2009_0160.nasl,
+	scripts/fcore_2009_0268.nasl,
+	scripts/fcore_2009_0350.nasl,
+	scripts/fcore_2009_0483.nasl,
+	scripts/fcore_2009_0542.nasl,
+	scripts/fcore_2009_0544.nasl,
+	scripts/fcore_2009_0547.nasl,
+	scripts/fcore_2009_0814.nasl,
+	scripts/fcore_2009_0816.nasl,
+	scripts/fcore_2009_0819.nasl,
+	scripts/fcore_2009_0923.nasl,
+	scripts/fcore_2009_10165.nasl,
+	scripts/fcore_2009_10172.nasl,
+	scripts/fcore_2009_10525.nasl,
+	scripts/fcore_2009_10639.nasl,
+	scripts/fcore_2009_10648.nasl,
+	scripts/fcore_2009_10662.nasl,
+	scripts/fcore_2009_10694.nasl,
+	scripts/fcore_2009_10702.nasl,
+	scripts/fcore_2009_10737.nasl,
+	scripts/fcore_2009_10761.nasl,
+	scripts/fcore_2009_10891.nasl,
+	scripts/fcore_2009_11032.nasl,
+	scripts/fcore_2009_11038.nasl,
+	scripts/fcore_2009_11062.nasl,
+	scripts/fcore_2009_11314.nasl,
+	scripts/fcore_2009_11486.nasl,
+	scripts/fcore_2009_11487.nasl,
+	scripts/fcore_2009_11488.nasl,
+	scripts/fcore_2009_11489.nasl,
+	scripts/fcore_2009_11490.nasl,
+	scripts/fcore_2009_11491.nasl,
+	scripts/fcore_2009_12017.nasl,
+	scripts/fcore_2009_12180.nasl,
+	scripts/fcore_2009_12218.nasl,
+	scripts/fcore_2009_12229.nasl,
+	scripts/fcore_2009_12233.nasl,
+	scripts/fcore_2009_12305.nasl,
+	scripts/fcore_2009_12461.nasl,
+	scripts/fcore_2009_12506.nasl,
+	scripts/fcore_2009_12604.nasl,
+	scripts/fcore_2009_12606.nasl,
+	scripts/fcore_2009_12652.nasl,
+	scripts/fcore_2009_12750.nasl,
+	scripts/fcore_2009_12783.nasl,
+	scripts/fcore_2009_12817.nasl,
+	scripts/fcore_2009_12827.nasl,
+	scripts/fcore_2009_12966.nasl,
+	scripts/fcore_2009_12968.nasl,
+	scripts/fcore_2009_13040.nasl,
+	scripts/fcore_2009_13090.nasl,
+	scripts/fcore_2009_13098.nasl,
+	scripts/fcore_2009_13121.nasl,
+	scripts/fcore_2009_13236.nasl,
+	scripts/fcore_2009_13250.nasl,
+	scripts/fcore_2009_13466.nasl,
+	scripts/fcore_2009_13504.nasl,
+	scripts/fcore_2009_13694.nasl,
+	scripts/fcore_2009_1641.nasl,
+	scripts/fcore_2009_1699.nasl,
+	scripts/fcore_2009_1776.nasl,
+	scripts/fcore_2009_1824.nasl,
+	scripts/fcore_2009_2045.nasl,
+	scripts/fcore_2009_2128.nasl,
+	scripts/fcore_2009_2179.nasl,
+	scripts/fcore_2009_2231.nasl,
+	scripts/fcore_2009_2237.nasl,
+	scripts/fcore_2009_2417.nasl,
+	scripts/fcore_2009_2418.nasl,
+	scripts/fcore_2009_2419.nasl,
+	scripts/fcore_2009_2420.nasl,
+	scripts/fcore_2009_2784.nasl,
+	scripts/fcore_2009_2792.nasl,
+	scripts/fcore_2009_2834.nasl,
+	scripts/fcore_2009_2852.nasl,
+	scripts/fcore_2009_2882.nasl,
+	scripts/fcore_2009_2884.nasl,
+	scripts/fcore_2009_3034.nasl,
+	scripts/fcore_2009_3101.nasl,
+	scripts/fcore_2009_3161.nasl,
+	scripts/fcore_2009_3280.nasl,
+	scripts/fcore_2009_3283.nasl,
+	scripts/fcore_2009_3449.nasl,
+	scripts/fcore_2009_3453.nasl,
+	scripts/fcore_2009_3753.nasl,
+	scripts/fcore_2009_3769.nasl,
+	scripts/fcore_2009_3794.nasl,
+	scripts/fcore_2009_3820.nasl,
+	scripts/fcore_2009_3875.nasl,
+	scripts/fcore_2009_3893.nasl,
+	scripts/fcore_2009_3914.nasl,
+	scripts/fcore_2009_3967.nasl,
+	scripts/fcore_2009_4848.nasl,
+	scripts/fcore_2009_4870.nasl,
+	scripts/fcore_2009_4880.nasl,
+	scripts/fcore_2009_4883.nasl,
+	scripts/fcore_2009_5118.nasl,
+	scripts/fcore_2009_5383.nasl,
+	scripts/fcore_2009_5412.nasl,
+	scripts/fcore_2009_5423.nasl,
+	scripts/fcore_2009_5552.nasl,
+	scripts/fcore_2009_5583.nasl,
+	scripts/fcore_2009_5597.nasl,
+	scripts/fcore_2009_5969.nasl,
+	scripts/fcore_2009_6014.nasl,
+	scripts/fcore_2009_6261.nasl,
+	scripts/fcore_2009_6531.nasl,
+	scripts/fcore_2009_6603.nasl,
+	scripts/fcore_2009_6846.nasl,
+	scripts/fcore_2009_6972.nasl,
+	scripts/fcore_2009_6973.nasl,
+	scripts/fcore_2009_7335.nasl,
+	scripts/fcore_2009_7701.nasl,
+	scripts/fcore_2009_7729.nasl,
+	scripts/fcore_2009_7750.nasl,
+	scripts/fcore_2009_8264.nasl,
+	scripts/fcore_2009_8329.nasl,
+	scripts/fcore_2009_8337.nasl,
+	scripts/fcore_2009_8491.nasl,
+	scripts/fcore_2009_8529.nasl,
+	scripts/fcore_2009_8538.nasl,
+	scripts/fcore_2009_8582.nasl,
+	scripts/fcore_2009_8594.nasl,
+	scripts/fcore_2009_8647.nasl,
+	scripts/fcore_2009_8812.nasl,
+	scripts/fcore_2009_9044.nasl,
+	scripts/fcore_2009_9231.nasl,
+	scripts/fcore_2009_9232.nasl,
+	scripts/fcore_2009_9374.nasl,
+	scripts/fcore_2009_9391.nasl,
+	scripts/fcore_2009_9400.nasl,
+	scripts/fcore_2009_9405.nasl,
+	scripts/fcore_2009_9474.nasl,
+	scripts/fcore_2009_9837.nasl,
+	scripts/fishcart_sql_injection.nasl,
+	scripts/freebsd_ImageMagick6.nasl,
+	scripts/freebsd_apache-tomcat0.nasl,
+	scripts/freebsd_apache13.nasl,
+	scripts/freebsd_apache15.nasl,
+	scripts/freebsd_apr.nasl,
+	scripts/freebsd_awstats.nasl,
+	scripts/freebsd_bugzilla11.nasl,
+	scripts/freebsd_bugzilla12.nasl,
+	scripts/freebsd_bugzilla2.nasl,
+	scripts/freebsd_bzip2.nasl,
+	scripts/freebsd_cacti.nasl,
+	scripts/freebsd_clamav12.nasl,
+	scripts/freebsd_clamav4.nasl,
+	scripts/freebsd_clamav6.nasl,
+	scripts/freebsd_coppermine4.nasl,
+	scripts/freebsd_cups-base3.nasl,
+	scripts/freebsd_cups-base6.nasl,
+	scripts/freebsd_cups-base7.nasl,
+	scripts/freebsd_cups-lpr.nasl,
+	scripts/freebsd_cvs+ipv60.nasl,
+	scripts/freebsd_cyrus-sasl.nasl,
+	scripts/freebsd_dokuwiki2.nasl,
+	scripts/freebsd_drupal40.nasl,
+	scripts/freebsd_egroupware.nasl,
+	scripts/freebsd_enscript-a4.nasl,
+	scripts/freebsd_enscript-a40.nasl,
+	scripts/freebsd_ethereal0.nasl,
+	scripts/freebsd_ethereal3.nasl,
+	scripts/freebsd_ethereal5.nasl,
+	scripts/freebsd_fcron.nasl,
+	scripts/freebsd_firefox18.nasl,
+	scripts/freebsd_firefox22.nasl,
+	scripts/freebsd_firefox25.nasl,
+	scripts/freebsd_firefox26.nasl,
+	scripts/freebsd_firefox29.nasl,
+	scripts/freebsd_firefox32.nasl,
+	scripts/freebsd_firefox33.nasl,
+	scripts/freebsd_firefox35.nasl,
+	scripts/freebsd_firefox38.nasl,
+	scripts/freebsd_firefox47.nasl,
+	scripts/freebsd_firefox49.nasl,
+	scripts/freebsd_firefox50.nasl,
+	scripts/freebsd_firefox52.nasl,
+	scripts/freebsd_firefox54.nasl,
+	scripts/freebsd_firefox8.nasl,
+	scripts/freebsd_flyspray1.nasl,
+	scripts/freebsd_freetype2.nasl,
+	scripts/freebsd_fsplib.nasl,
+	scripts/freebsd_gd0.nasl,
+	scripts/freebsd_gd1.nasl,
+	scripts/freebsd_gforge0.nasl,
+	scripts/freebsd_gftp0.nasl,
+	scripts/freebsd_gnutls4.nasl,
+	scripts/freebsd_gzip.nasl,
+	scripts/freebsd_gzip0.nasl,
+	scripts/freebsd_heimdal1.nasl,
+	scripts/freebsd_ipsec-tools.nasl,
+	scripts/freebsd_isakmpd.nasl,
+	scripts/freebsd_jetty.nasl,
+	scripts/freebsd_joomla1.nasl,
+	scripts/freebsd_junkbuster.nasl,
+	scripts/freebsd_kdebase3.nasl,
+	scripts/freebsd_ktorrent.nasl,
+	scripts/freebsd_lha.nasl,
+	scripts/freebsd_libvorbis0.nasl,
+	scripts/freebsd_libvorbis1.nasl,
+	scripts/freebsd_libxine12.nasl,
+	scripts/freebsd_libxine5.nasl,
+	scripts/freebsd_libxml20.nasl,
+	scripts/freebsd_libxml21.nasl,
+	scripts/freebsd_linux-flashplugin0.nasl,
+	scripts/freebsd_linux-flashplugin1.nasl,
+	scripts/freebsd_linux-flashplugin2.nasl,
+	scripts/freebsd_linux-flashplugin4.nasl,
+	scripts/freebsd_linux-flashplugin8.nasl,
+	scripts/freebsd_linux_base.nasl,
+	scripts/freebsd_mailman7.nasl,
+	scripts/freebsd_mantis4.nasl,
+	scripts/freebsd_mediawiki2.nasl,
+	scripts/freebsd_moinmoin1.nasl,
+	scripts/freebsd_mysql-server10.nasl,
+	scripts/freebsd_mysql-server17.nasl,
+	scripts/freebsd_openfire1.nasl,
+	scripts/freebsd_openoffice.org.nasl,
+	scripts/freebsd_opensaml2.nasl,
+	scripts/freebsd_openssh.nasl,
+	scripts/freebsd_openssl2.nasl,
+	scripts/freebsd_opera23.nasl,
+	scripts/freebsd_opera5.nasl,
+	scripts/freebsd_pcre0.nasl,
+	scripts/freebsd_php40.nasl,
+	scripts/freebsd_php5-imap.nasl,
+	scripts/freebsd_php51.nasl,
+	scripts/freebsd_php56.nasl,
+	scripts/freebsd_php57.nasl,
+	scripts/freebsd_phpMyAdmin20.nasl,
+	scripts/freebsd_phpMyAdmin24.nasl,
+	scripts/freebsd_phpbb8.nasl,
+	scripts/freebsd_phpbb9.nasl,
+	scripts/freebsd_phpmyadmin1.nasl,
+	scripts/freebsd_phpmyadmin11.nasl,
+	scripts/freebsd_phpnuke.nasl,
+	scripts/freebsd_pidgin.nasl,
+	scripts/freebsd_png0.nasl,
+	scripts/freebsd_postfix-policyd-weight.nasl,
+	scripts/freebsd_postgresql-client.nasl,
+	scripts/freebsd_postgresql3.nasl,
+	scripts/freebsd_postgresql4.nasl,
+	scripts/freebsd_postnuke1.nasl,
+	scripts/freebsd_powerdns-recursor0.nasl,
+	scripts/freebsd_quake2forge.nasl,
+	scripts/freebsd_rt.nasl,
+	scripts/freebsd_samba12.nasl,
+	scripts/freebsd_sdl_image.nasl,
+	scripts/freebsd_seamonkey.nasl,
+	scripts/freebsd_seamonkey0.nasl,
+	scripts/freebsd_shtool.nasl,
+	scripts/freebsd_skype.nasl,
+	scripts/freebsd_squirrelmail.nasl,
+	scripts/freebsd_thunderbird0.nasl,
+	scripts/freebsd_tikiwik.nasl,
+	scripts/freebsd_tikiwiki.nasl,
+	scripts/freebsd_tomcat.nasl,
+	scripts/freebsd_tor5.nasl,
+	scripts/freebsd_tptest.nasl,
+	scripts/freebsd_twiki2.nasl,
+	scripts/freebsd_typo31.nasl,
+	scripts/freebsd_typo32.nasl,
+	scripts/freebsd_vim0.nasl,
+	scripts/freebsd_webkit-gtk2.nasl,
+	scripts/freebsd_webkit-gtk21.nasl,
+	scripts/freebsd_websvn.nasl,
+	scripts/freebsd_wireshark0.nasl,
+	scripts/freebsd_wordpress0.nasl,
+	scripts/freebsd_xfce4-panel.nasl,
+	scripts/freebsd_xorg-server1.nasl,
+	scripts/freebsd_xpdf3.nasl,
+	scripts/freebsdsa_bind10.nasl,
+	scripts/freebsdsa_bind8.nasl,
+	scripts/freebsdsa_ssl.nasl,
+	scripts/freesshd_key_exchange_overflow.nasl,
+	scripts/gb_CESA-2011_0841_systemtap_centos5_i386.nasl,
+	scripts/gb_CESA-2011_1155_xorg-x11_centos4_i386.nasl,
+	scripts/gb_CESA-2011_1161_freetype_centos4_i386.nasl,
+	scripts/gb_CESA-2011_1164_firefox_centos4_i386.nasl,
+	scripts/gb_CESA-2011_1165_thunderbird_centos4_i386.nasl,
+	scripts/gb_CESA-2011_1167_seamonkey_centos4_i386.nasl,
+	scripts/gb_CESA-2011_1196_system-config-printer_centos4_i386.nasl,
+	scripts/gb_RHSA-2011_0841-01_systemtap.nasl,
+	scripts/gb_RHSA-2011_1154-01_libXfont.nasl,
+	scripts/gb_RHSA-2011_1155-01_xorg-x11.nasl,
+	scripts/gb_RHSA-2011_1161-01_freetype.nasl,
+	scripts/gb_RHSA-2011_1164-01_firefox.nasl,
+	scripts/gb_RHSA-2011_1165-01_thunderbird.nasl,
+	scripts/gb_RHSA-2011_1167-01_seamonkey.nasl,
+	scripts/gb_RHSA-2011_1196-01_system-config-printer.nasl,
+	scripts/gb_fedora_2011_10782_gimp_fc14.nasl,
+	scripts/gb_fedora_2011_10788_gimp_fc15.nasl,
+	scripts/gb_fedora_2011_7289_systemtap_fc13.nasl,
+	scripts/gb_fedora_2011_7302_systemtap_fc14.nasl,
+	scripts/gb_fedora_2011_7820_libxml_fc15.nasl,
+	scripts/gb_fedora_2011_7856_libxml_fc14.nasl,
+	scripts/gb_fedora_2011_9130_kernel_fc15.nasl,
+	scripts/gb_fedora_2011_9763_libsoup_fc15.nasl,
+	scripts/gb_hp_performance_insight_49096.nasl,
+	scripts/gb_mandriva_MDVSA_2011_127.nasl,
+	scripts/gb_orion_npm_45257.nasl,
+	scripts/gb_otrs_49251.nasl,
+	scripts/gb_phpmyadmin_49306.nasl,
+	scripts/gb_ubuntu_USN_1153_1.nasl,
+	scripts/gb_ubuntu_USN_1181_1.nasl,
+	scripts/gb_ubuntu_USN_1191_1.nasl,
+	scripts/gb_ubuntu_USN_1192_1.nasl,
+	scripts/gb_ubuntu_USN_1192_2.nasl,
+	scripts/gcards_dir_transversal.nasl,
+	scripts/goaheadwebserver_source_disclosure.nasl,
+	scripts/guppy_directory_traversal.nasl,
+	scripts/guppy_request_header_flaws.nasl,
+	scripts/hcl_file_include.nasl,
+	scripts/http_w98_devname_dos.nasl,
+	scripts/icq_installed.nasl,
+	scripts/idealbb_multiple_flaws.nasl,
+	scripts/iis_decode_bug.nasl,
+	scripts/iis_ida_isapi.nasl,
+	scripts/iis_nat.nasl,
+	scripts/includer_rcmdexec.nasl,
+	scripts/ipswitch_whatsup_info_disclosure.nasl,
+	scripts/kayako_sql_injection.nasl,
+	scripts/kazaa_installed.nasl,
+	scripts/kerberos_CB-A08-0044.nasl,
+	scripts/kerio_webmail_multiple_flaws.nasl,
+	scripts/kiwi_cattools_dir_traversal.nasl,
+	scripts/ldap_null_bind.nasl,
+	scripts/ldu_801.nasl,
+	scripts/ldu_sql_injection.nasl,
+	scripts/limbo_multiple_flaws.nasl,
+	scripts/linksys_multiple_vulns.nasl,
+	scripts/lotus_domino_ldap_dos.nasl,
+	scripts/lotus_domino_xss.nasl,
+	scripts/mailenable_imap_rename_dos.nasl,
+	scripts/mailgust_sql_injection.nasl,
+	scripts/mailman_privatepy_directory_traversal.nasl,
+	scripts/mailreader.nasl,
+	scripts/mantis_file_incl_sql_inject.nasl,
+	scripts/mantis_multiple_vulns4.nasl,
+	scripts/mdksa_2009_003.nasl,
+	scripts/mdksa_2009_008.nasl,
+	scripts/mdksa_2009_009.nasl,
+	scripts/mdksa_2009_016.nasl,
+	scripts/mdksa_2009_020.nasl,
+	scripts/mdksa_2009_022.nasl,
+	scripts/mdksa_2009_023.nasl,
+	scripts/mdksa_2009_026.nasl,
+	scripts/mdksa_2009_026_1.nasl,
+	scripts/mdksa_2009_036.nasl,
+	scripts/mdksa_2009_041.nasl,
+	scripts/mdksa_2009_051.nasl,
+	scripts/mdksa_2009_065.nasl,
+	scripts/mdksa_2009_075.nasl,
+	scripts/mdksa_2009_078.nasl,
+	scripts/mdksa_2009_083.nasl,
+	scripts/mdksa_2009_085.nasl,
+	scripts/mdksa_2009_094.nasl,
+	scripts/mdksa_2009_095.nasl,
+	scripts/mdksa_2009_096.nasl,
+	scripts/mdksa_2009_096_1.nasl,
+	scripts/mdksa_2009_097.nasl,
+	scripts/mdksa_2009_098.nasl,
+	scripts/mdksa_2009_098_1.nasl,
+	scripts/mdksa_2009_099.nasl,
+	scripts/mdksa_2009_099_1.nasl,
+	scripts/mdksa_2009_101.nasl,
+	scripts/mdksa_2009_110.nasl,
+	scripts/mdksa_2009_111.nasl,
+	scripts/mdksa_2009_111_1.nasl,
+	scripts/mdksa_2009_115.nasl,
+	scripts/mdksa_2009_116.nasl,
+	scripts/mdksa_2009_118.nasl,
+	scripts/mdksa_2009_119.nasl,
+	scripts/mdksa_2009_121.nasl,
+	scripts/mdksa_2009_121_1.nasl,
+	scripts/mdksa_2009_131.nasl,
+	scripts/mdksa_2009_131_1.nasl,
+	scripts/mdksa_2009_135.nasl,
+	scripts/mdksa_2009_137.nasl,
+	scripts/mdksa_2009_140.nasl,
+	scripts/mdksa_2009_141.nasl,
+	scripts/mdksa_2009_142.nasl,
+	scripts/mdksa_2009_142_1.nasl,
+	scripts/mdksa_2009_143.nasl,
+	scripts/mdksa_2009_144.nasl,
+	scripts/mdksa_2009_147.nasl,
+	scripts/mdksa_2009_149.nasl,
+	scripts/mdksa_2009_150.nasl,
+	scripts/mdksa_2009_162.nasl,
+	scripts/mdksa_2009_164.nasl,
+	scripts/mdksa_2009_165.nasl,
+	scripts/mdksa_2009_168.nasl,
+	scripts/mdksa_2009_169.nasl,
+	scripts/mdksa_2009_169_1.nasl,
+	scripts/mdksa_2009_173.nasl,
+	scripts/mdksa_2009_183.nasl,
+	scripts/mdksa_2009_185.nasl,
+	scripts/mdksa_2009_194.nasl,
+	scripts/mdksa_2009_197.nasl,
+	scripts/mdksa_2009_197_2.nasl,
+	scripts/mdksa_2009_197_3.nasl,
+	scripts/mdksa_2009_198.nasl,
+	scripts/mdksa_2009_203.nasl,
+	scripts/mdksa_2009_203_1.nasl,
+	scripts/mdksa_2009_209.nasl,
+	scripts/mdksa_2009_216.nasl,
+	scripts/mdksa_2009_230.nasl,
+	scripts/mdksa_2009_237.nasl,
+	scripts/mdksa_2009_238.nasl,
+	scripts/mdksa_2009_239.nasl,
+	scripts/mdksa_2009_240.nasl,
+	scripts/mdksa_2009_242.nasl,
+	scripts/mdksa_2009_242_1.nasl,
+	scripts/mdksa_2009_246.nasl,
+	scripts/mdksa_2009_247.nasl,
+	scripts/mdksa_2009_251_1.nasl,
+	scripts/mdksa_2009_256.nasl,
+	scripts/mdksa_2009_256_1.nasl,
+	scripts/mdksa_2009_258.nasl,
+	scripts/mdksa_2009_268.nasl,
+	scripts/mdksa_2009_281.nasl,
+	scripts/mdksa_2009_282.nasl,
+	scripts/mdksa_2009_282_1.nasl,
+	scripts/mdksa_2009_283.nasl,
+	scripts/mdksa_2009_287.nasl,
+	scripts/mdksa_2009_287_1.nasl,
+	scripts/mdksa_2009_292.nasl,
+	scripts/mdksa_2009_292_1.nasl,
+	scripts/mdksa_2009_297.nasl,
+	scripts/mdksa_2009_297_1.nasl,
+	scripts/mdksa_2009_298.nasl,
+	scripts/mdksa_2009_299.nasl,
+	scripts/mdksa_2009_301.nasl,
+	scripts/mdksa_2009_303.nasl,
+	scripts/mdksa_2009_308.nasl,
+	scripts/mdksa_2009_310.nasl,
+	scripts/mdksa_2009_311.nasl,
+	scripts/mdksa_2009_313_1.nasl,
+	scripts/mdksa_2009_317.nasl,
+	scripts/mdksa_2009_318.nasl,
+	scripts/mdksa_2009_319.nasl,
+	scripts/mdksa_2009_320.nasl,
+	scripts/mdksa_2009_321.nasl,
+	scripts/mdksa_2009_323.nasl,
+	scripts/mdksa_2009_324.nasl,
+	scripts/mdksa_2009_326.nasl,
+	scripts/mdksa_2009_327.nasl,
+	scripts/mdksa_2009_330.nasl,
+	scripts/mdksa_2009_331.nasl,
+	scripts/mdksa_2009_334.nasl,
+	scripts/mdksa_2009_335.nasl,
+	scripts/mdksa_2009_344.nasl,
+	scripts/merak_multiple_vulns.nasl,
+	scripts/mercur_imap_buffer_overflow.nasl,
+	scripts/mercuryboard_multiple_vuln.nasl,
+	scripts/microsoft-iis-nlst-stack-overflow.nasl,
+	scripts/moodle_sql_inject.nasl,
+	scripts/mozilla_firefox_xul_spoof.nasl,
+	scripts/ms07-016.nasl,
+	scripts/ms07-045.nasl,
+	scripts/ms07-057.nasl,
+	scripts/ms_smb2_highid.nasl,
+	scripts/mssql_version.nasl,
+	scripts/mybloggie_sql_injection.nasl,
+	scripts/mysql_single_row_subselect_dos.nasl,
+	scripts/nph-publish.nasl,
+	scripts/nsm2004_dos.nasl,
+	scripts/openwebmail_logindomain_xss.nasl,
+	scripts/opera_favicon_address_bar_spoofing.nasl,
+	scripts/oracle9i_java_process_manager.nasl,
+	scripts/ovcesa2009_0001_01.nasl,
+	scripts/ovcesa2009_0010.nasl,
+	scripts/ovcesa2009_0012.nasl,
+	scripts/ovcesa2009_0014.nasl,
+	scripts/ovcesa2009_0313.nasl,
+	scripts/ovcesa2009_0315.nasl,
+	scripts/ovcesa2009_0325.nasl,
+	scripts/ovcesa2009_0325_01.nasl,
+	scripts/ovcesa2009_0326.nasl,
+	scripts/ovcesa2009_0329.nasl,
+	scripts/ovcesa2009_0331.nasl,
+	scripts/ovcesa2009_0337.nasl,
+	scripts/ovcesa2009_0338.nasl,
+	scripts/ovcesa2009_0354.nasl,
+	scripts/ovcesa2009_0355.nasl,
+	scripts/ovcesa2009_0358.nasl,
+	scripts/ovcesa2009_0361.nasl,
+	scripts/ovcesa2009_0377.nasl,
+	scripts/ovcesa2009_0402.nasl,
+	scripts/ovcesa2009_0408.nasl,
+	scripts/ovcesa2009_0411.nasl,
+	scripts/ovcesa2009_0420.nasl,
+	scripts/ovcesa2009_0429.nasl,
+	scripts/ovcesa2009_0430.nasl,
+	scripts/ovcesa2009_0431.nasl,
+	scripts/ovcesa2009_0436.nasl,
+	scripts/ovcesa2009_0437.nasl,
+	scripts/ovcesa2009_0437_02.nasl,
+	scripts/ovcesa2009_0444.nasl,
+	scripts/ovcesa2009_0458.nasl,
+	scripts/ovcesa2009_0459.nasl,
+	scripts/ovcesa2009_0473.nasl,
+	scripts/ovcesa2009_0480.nasl,
+	scripts/ovcesa2009_1059.nasl,
+	scripts/ovcesa2009_1060.nasl,
+	scripts/ovcesa2009_1066.nasl,
+	scripts/ovcesa2009_1101.nasl,
+	scripts/ovcesa2009_1102.nasl,
+	scripts/ovcesa2009_1106.nasl,
+	scripts/ovcesa2009_1107.nasl,
+	scripts/ovcesa2009_1108.nasl,
+	scripts/ovcesa2009_1126.nasl,
+	scripts/ovcesa2009_1140.nasl,
+	scripts/ovcesa2009_1148.nasl,
+	scripts/ovcesa2009_1159.nasl,
+	scripts/ovcesa2009_1176.nasl,
+	scripts/ovcesa2009_1178.nasl,
+	scripts/ovcesa2009_1193.nasl,
+	scripts/ovcesa2009_1201.nasl,
+	scripts/ovcesa2009_1205.nasl,
+	scripts/ovcesa2009_1289.nasl,
+	scripts/ovcesa2009_1341.nasl,
+	scripts/ovcesa2009_1427.nasl,
+	scripts/ovcesa2009_1430.nasl,
+	scripts/ovcesa2009_1431.nasl,
+	scripts/ovcesa2009_1432.nasl,
+	scripts/ovcesa2009_1438.nasl,
+	scripts/ovcesa2009_1452.nasl,
+	scripts/ovcesa2009_1459.nasl,
+	scripts/ovcesa2009_1471.nasl,
+	scripts/ovcesa2009_1484.nasl,
+	scripts/ovcesa2009_1500.nasl,
+	scripts/ovcesa2009_1501.nasl,
+	scripts/ovcesa2009_1502.nasl,
+	scripts/ovcesa2009_1503.nasl,
+	scripts/ovcesa2009_1512.nasl,
+	scripts/ovcesa2009_1529.nasl,
+	scripts/ovcesa2009_1548.nasl,
+	scripts/ovcesa2009_1550.nasl,
+	scripts/ovcesa2009_1579.nasl,
+	scripts/ovcesa2009_1580.nasl,
+	scripts/ovcesa2009_1584.nasl,
+	scripts/ovcesa2009_1620.nasl,
+	scripts/ovcesa2009_1670.nasl,
+	scripts/ovcesa2009_1671.nasl,
+	scripts/owa_sqlinject.nasl,
+	scripts/phpMyAdmin_remote_cmd.nasl,
+	scripts/phpMyAgenda_30final_file_include.nasl,
+	scripts/phpSurveyor_sql_inject.nasl,
+	scripts/php_5_2_13.nasl,
+	scripts/php_dec_2009.nasl,
+	scripts/phpdocumentor_1_3_remote_file_inclusion.nasl,
+	scripts/phpgroupware_35761.nasl,
+	scripts/phpmyadmin_36658.nasl,
+	scripts/phpmyadmin_37826.nasl,
+	scripts/phpmyfaq_action_parameter_flaw.nasl,
+	scripts/phptonuke_dir_trav.nasl,
+	scripts/phpweblog_xss.nasl,
+	scripts/phpwebthings_sql_injection.nasl,
+	scripts/plumecms_prepend_file_inclusion.nasl,
+	scripts/qk_smtp_server_dos.nasl,
+	scripts/quote.nasl,
+	scripts/rcblog_dir_transversal.nasl,
+	scripts/remote-MS03-018.nasl,
+	scripts/remote-MS04-011.nasl,
+	scripts/rt_37162.nasl,
+	scripts/secpod_adobe_shockwave_player_mult_code_exec_vuln_aug11.nasl,
+	scripts/secpod_adobe_shockwave_player_mult_code_exec_vuln_macosx.nasl,
+	scripts/secpod_ms11-057.nasl,
+	scripts/secpod_ms11-059.nasl,
+	scripts/secpod_ms11-060.nasl,
+	scripts/secpod_ms11-062.nasl,
+	scripts/secpod_ms11-063.nasl,
+	scripts/secpod_ms11-065.nasl,
+	scripts/secpod_ms11-068.nasl,
+	scripts/sun_dir_server_37699.nasl,
+	scripts/tftpd_overflow.nasl,
+	scripts/tikiwiki_multiple_input_flaws.nasl,
+	scripts/trac_sql_injection.nasl,
+	scripts/trillian_installed.nasl,
+	scripts/ubuntu_698_1.nasl,
+	scripts/ubuntu_698_2.nasl,
+	scripts/ubuntu_698_3.nasl,
+	scripts/ubuntu_699_1.nasl,
+	scripts/ubuntu_700_1.nasl,
+	scripts/ubuntu_700_2.nasl,
+	scripts/ubuntu_702_1.nasl,
+	scripts/ubuntu_707_1.nasl,
+	scripts/ubuntu_708_1.nasl,
+	scripts/ubuntu_710_1.nasl,
+	scripts/ubuntu_711_1.nasl,
+	scripts/ubuntu_712_1.nasl,
+	scripts/ubuntu_713_1.nasl,
+	scripts/ubuntu_715_1.nasl,
+	scripts/ubuntu_716_1.nasl,
+	scripts/ubuntu_719_1.nasl,
+	scripts/ubuntu_720_1.nasl,
+	scripts/ubuntu_723_1.nasl,
+	scripts/ubuntu_726_1.nasl,
+	scripts/ubuntu_726_2.nasl,
+	scripts/ubuntu_727_1.nasl,
+	scripts/ubuntu_727_2.nasl,
+	scripts/ubuntu_728_1.nasl,
+	scripts/ubuntu_730_1.nasl,
+	scripts/ubuntu_731_1.nasl,
+	scripts/ubuntu_732_1.nasl,
+	scripts/ubuntu_734_1.nasl,
+	scripts/ubuntu_735_1.nasl,
+	scripts/ubuntu_737_1.nasl,
+	scripts/ubuntu_742_1.nasl,
+	scripts/ubuntu_743_1.nasl,
+	scripts/ubuntu_744_1.nasl,
+	scripts/ubuntu_746_1.nasl,
+	scripts/ubuntu_747_1.nasl,
+	scripts/ubuntu_748_1.nasl,
+	scripts/ubuntu_752_1.nasl,
+	scripts/ubuntu_753_1.nasl,
+	scripts/ubuntu_755_1.nasl,
+	scripts/ubuntu_757_1.nasl,
+	scripts/ubuntu_759_1.nasl,
+	scripts/ubuntu_761_1.nasl,
+	scripts/ubuntu_761_2.nasl,
+	scripts/ubuntu_763_1.nasl,
+	scripts/ubuntu_764_1.nasl,
+	scripts/ubuntu_766_1.nasl,
+	scripts/ubuntu_769_1.nasl,
+	scripts/ubuntu_771_1.nasl,
+	scripts/ubuntu_772_1.nasl,
+	scripts/ubuntu_773_1.nasl,
+	scripts/ubuntu_774_1.nasl,
+	scripts/ubuntu_776_1.nasl,
+	scripts/ubuntu_776_2.nasl,
+	scripts/ubuntu_781_1.nasl,
+	scripts/ubuntu_781_2.nasl,
+	scripts/ubuntu_782_1.nasl,
+	scripts/ubuntu_785_1.nasl,
+	scripts/ubuntu_786_1.nasl,
+	scripts/ubuntu_787_1.nasl,
+	scripts/ubuntu_789_1.nasl,
+	scripts/ubuntu_791_1.nasl,
+	scripts/ubuntu_792_1.nasl,
+	scripts/ubuntu_799_1.nasl,
+	scripts/ubuntu_801_1.nasl,
+	scripts/ubuntu_802_1.nasl,
+	scripts/ubuntu_802_2.nasl,
+	scripts/ubuntu_805_1.nasl,
+	scripts/ubuntu_806_1.nasl,
+	scripts/ubuntu_809_1.nasl,
+	scripts/ubuntu_814_1.nasl,
+	scripts/ubuntu_825_1.nasl,
+	scripts/ubuntu_826_1.nasl,
+	scripts/ubuntu_830_1.nasl,
+	scripts/ubuntu_834_1.nasl,
+	scripts/ubuntu_838_1.nasl,
+	scripts/ubuntu_848_1.nasl,
+	scripts/ubuntu_850_1.nasl,
+	scripts/ubuntu_851_1.nasl,
+	scripts/ubuntu_854_1.nasl,
+	scripts/ubuntu_861_1.nasl,
+	scripts/ubuntu_862_1.nasl,
+	scripts/ubuntu_865_1.nasl,
+	scripts/ubuntu_875_1.nasl,
+	scripts/upd_xss_sql_injection.nasl,
+	scripts/uploadskrip.nasl,
+	scripts/ventrilo_dos.nasl,
+	scripts/viewvc_37518.nasl,
+	scripts/visnetic_mailserver_flaws.nasl,
+	scripts/vtiger_flaws.nasl,
+	scripts/webgui_remote_cmd_exec.nasl,
+	scripts/webnews.nasl,
+	scripts/webspirs_cgi.nasl,
+	scripts/wowBB_flaws.nasl,
+	scripts/wowBB_sql_injection.nasl,
+	scripts/wwwboardpwd.nasl,
+	scripts/xhp_cms_file_upload.nasl,
+	scripts/xnews.nasl,
+	scripts/xoops_viewtopic_xss.nasl,
+	scripts/xst_http_trace.nasl,
+	scripts/yabb_xss.nasl,
+	scripts/yacy_xss.nasl,
+	scripts/yapig_multiple_flaws.nasl,
+	scripts/yawcam_dir_traversal.nasl,
+	scripts/ypupdated_remote_exec.nasl,
+	scripts/zeroboard_flaws.nasl,
+	scripts/zeroboard_flaws2.nasl,
+	scripts/zeroboard_xss.nasl,
+	scripts/zml_cgi_traversal.nasl,
+	scripts/zope_zclass.nasl,
+	scripts/zyxel_http_pwd.nasl:
+	Updated cvss scoring information, risk values in tags and body
+
 2011-09-06  Henri Doreau <henri.doreau at greenbone.net>
 
 	* scripts/cpe.inc: Fixed several incorrect entries.

Modified: trunk/openvas-plugins/scripts/12planet_chat_server_xss.nasl
===================================================================
--- trunk/openvas-plugins/scripts/12planet_chat_server_xss.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/12planet_chat_server_xss.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -32,8 +32,8 @@
  script_cve_id("CVE-2004-0678");
  script_bugtraq_id(10659);
  script_version("$Revision$");
- script_tag(name:"cvss_base", value:"3.0");
- script_tag(name:"risk_factor", value:"Medium");
+ script_tag(name:"cvss_base", value:"6.8");
+ script_tag(name:"risk_factor", value:"High");
  
  name = "12Planet Chat Server one2planet.infolet.InfoServlet XSS";
 
@@ -59,7 +59,7 @@
 
 Upgrade to the newest version of this software
 
-Risk factor: Medium / CVSS Base Score : 3
+Risk factor : High / CVSS Base Score : 3
 (AV:R/AC:H/Au:NR/C:P/A:N/I:N/B:C)";
 
  script_description(desc);

Modified: trunk/openvas-plugins/scripts/4images_171_directory_traversal.nasl
===================================================================
--- trunk/openvas-plugins/scripts/4images_171_directory_traversal.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/4images_171_directory_traversal.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -28,7 +28,7 @@
 if (description) {
  script_id(21020);
  script_version("$Revision$");
- script_tag(name:"cvss_base", value:"7.0");
+ script_tag(name:"cvss_base", value:"7.5");
  script_tag(name:"risk_factor", value:"High");
 
  script_cve_id("CVE-2006-0899");

Modified: trunk/openvas-plugins/scripts/CA_License_Service_Stack_Overflow.nasl
===================================================================
--- trunk/openvas-plugins/scripts/CA_License_Service_Stack_Overflow.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/CA_License_Service_Stack_Overflow.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -34,8 +34,8 @@
  script_cve_id("CVE-2005-0581, CVE-2005-0582, CVE-2005-0583");
 
  script_version ("$Revision$");
- script_tag(name:"cvss_base", value:"10.0");
- script_tag(name:"risk_factor", value:"Critical");
+ script_tag(name:"cvss_base", value:"4.6");
+ script_tag(name:"risk_factor", value:"Medium");
  name = "CA License Service Multiple Vulnerabilities";
 
  script_name(name);

Modified: trunk/openvas-plugins/scripts/DDI_PIX_Firewall_Manager.nasl
===================================================================
--- trunk/openvas-plugins/scripts/DDI_PIX_Firewall_Manager.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/DDI_PIX_Firewall_Manager.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,7 +30,7 @@
  script_id(10819);
  script_bugtraq_id(691);
  script_version("$Revision$");
- script_tag(name:"cvss_base", value:"4.0");
+ script_tag(name:"cvss_base", value:"5.0");
  script_tag(name:"risk_factor", value:"Medium");
  script_cve_id("CVE-1999-0158");
 

Modified: trunk/openvas-plugins/scripts/FormMail_34929.nasl
===================================================================
--- trunk/openvas-plugins/scripts/FormMail_34929.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/FormMail_34929.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -31,7 +31,7 @@
  script_cve_id("CVE-2009-1776");
  script_bugtraq_id(34929);
  script_version ("1.0");
- script_tag(name:"cvss_base", value:"5.0");
+ script_tag(name:"cvss_base", value:"4.3");
  script_tag(name:"risk_factor", value:"Medium");
 
  script_name("Matt Wright FormMail HTTP Response Splitting and Cross Site Scripting Vulnerabilities");

Modified: trunk/openvas-plugins/scripts/RHSA_2008_0787.nasl
===================================================================
--- trunk/openvas-plugins/scripts/RHSA_2008_0787.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/RHSA_2008_0787.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,8 +30,8 @@
  script_id(63097);
  script_cve_id("CVE-2007-3848", "CVE-2006-4538", "CVE-2006-4814", "CVE-2007-4308", "CVE-2007-2172", "CVE-2007-6063", "CVE-2007-6206", "CVE-2007-6151", "CVE-2008-0007", "CVE-2008-2136", "CVE-2008-3275", "CVE-2008-3525", "CVE-2008-4210");
  script_version ("$");
- script_tag(name:"cvss_base", value:"7.8");
- script_tag(name:"risk_factor", value:"High");
+ script_tag(name:"cvss_base", value:"1.9");
+ script_tag(name:"risk_factor", value:"Low");
  name = "RedHat Security Advisory RHSA-2008:0787";
  script_name(name);
 
@@ -53,7 +53,7 @@
 http://rhn.redhat.com/errata/RHSA-2008-0787.html
 http://www.redhat.com/security/updates/classification/#important
 
-Risk factor : High";
+Risk factor : Low";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/RHSA_2009_0001.nasl
===================================================================
--- trunk/openvas-plugins/scripts/RHSA_2009_0001.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/RHSA_2009_0001.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,8 +30,8 @@
  script_id(63132);
  script_cve_id("CVE-2006-4814", "CVE-2007-2172", "CVE-2007-3848", "CVE-2007-4308", "CVE-2007-6063", "CVE-2007-6151", "CVE-2007-6206", "CVE-2008-0007", "CVE-2008-2136", "CVE-2008-3275", "CVE-2008-3525", "CVE-2008-4210");
  script_version ("$");
- script_tag(name:"cvss_base", value:"7.8");
- script_tag(name:"risk_factor", value:"High");
+ script_tag(name:"cvss_base", value:"4.6");
+ script_tag(name:"risk_factor", value:"Medium");
  name = "RedHat Security Advisory RHSA-2009:0001";
  script_name(name);
 
@@ -52,7 +52,7 @@
 http://rhn.redhat.com/errata/RHSA-2009-0001.html
 http://www.redhat.com/security/updates/classification/#important
 
-Risk factor : High";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/RHSA_2009_0009.nasl
===================================================================
--- trunk/openvas-plugins/scripts/RHSA_2009_0009.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/RHSA_2009_0009.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,8 +30,8 @@
  script_id(63250);
  script_cve_id("CVE-2008-0598", "CVE-2008-3528", "CVE-2008-3831", "CVE-2008-4554", "CVE-2008-4576", "CVE-2008-4618", "CVE-2008-5029");
  script_version ("$");
- script_tag(name:"cvss_base", value:"7.8");
- script_tag(name:"risk_factor", value:"High");
+ script_tag(name:"cvss_base", value:"4.9");
+ script_tag(name:"risk_factor", value:"Medium");
  name = "RedHat Security Advisory RHSA-2009:0009";
  script_name(name);
 
@@ -83,7 +83,7 @@
 http://www.redhat.com/security/updates/classification/#important
 http://www.redhat.com/docs/en-US/Red_Hat_Enterprise_MRG/
 
-Risk factor : High";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/RHSA_2009_0010.nasl
===================================================================
--- trunk/openvas-plugins/scripts/RHSA_2009_0010.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/RHSA_2009_0010.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,7 +30,7 @@
  script_id(63134);
  script_cve_id("CVE-2008-2379", "CVE-2008-3663");
  script_version ("$");
- script_tag(name:"cvss_base", value:"5.0");
+ script_tag(name:"cvss_base", value:"4.3");
  script_tag(name:"risk_factor", value:"Medium");
  name = "RedHat Security Advisory RHSA-2009:0010";
  script_name(name);

Modified: trunk/openvas-plugins/scripts/RHSA_2009_0012.nasl
===================================================================
--- trunk/openvas-plugins/scripts/RHSA_2009_0012.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/RHSA_2009_0012.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,8 +30,8 @@
  script_id(63368);
  script_cve_id("CVE-2007-2721", "CVE-2008-3520");
  script_version ("$");
- script_tag(name:"cvss_base", value:"9.3");
- script_tag(name:"risk_factor", value:"Critical");
+ script_tag(name:"cvss_base", value:"4.3");
+ script_tag(name:"risk_factor", value:"Medium");
  name = "RedHat Security Advisory RHSA-2009:0012";
  script_name(name);
 

Modified: trunk/openvas-plugins/scripts/RHSA_2009_0014.nasl
===================================================================
--- trunk/openvas-plugins/scripts/RHSA_2009_0014.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/RHSA_2009_0014.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,8 +30,8 @@
  script_id(63191);
  script_cve_id("CVE-2008-3275", "CVE-2008-4933", "CVE-2008-4934", "CVE-2008-5025", "CVE-2008-5029", "CVE-2008-5300", "CVE-2008-5702");
  script_version ("$");
- script_tag(name:"cvss_base", value:"7.8");
- script_tag(name:"risk_factor", value:"High");
+ script_tag(name:"cvss_base", value:"4.9");
+ script_tag(name:"risk_factor", value:"Medium");
  name = "RedHat Security Advisory RHSA-2009:0014";
  script_name(name);
 
@@ -50,7 +50,7 @@
 http://rhn.redhat.com/errata/RHSA-2009-0014.html
 http://www.redhat.com/security/updates/classification/#important
 
-Risk factor : High";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/RHSA_2009_0015.nasl
===================================================================
--- trunk/openvas-plugins/scripts/RHSA_2009_0015.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/RHSA_2009_0015.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,7 +30,7 @@
  script_id(63189);
  script_cve_id("CVE-2008-2086", "CVE-2008-5339", "CVE-2008-5344", "CVE-2008-5345", "CVE-2008-5347", "CVE-2008-5348", "CVE-2008-5350", "CVE-2008-5352", "CVE-2008-5353", "CVE-2008-5354", "CVE-2008-5359", "CVE-2008-5360");
  script_version ("$");
- script_tag(name:"cvss_base", value:"10.0");
+ script_tag(name:"cvss_base", value:"9.3");
  script_tag(name:"risk_factor", value:"Critical");
  name = "RedHat Security Advisory RHSA-2009:0015";
  script_name(name);
@@ -57,7 +57,7 @@
 http://www.redhat.com/security/updates/classification/#critical
 http://www-128.ibm.com/developerworks/java/jdk/alerts/
 
-Risk factor : High";
+Risk factor : Critical";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/RHSA_2009_0016.nasl
===================================================================
--- trunk/openvas-plugins/scripts/RHSA_2009_0016.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/RHSA_2009_0016.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,7 +30,7 @@
  script_id(63190);
  script_cve_id("CVE-2008-2086", "CVE-2008-5339", "CVE-2008-5340", "CVE-2008-5341", "CVE-2008-5342", "CVE-2008-5343", "CVE-2008-5344", "CVE-2008-5345", "CVE-2008-5346", "CVE-2008-5348", "CVE-2008-5349", "CVE-2008-5350", "CVE-2008-5351", "CVE-2008-5352", "CVE-2008-5353", "CVE-2008-5354", "CVE-2008-5356", "CVE-2008-5357", "CVE-2008-5359", "CVE-2008-5360");
  script_version ("$");
- script_tag(name:"cvss_base", value:"10.0");
+ script_tag(name:"cvss_base", value:"9.3");
  script_tag(name:"risk_factor", value:"Critical");
  name = "RedHat Security Advisory RHSA-2009:0016";
  script_name(name);
@@ -57,7 +57,7 @@
 http://www.redhat.com/security/updates/classification/#critical
 http://www-128.ibm.com/developerworks/java/jdk/alerts/
 
-Risk factor : High";
+Risk factor : Critical";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/RHSA_2009_0021.nasl
===================================================================
--- trunk/openvas-plugins/scripts/RHSA_2009_0021.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/RHSA_2009_0021.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,8 +30,8 @@
  script_id(63433);
  script_cve_id("CVE-2008-5029", "CVE-2008-5079", "CVE-2008-5182", "CVE-2008-5300");
  script_version ("$");
- script_tag(name:"cvss_base", value:"6.9");
- script_tag(name:"risk_factor", value:"High");
+ script_tag(name:"cvss_base", value:"4.9");
+ script_tag(name:"risk_factor", value:"Medium");
  name = "RedHat Security Advisory RHSA-2009:0021";
  script_name(name);
 
@@ -81,7 +81,7 @@
 http://rhn.redhat.com/errata/RHSA-2009-0021.html
 http://www.redhat.com/security/updates/classification/#important
 
-Risk factor : High";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/RHSA_2009_0053.nasl
===================================================================
--- trunk/openvas-plugins/scripts/RHSA_2009_0053.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/RHSA_2009_0053.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,8 +30,8 @@
  script_id(63317);
  script_cve_id("CVE-2008-5079", "CVE-2008-5134", "CVE-2008-5182", "CVE-2008-5300", "CVE-2008-5700", "CVE-2009-0065");
  script_version ("$");
- script_tag(name:"cvss_base", value:"10.0");
- script_tag(name:"risk_factor", value:"Critical");
+ script_tag(name:"cvss_base", value:"4.9");
+ script_tag(name:"risk_factor", value:"Medium");
  name = "RedHat Security Advisory RHSA-2009:0053";
  script_name(name);
 
@@ -83,7 +83,7 @@
 http://www.redhat.com/security/updates/classification/#important
 http://www.redhat.com/docs/en-US/Red_Hat_Enterprise_MRG/1.1/html/MRG_Release_Notes/
 
-Risk factor : High";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/RHSA_2009_0225.nasl
===================================================================
--- trunk/openvas-plugins/scripts/RHSA_2009_0225.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/RHSA_2009_0225.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,8 +30,8 @@
  script_id(63249);
  script_cve_id("CVE-2008-5029", "CVE-2008-5079", "CVE-2008-5182");
  script_version ("$");
- script_tag(name:"cvss_base", value:"6.9");
- script_tag(name:"risk_factor", value:"High");
+ script_tag(name:"cvss_base", value:"4.9");
+ script_tag(name:"risk_factor", value:"Medium");
  name = "RedHat Security Advisory RHSA-2009:0225";
  script_name(name);
 
@@ -75,7 +75,7 @@
 http://rhn.redhat.com/errata/RHSA-2009-0225.html
 http://www.redhat.com/security/updates/classification/#important
 
-Risk factor : High";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/RHSA_2009_0264.nasl
===================================================================
--- trunk/openvas-plugins/scripts/RHSA_2009_0264.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/RHSA_2009_0264.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,8 +30,8 @@
  script_id(63367);
  script_cve_id("CVE-2008-4933", "CVE-2008-4934", "CVE-2008-5025", "CVE-2008-5713", "CVE-2009-0031", "CVE-2009-0065");
  script_version ("$");
- script_tag(name:"cvss_base", value:"10.0");
- script_tag(name:"risk_factor", value:"Critical");
+ script_tag(name:"cvss_base", value:"7.8");
+ script_tag(name:"risk_factor", value:"High");
  name = "RedHat Security Advisory RHSA-2009:0264";
  script_name(name);
 

Modified: trunk/openvas-plugins/scripts/RHSA_2009_0313.nasl
===================================================================
--- trunk/openvas-plugins/scripts/RHSA_2009_0313.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/RHSA_2009_0313.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,7 +30,7 @@
  script_id(63474);
  script_cve_id("CVE-2008-4680", "CVE-2008-4681", "CVE-2008-4682", "CVE-2008-4683", "CVE-2008-4684", "CVE-2008-4685", "CVE-2008-5285", "CVE-2009-0599", "CVE-2009-0600");
  script_version ("$");
- script_tag(name:"cvss_base", value:"5.0");
+ script_tag(name:"cvss_base", value:"4.3");
  script_tag(name:"risk_factor", value:"Medium");
  name = "RedHat Security Advisory RHSA-2009:0313";
  script_name(name);

Modified: trunk/openvas-plugins/scripts/RHSA_2009_0315.nasl
===================================================================
--- trunk/openvas-plugins/scripts/RHSA_2009_0315.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/RHSA_2009_0315.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,8 +30,8 @@
  script_id(63477);
  script_cve_id("CVE-2009-0040", "CVE-2009-0771", "CVE-2009-0772", "CVE-2009-0773", "CVE-2009-0774", "CVE-2009-0775", "CVE-2009-0776", "CVE-2009-0777");
  script_version ("$");
- script_tag(name:"cvss_base", value:"10.0");
- script_tag(name:"risk_factor", value:"Critical");
+ script_tag(name:"cvss_base", value:"6.8");
+ script_tag(name:"risk_factor", value:"High");
  name = "RedHat Security Advisory RHSA-2009:0315";
  script_name(name);
 

Modified: trunk/openvas-plugins/scripts/RHSA_2009_0325.nasl
===================================================================
--- trunk/openvas-plugins/scripts/RHSA_2009_0325.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/RHSA_2009_0325.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,8 +30,8 @@
  script_id(63478);
  script_cve_id("CVE-2009-0040", "CVE-2009-0772", "CVE-2009-0774", "CVE-2009-0775", "CVE-2009-0776");
  script_version ("$");
- script_tag(name:"cvss_base", value:"10.0");
- script_tag(name:"risk_factor", value:"Critical");
+ script_tag(name:"cvss_base", value:"6.8");
+ script_tag(name:"risk_factor", value:"High");
  name = "RedHat Security Advisory RHSA-2009:0325";
  script_name(name);
 

Modified: trunk/openvas-plugins/scripts/RHSA_2009_0326.nasl
===================================================================
--- trunk/openvas-plugins/scripts/RHSA_2009_0326.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/RHSA_2009_0326.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,8 +30,8 @@
  script_id(63712);
  script_cve_id("CVE-2008-3528", "CVE-2008-5700", "CVE-2009-0028", "CVE-2009-0269", "CVE-2009-0322", "CVE-2009-0675", "CVE-2009-0676", "CVE-2009-0778");
  script_version ("$");
- script_tag(name:"cvss_base", value:"7.1");
- script_tag(name:"risk_factor", value:"High");
+ script_tag(name:"cvss_base", value:"2.1");
+ script_tag(name:"risk_factor", value:"Medium");
  name = "RedHat Security Advisory RHSA-2009:0326";
  script_name(name);
 
@@ -93,7 +93,7 @@
 http://www.redhat.com/security/updates/classification/#important
 http://www.redhat.com/docs/en-US/Red_Hat_Enterprise_Linux/5/html/Release_Notes/index.html#d0e497
 
-Risk factor : High";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/RHSA_2009_0329.nasl
===================================================================
--- trunk/openvas-plugins/scripts/RHSA_2009_0329.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/RHSA_2009_0329.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,8 +30,8 @@
  script_id(64018);
  script_cve_id("CVE-2006-1861", "CVE-2007-2754", "CVE-2008-1808", "CVE-2009-0946");
  script_version ("$");
- script_tag(name:"cvss_base", value:"10.0");
- script_tag(name:"risk_factor", value:"Critical");
+ script_tag(name:"cvss_base", value:"7.5");
+ script_tag(name:"risk_factor", value:"High");
  name = "RedHat Security Advisory RHSA-2009:0329";
  script_name(name);
 

Modified: trunk/openvas-plugins/scripts/RHSA_2009_0331.nasl
===================================================================
--- trunk/openvas-plugins/scripts/RHSA_2009_0331.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/RHSA_2009_0331.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,8 +30,8 @@
  script_id(63518);
  script_cve_id("CVE-2008-5700", "CVE-2009-0031", "CVE-2009-0065", "CVE-2009-0322");
  script_version ("$");
- script_tag(name:"cvss_base", value:"10.0");
- script_tag(name:"risk_factor", value:"Critical");
+ script_tag(name:"cvss_base", value:"1.9");
+ script_tag(name:"risk_factor", value:"Low");
  name = "RedHat Security Advisory RHSA-2009:0331";
  script_name(name);
 
@@ -73,7 +73,7 @@
 http://rhn.redhat.com/errata/RHSA-2009-0331.html
 http://www.redhat.com/security/updates/classification/#important
 
-Risk factor : High";
+Risk factor : Low";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/RHSA_2009_0337.nasl
===================================================================
--- trunk/openvas-plugins/scripts/RHSA_2009_0337.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/RHSA_2009_0337.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,8 +30,8 @@
  script_id(63755);
  script_cve_id("CVE-2008-3658", "CVE-2008-3660", "CVE-2008-5498", "CVE-2008-5557", "CVE-2009-0754");
  script_version ("$");
- script_tag(name:"cvss_base", value:"10.0");
- script_tag(name:"risk_factor", value:"Critical");
+ script_tag(name:"cvss_base", value:"7.5");
+ script_tag(name:"risk_factor", value:"High");
  name = "RedHat Security Advisory RHSA-2009:0337";
  script_name(name);
 
@@ -79,7 +79,7 @@
 http://rhn.redhat.com/errata/RHSA-2009-0337.html
 http://www.redhat.com/security/updates/classification/#moderate
 
-Risk factor : Medium";
+Risk factor : High";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/RHSA_2009_0338.nasl
===================================================================
--- trunk/openvas-plugins/scripts/RHSA_2009_0338.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/RHSA_2009_0338.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,8 +30,8 @@
  script_id(63756);
  script_cve_id("CVE-2008-3658", "CVE-2008-3660", "CVE-2008-5498", "CVE-2008-5557", "CVE-2008-5814", "CVE-2009-0754");
  script_version ("$");
- script_tag(name:"cvss_base", value:"10.0");
- script_tag(name:"risk_factor", value:"Critical");
+ script_tag(name:"cvss_base", value:"7.5");
+ script_tag(name:"risk_factor", value:"High");
  name = "RedHat Security Advisory RHSA-2009:0338";
  script_name(name);
 
@@ -85,7 +85,7 @@
 http://rhn.redhat.com/errata/RHSA-2009-0338.html
 http://www.redhat.com/security/updates/classification/#moderate
 
-Risk factor : Medium";
+Risk factor : High";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/RHSA_2009_0339.nasl
===================================================================
--- trunk/openvas-plugins/scripts/RHSA_2009_0339.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/RHSA_2009_0339.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,8 +30,8 @@
  script_id(63583);
  script_cve_id("CVE-2009-0581", "CVE-2009-0723", "CVE-2009-0733");
  script_version ("$");
- script_tag(name:"cvss_base", value:"9.3");
- script_tag(name:"risk_factor", value:"Critical");
+ script_tag(name:"cvss_base", value:"4.3");
+ script_tag(name:"risk_factor", value:"Medium");
  name = "RedHat Security Advisory RHSA-2009:0339";
  script_name(name);
 

Modified: trunk/openvas-plugins/scripts/RHSA_2009_0350.nasl
===================================================================
--- trunk/openvas-plugins/scripts/RHSA_2009_0350.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/RHSA_2009_0350.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,8 +30,8 @@
  script_id(63763);
  script_cve_id("CVE-2008-3658", "CVE-2008-3660", "CVE-2008-5498", "CVE-2008-5557", "CVE-2008-5658", "CVE-2008-5814", "CVE-2009-0754", "CVE-2009-1271");
  script_version ("$");
- script_tag(name:"cvss_base", value:"10.0");
- script_tag(name:"risk_factor", value:"Critical");
+ script_tag(name:"cvss_base", value:"7.5");
+ script_tag(name:"risk_factor", value:"High");
  name = "RedHat Security Advisory RHSA-2009:0350";
  script_name(name);
 
@@ -94,7 +94,7 @@
 http://rhn.redhat.com/errata/RHSA-2009-0350.html
 http://www.redhat.com/security/updates/classification/#moderate
 
-Risk factor : Medium";
+Risk factor : High";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/RHSA_2009_0354.nasl
===================================================================
--- trunk/openvas-plugins/scripts/RHSA_2009_0354.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/RHSA_2009_0354.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,8 +30,8 @@
  script_id(63580);
  script_cve_id("CVE-2009-0547", "CVE-2009-0582", "CVE-2009-0587");
  script_version ("$");
- script_tag(name:"cvss_base", value:"7.5");
- script_tag(name:"risk_factor", value:"High");
+ script_tag(name:"cvss_base", value:"5.0");
+ script_tag(name:"risk_factor", value:"Medium");
  name = "RedHat Security Advisory RHSA-2009:0354";
  script_name(name);
 

Modified: trunk/openvas-plugins/scripts/RHSA_2009_0355.nasl
===================================================================
--- trunk/openvas-plugins/scripts/RHSA_2009_0355.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/RHSA_2009_0355.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,8 +30,8 @@
  script_id(63581);
  script_cve_id("CVE-2009-0547", "CVE-2009-0582", "CVE-2009-0587");
  script_version ("$");
- script_tag(name:"cvss_base", value:"7.5");
- script_tag(name:"risk_factor", value:"High");
+ script_tag(name:"cvss_base", value:"5.0");
+ script_tag(name:"risk_factor", value:"Medium");
  name = "RedHat Security Advisory RHSA-2009:0355";
  script_name(name);
 

Modified: trunk/openvas-plugins/scripts/RHSA_2009_0358.nasl
===================================================================
--- trunk/openvas-plugins/scripts/RHSA_2009_0358.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/RHSA_2009_0358.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,7 +30,7 @@
  script_id(63582);
  script_cve_id("CVE-2009-0582", "CVE-2009-0587");
  script_version ("$");
- script_tag(name:"cvss_base", value:"7.5");
+ script_tag(name:"cvss_base", value:"5.8");
  script_tag(name:"risk_factor", value:"High");
  name = "RedHat Security Advisory RHSA-2009:0358";
  script_name(name);
@@ -64,7 +64,7 @@
 http://rhn.redhat.com/errata/RHSA-2009-0358.html
 http://www.redhat.com/security/updates/classification/#moderate
 
-Risk factor : Medium";
+Risk factor : High";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/RHSA_2009_0361.nasl
===================================================================
--- trunk/openvas-plugins/scripts/RHSA_2009_0361.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/RHSA_2009_0361.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,8 +30,8 @@
  script_id(63639);
  script_cve_id("CVE-2009-0365", "CVE-2009-0578");
  script_version ("$");
- script_tag(name:"cvss_base", value:"6.2");
- script_tag(name:"risk_factor", value:"High");
+ script_tag(name:"cvss_base", value:"4.6");
+ script_tag(name:"risk_factor", value:"Medium");
  name = "RedHat Security Advisory RHSA-2009:0361";
  script_name(name);
 

Modified: trunk/openvas-plugins/scripts/RHSA_2009_0377.nasl
===================================================================
--- trunk/openvas-plugins/scripts/RHSA_2009_0377.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/RHSA_2009_0377.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,8 +30,8 @@
  script_id(63758);
  script_cve_id("CVE-2006-2426", "CVE-2009-0581", "CVE-2009-0723", "CVE-2009-0733", "CVE-2009-0793", "CVE-2009-1093", "CVE-2009-1094", "CVE-2009-1095", "CVE-2009-1096", "CVE-2009-1097", "CVE-2009-1098", "CVE-2009-1101", "CVE-2009-1102");
  script_version ("$");
- script_tag(name:"cvss_base", value:"10.0");
- script_tag(name:"risk_factor", value:"Critical");
+ script_tag(name:"cvss_base", value:"6.4");
+ script_tag(name:"risk_factor", value:"High");
  name = "RedHat Security Advisory RHSA-2009:0377";
  script_name(name);
 

Modified: trunk/openvas-plugins/scripts/RHSA_2009_0392.nasl
===================================================================
--- trunk/openvas-plugins/scripts/RHSA_2009_0392.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/RHSA_2009_0392.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,8 +30,8 @@
  script_id(63644);
  script_cve_id("CVE-2006-2426", "CVE-2009-1093", "CVE-2009-1094", "CVE-2009-1095", "CVE-2009-1096", "CVE-2009-1097", "CVE-2009-1098", "CVE-2009-1099", "CVE-2009-1100", "CVE-2009-1101", "CVE-2009-1102", "CVE-2009-1103", "CVE-2009-1104", "CVE-2009-1105", "CVE-2009-1106", "CVE-2009-1107");
  script_version ("$");
- script_tag(name:"cvss_base", value:"10.0");
- script_tag(name:"risk_factor", value:"Critical");
+ script_tag(name:"cvss_base", value:"6.4");
+ script_tag(name:"risk_factor", value:"High");
  name = "RedHat Security Advisory RHSA-2009:0392";
  script_name(name);
 

Modified: trunk/openvas-plugins/scripts/RHSA_2009_0394.nasl
===================================================================
--- trunk/openvas-plugins/scripts/RHSA_2009_0394.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/RHSA_2009_0394.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,8 +30,8 @@
  script_id(63645);
  script_cve_id("CVE-2006-2426", "CVE-2009-1093", "CVE-2009-1094", "CVE-2009-1095", "CVE-2009-1096", "CVE-2009-1098", "CVE-2009-1099", "CVE-2009-1100", "CVE-2009-1103", "CVE-2009-1104", "CVE-2009-1107");
  script_version ("$");
- script_tag(name:"cvss_base", value:"10.0");
- script_tag(name:"risk_factor", value:"Critical");
+ script_tag(name:"cvss_base", value:"6.4");
+ script_tag(name:"risk_factor", value:"High");
  name = "RedHat Security Advisory RHSA-2009:0394";
  script_name(name);
 

Modified: trunk/openvas-plugins/scripts/RHSA_2009_0402.nasl
===================================================================
--- trunk/openvas-plugins/scripts/RHSA_2009_0402.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/RHSA_2009_0402.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,7 +30,7 @@
  script_id(63711);
  script_cve_id("CVE-2008-4190", "CVE-2009-0790");
  script_version ("$");
- script_tag(name:"cvss_base", value:"5.0");
+ script_tag(name:"cvss_base", value:"4.4");
  script_tag(name:"risk_factor", value:"Medium");
  name = "RedHat Security Advisory RHSA-2009:0402";
  script_name(name);
@@ -72,7 +72,7 @@
 http://rhn.redhat.com/errata/RHSA-2009-0402.html
 http://www.redhat.com/security/updates/classification/#important
 
-Risk factor : High";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/RHSA_2009_0408.nasl
===================================================================
--- trunk/openvas-plugins/scripts/RHSA_2009_0408.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/RHSA_2009_0408.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,8 +30,8 @@
  script_id(63759);
  script_cve_id("CVE-2009-0844", "CVE-2009-0845", "CVE-2009-0846");
  script_version ("$");
- script_tag(name:"cvss_base", value:"10.0");
- script_tag(name:"risk_factor", value:"Critical");
+ script_tag(name:"cvss_base", value:"5.8");
+ script_tag(name:"risk_factor", value:"High");
  name = "RedHat Security Advisory RHSA-2009:0408";
  script_name(name);
 

Modified: trunk/openvas-plugins/scripts/RHSA_2009_0411.nasl
===================================================================
--- trunk/openvas-plugins/scripts/RHSA_2009_0411.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/RHSA_2009_0411.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,7 +30,7 @@
  script_id(63762);
  script_cve_id("CVE-2009-0115");
  script_version ("$");
- script_tag(name:"cvss_base", value:"6.9");
+ script_tag(name:"cvss_base", value:"7.2");
  script_tag(name:"risk_factor", value:"High");
  name = "RedHat Security Advisory RHSA-2009:0411";
  script_name(name);
@@ -72,7 +72,7 @@
 http://rhn.redhat.com/errata/RHSA-2009-0411.html
 http://www.redhat.com/security/updates/classification/#moderate
 
-Risk factor : Medium";
+Risk factor : High";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/RHSA_2009_0420.nasl
===================================================================
--- trunk/openvas-plugins/scripts/RHSA_2009_0420.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/RHSA_2009_0420.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,8 +30,8 @@
  script_id(63764);
  script_cve_id("CVE-2007-6725", "CVE-2009-0792", "CVE-2009-0583");
  script_version ("$");
- script_tag(name:"cvss_base", value:"9.3");
- script_tag(name:"risk_factor", value:"Critical");
+ script_tag(name:"cvss_base", value:"7.5");
+ script_tag(name:"risk_factor", value:"High");
  name = "RedHat Security Advisory RHSA-2009:0420";
  script_name(name);
 
@@ -66,7 +66,7 @@
 http://rhn.redhat.com/errata/RHSA-2009-0420.html
 http://www.redhat.com/security/updates/classification/#moderate
 
-Risk factor : Medium";
+Risk factor : High";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/RHSA_2009_0421.nasl
===================================================================
--- trunk/openvas-plugins/scripts/RHSA_2009_0421.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/RHSA_2009_0421.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,8 +30,8 @@
  script_id(63765);
  script_cve_id("CVE-2007-6725", "CVE-2008-6679", "CVE-2009-0196", "CVE-2009-0792", "CVE-2009-0583");
  script_version ("$");
- script_tag(name:"cvss_base", value:"9.3");
- script_tag(name:"risk_factor", value:"Critical");
+ script_tag(name:"cvss_base", value:"7.5");
+ script_tag(name:"risk_factor", value:"High");
  name = "RedHat Security Advisory RHSA-2009:0421";
  script_name(name);
 
@@ -69,7 +69,7 @@
 http://rhn.redhat.com/errata/RHSA-2009-0421.html
 http://www.redhat.com/security/updates/classification/#moderate
 
-Risk factor : Medium";
+Risk factor : High";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/RHSA_2009_0429.nasl
===================================================================
--- trunk/openvas-plugins/scripts/RHSA_2009_0429.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/RHSA_2009_0429.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,8 +30,8 @@
  script_id(63830);
  script_cve_id("CVE-2009-0146", "CVE-2009-0147", "CVE-2009-0163", "CVE-2009-0166", "CVE-2009-0799", "CVE-2009-0800", "CVE-2009-1179", "CVE-2009-1180", "CVE-2009-1181", "CVE-2009-1182", "CVE-2009-1183");
  script_version ("$");
- script_tag(name:"cvss_base", value:"7.5");
- script_tag(name:"risk_factor", value:"High");
+ script_tag(name:"cvss_base", value:"4.3");
+ script_tag(name:"risk_factor", value:"Medium");
  name = "RedHat Security Advisory RHSA-2009:0429";
  script_name(name);
 
@@ -88,7 +88,7 @@
 http://rhn.redhat.com/errata/RHSA-2009-0429.html
 http://www.redhat.com/security/updates/classification/#important
 
-Risk factor : High";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/RHSA_2009_0430.nasl
===================================================================
--- trunk/openvas-plugins/scripts/RHSA_2009_0430.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/RHSA_2009_0430.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,8 +30,8 @@
  script_id(63831);
  script_cve_id("CVE-2009-0146", "CVE-2009-0147", "CVE-2009-0166", "CVE-2009-0799", "CVE-2009-0800", "CVE-2009-1179", "CVE-2009-1180", "CVE-2009-1181", "CVE-2009-1182", "CVE-2009-1183");
  script_version ("$");
- script_tag(name:"cvss_base", value:"7.5");
- script_tag(name:"risk_factor", value:"High");
+ script_tag(name:"cvss_base", value:"4.3");
+ script_tag(name:"risk_factor", value:"Medium");
  name = "RedHat Security Advisory RHSA-2009:0430";
  script_name(name);
 
@@ -79,7 +79,7 @@
 http://rhn.redhat.com/errata/RHSA-2009-0430.html
 http://www.redhat.com/security/updates/classification/#important
 
-Risk factor : High";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/RHSA_2009_0431.nasl
===================================================================
--- trunk/openvas-plugins/scripts/RHSA_2009_0431.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/RHSA_2009_0431.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,8 +30,8 @@
  script_id(63832);
  script_cve_id("CVE-2009-0146", "CVE-2009-0147", "CVE-2009-0166", "CVE-2009-0799", "CVE-2009-0800", "CVE-2009-1179", "CVE-2009-1180", "CVE-2009-1181", "CVE-2009-1182", "CVE-2009-1183");
  script_version ("$");
- script_tag(name:"cvss_base", value:"7.5");
- script_tag(name:"risk_factor", value:"High");
+ script_tag(name:"cvss_base", value:"4.3");
+ script_tag(name:"risk_factor", value:"Medium");
  name = "RedHat Security Advisory RHSA-2009:0431";
  script_name(name);
 
@@ -80,7 +80,7 @@
 http://rhn.redhat.com/errata/RHSA-2009-0431.html
 http://www.redhat.com/security/updates/classification/#important
 
-Risk factor : High";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/RHSA_2009_0436.nasl
===================================================================
--- trunk/openvas-plugins/scripts/RHSA_2009_0436.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/RHSA_2009_0436.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,7 +30,7 @@
  script_id(63866);
  script_cve_id("CVE-2009-0652", "CVE-2009-1302", "CVE-2009-1303", "CVE-2009-1304", "CVE-2009-1305", "CVE-2009-1306", "CVE-2009-1307", "CVE-2009-1308", "CVE-2009-1309", "CVE-2009-1310", "CVE-2009-1311", "CVE-2009-1312");
  script_version ("$");
- script_tag(name:"cvss_base", value:"6.8");
+ script_tag(name:"cvss_base", value:"5.8");
  script_tag(name:"risk_factor", value:"High");
  name = "RedHat Security Advisory RHSA-2009:0436";
  script_name(name);

Modified: trunk/openvas-plugins/scripts/RHSA_2009_0437.nasl
===================================================================
--- trunk/openvas-plugins/scripts/RHSA_2009_0437.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/RHSA_2009_0437.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,7 +30,7 @@
  script_id(63867);
  script_cve_id("CVE-2009-0652", "CVE-2009-1303", "CVE-2009-1305", "CVE-2009-1306", "CVE-2009-1307", "CVE-2009-1309", "CVE-2009-1311", "CVE-2009-1312");
  script_version ("$");
- script_tag(name:"cvss_base", value:"6.8");
+ script_tag(name:"cvss_base", value:"5.8");
  script_tag(name:"risk_factor", value:"High");
  name = "RedHat Security Advisory RHSA-2009:0437";
  script_name(name);

Modified: trunk/openvas-plugins/scripts/RHSA_2009_0444.nasl
===================================================================
--- trunk/openvas-plugins/scripts/RHSA_2009_0444.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/RHSA_2009_0444.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,8 +30,8 @@
  script_id(63868);
  script_cve_id("CVE-2005-2974", "CVE-2005-3350");
  script_version ("$");
- script_tag(name:"cvss_base", value:"7.5");
- script_tag(name:"risk_factor", value:"High");
+ script_tag(name:"cvss_base", value:"2.6");
+ script_tag(name:"risk_factor", value:"Medium");
  name = "RedHat Security Advisory RHSA-2009:0444";
  script_name(name);
 
@@ -60,7 +60,7 @@
 http://rhn.redhat.com/errata/RHSA-2009-0444.html
 http://www.redhat.com/security/updates/classification/#important
 
-Risk factor : High";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/RHSA_2009_0445.nasl
===================================================================
--- trunk/openvas-plugins/scripts/RHSA_2009_0445.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/RHSA_2009_0445.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,7 +30,7 @@
  script_id(63869);
  script_cve_id("CVE-2008-2086", "CVE-2008-5339", "CVE-2008-5340", "CVE-2008-5342", "CVE-2008-5343", "CVE-2008-5344", "CVE-2008-5345", "CVE-2008-5346", "CVE-2008-5348", "CVE-2008-5350", "CVE-2008-5351", "CVE-2008-5353", "CVE-2008-5354", "CVE-2008-5359", "CVE-2008-5360");
  script_version ("$");
- script_tag(name:"cvss_base", value:"10.0");
+ script_tag(name:"cvss_base", value:"9.3");
  script_tag(name:"risk_factor", value:"Critical");
  name = "RedHat Security Advisory RHSA-2009:0445";
  script_name(name);
@@ -62,7 +62,7 @@
 http://www.redhat.com/security/updates/classification/#critical
 http://www.ibm.com/developerworks/java/jdk/alerts/
 
-Risk factor : High";
+Risk factor : Critical";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/RHSA_2009_0451.nasl
===================================================================
--- trunk/openvas-plugins/scripts/RHSA_2009_0451.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/RHSA_2009_0451.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,8 +30,8 @@
  script_id(63908);
  script_cve_id("CVE-2008-4307", "CVE-2009-0028", "CVE-2009-0834", "CVE-2009-0835", "CVE-2009-1046", "CVE-2009-1337");
  script_version ("$");
- script_tag(name:"cvss_base", value:"7.2");
- script_tag(name:"risk_factor", value:"High");
+ script_tag(name:"cvss_base", value:"4.0");
+ script_tag(name:"risk_factor", value:"Medium");
  name = "RedHat Security Advisory RHSA-2009:0451";
  script_name(name);
 
@@ -100,7 +100,7 @@
 http://rhn.redhat.com/errata/RHSA-2009-0451.html
 http://www.redhat.com/security/updates/classification/#important
 
-Risk factor : High";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/RHSA_2009_0458.nasl
===================================================================
--- trunk/openvas-plugins/scripts/RHSA_2009_0458.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/RHSA_2009_0458.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,8 +30,8 @@
  script_id(63910);
  script_cve_id("CVE-2009-0146", "CVE-2009-0147", "CVE-2009-0166", "CVE-2009-0195", "CVE-2009-0799", "CVE-2009-0800", "CVE-2009-1179", "CVE-2009-1180", "CVE-2009-1181", "CVE-2009-1182", "CVE-2009-1183");
  script_version ("$");
- script_tag(name:"cvss_base", value:"7.5");
- script_tag(name:"risk_factor", value:"High");
+ script_tag(name:"cvss_base", value:"4.3");
+ script_tag(name:"risk_factor", value:"Medium");
  name = "RedHat Security Advisory RHSA-2009:0458";
  script_name(name);
 
@@ -78,7 +78,7 @@
 http://rhn.redhat.com/errata/RHSA-2009-0458.html
 http://www.redhat.com/security/updates/classification/#important
 
-Risk factor : High";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/RHSA_2009_0459.nasl
===================================================================
--- trunk/openvas-plugins/scripts/RHSA_2009_0459.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/RHSA_2009_0459.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,8 +30,8 @@
  script_id(63911);
  script_cve_id("CVE-2008-4307", "CVE-2009-0028", "CVE-2009-0676", "CVE-2009-0834");
  script_version ("$");
- script_tag(name:"cvss_base", value:"7.2");
- script_tag(name:"risk_factor", value:"High");
+ script_tag(name:"cvss_base", value:"4.0");
+ script_tag(name:"risk_factor", value:"Medium");
  name = "RedHat Security Advisory RHSA-2009:0459";
  script_name(name);
 
@@ -78,7 +78,7 @@
 http://rhn.redhat.com/errata/RHSA-2009-0459.html
 http://www.redhat.com/security/updates/classification/#important
 
-Risk factor : High";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/RHSA_2009_0473.nasl
===================================================================
--- trunk/openvas-plugins/scripts/RHSA_2009_0473.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/RHSA_2009_0473.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,8 +30,8 @@
  script_id(63947);
  script_cve_id("CVE-2008-4307", "CVE-2009-0787", "CVE-2009-0834", "CVE-2009-1336", "CVE-2009-1337");
  script_version ("$");
- script_tag(name:"cvss_base", value:"7.2");
- script_tag(name:"risk_factor", value:"High");
+ script_tag(name:"cvss_base", value:"4.0");
+ script_tag(name:"risk_factor", value:"Medium");
  name = "RedHat Security Advisory RHSA-2009:0473";
  script_name(name);
 
@@ -88,7 +88,7 @@
 http://www.redhat.com/security/updates/classification/#important
 http://kbase.redhat.com/faq/docs/DOC-16748
 
-Risk factor : High";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/RHSA_2009_0480.nasl
===================================================================
--- trunk/openvas-plugins/scripts/RHSA_2009_0480.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/RHSA_2009_0480.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,8 +30,8 @@
  script_id(63975);
  script_cve_id("CVE-2009-0146", "CVE-2009-0147", "CVE-2009-0166", "CVE-2009-0195", "CVE-2009-0799", "CVE-2009-0800", "CVE-2009-1179", "CVE-2009-1180", "CVE-2009-1181", "CVE-2009-1182", "CVE-2009-1183", "CVE-2009-1187", "CVE-2009-1188");
  script_version ("$");
- script_tag(name:"cvss_base", value:"7.5");
- script_tag(name:"risk_factor", value:"High");
+ script_tag(name:"cvss_base", value:"4.3");
+ script_tag(name:"risk_factor", value:"Medium");
  name = "RedHat Security Advisory RHSA-2009:0480";
  script_name(name);
 
@@ -82,7 +82,7 @@
 http://rhn.redhat.com/errata/RHSA-2009-0480.html
 http://www.redhat.com/security/updates/classification/#important
 
-Risk factor : High";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/RHSA_2009_1038.nasl
===================================================================
--- trunk/openvas-plugins/scripts/RHSA_2009_1038.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/RHSA_2009_1038.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,8 +30,8 @@
  script_id(63980);
  script_cve_id("CVE-2009-1093", "CVE-2009-1094", "CVE-2009-1095", "CVE-2009-1096", "CVE-2009-1097", "CVE-2009-1098", "CVE-2009-1099", "CVE-2009-1100", "CVE-2009-1101", "CVE-2009-1103", "CVE-2009-1104", "CVE-2009-1105", "CVE-2009-1106", "CVE-2009-1107");
  script_version ("$");
- script_tag(name:"cvss_base", value:"10.0");
- script_tag(name:"risk_factor", value:"Critical");
+ script_tag(name:"cvss_base", value:"5.0");
+ script_tag(name:"risk_factor", value:"Medium");
  name = "RedHat Security Advisory RHSA-2009:1038";
  script_name(name);
 
@@ -62,7 +62,7 @@
 http://www.redhat.com/security/updates/classification/#critical
 http://www.ibm.com/developerworks/java/jdk/alerts/
 
-Risk factor : High";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/RHSA_2009_1059.nasl
===================================================================
--- trunk/openvas-plugins/scripts/RHSA_2009_1059.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/RHSA_2009_1059.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,8 +30,8 @@
  script_id(64019);
  script_cve_id("CVE-2009-1373", "CVE-2009-1376", "CVE-2008-2927");
  script_version ("$");
- script_tag(name:"cvss_base", value:"9.3");
- script_tag(name:"risk_factor", value:"Critical");
+ script_tag(name:"cvss_base", value:"7.1");
+ script_tag(name:"risk_factor", value:"High");
  name = "RedHat Security Advisory RHSA-2009:1059";
  script_name(name);
 

Modified: trunk/openvas-plugins/scripts/RHSA_2009_1060.nasl
===================================================================
--- trunk/openvas-plugins/scripts/RHSA_2009_1060.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/RHSA_2009_1060.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,8 +30,8 @@
  script_id(64020);
  script_cve_id("CVE-2009-1373", "CVE-2009-1374", "CVE-2009-1375", "CVE-2009-1376", "CVE-2008-2927");
  script_version ("$");
- script_tag(name:"cvss_base", value:"9.3");
- script_tag(name:"risk_factor", value:"Critical");
+ script_tag(name:"cvss_base", value:"7.1");
+ script_tag(name:"risk_factor", value:"High");
  name = "RedHat Security Advisory RHSA-2009:1060";
  script_name(name);
 

Modified: trunk/openvas-plugins/scripts/RHSA_2009_1062.nasl
===================================================================
--- trunk/openvas-plugins/scripts/RHSA_2009_1062.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/RHSA_2009_1062.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,8 +30,8 @@
  script_id(64022);
  script_cve_id("CVE-2006-1861", "CVE-2007-2754", "CVE-2009-0946");
  script_version ("$");
- script_tag(name:"cvss_base", value:"10.0");
- script_tag(name:"risk_factor", value:"Critical");
+ script_tag(name:"cvss_base", value:"7.5");
+ script_tag(name:"risk_factor", value:"High");
  name = "RedHat Security Advisory RHSA-2009:1062";
  script_name(name);
 

Modified: trunk/openvas-plugins/scripts/RHSA_2009_1066.nasl
===================================================================
--- trunk/openvas-plugins/scripts/RHSA_2009_1066.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/RHSA_2009_1066.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,8 +30,8 @@
  script_id(64063);
  script_cve_id("CVE-2009-1578", "CVE-2009-1579", "CVE-2009-1581");
  script_version ("$");
- script_tag(name:"cvss_base", value:"6.8");
- script_tag(name:"risk_factor", value:"High");
+ script_tag(name:"cvss_base", value:"4.3");
+ script_tag(name:"risk_factor", value:"Medium");
  name = "RedHat Security Advisory RHSA-2009:1066";
  script_name(name);
 
@@ -70,7 +70,7 @@
 http://www.squirrelmail.org/security/issue/2009-05-10
 http://www.squirrelmail.org/security/issue/2009-05-12
 
-Risk factor : High";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/RHSA_2009_1067.nasl
===================================================================
--- trunk/openvas-plugins/scripts/RHSA_2009_1067.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/RHSA_2009_1067.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -32,8 +32,8 @@
  script_id(64064);
  script_cve_id("CVE-2008-3963", "CVE-2008-4098", "CVE-2009-0663", "CVE-2009-0922", "CVE-2009-1341", "CVE-2008-2079");
  script_version ("$");
- script_tag(name:"cvss_base", value:"7.5");
- script_tag(name:"risk_factor", value:"High");
+ script_tag(name:"cvss_base", value:"4.0");
+ script_tag(name:"risk_factor", value:"Medium");
  name = "RedHat Security Advisory RHSA-2009:1067";
  script_name(name);
 

Modified: trunk/openvas-plugins/scripts/RHSA_2009_1081.nasl
===================================================================
--- trunk/openvas-plugins/scripts/RHSA_2009_1081.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/RHSA_2009_1081.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,8 +30,8 @@
  script_id(64068);
  script_cve_id("CVE-2009-1072", "CVE-2009-1192", "CVE-2009-1338", "CVE-2009-1439");
  script_version ("$");
- script_tag(name:"cvss_base", value:"7.8");
- script_tag(name:"risk_factor", value:"High");
+ script_tag(name:"cvss_base", value:"4.9");
+ script_tag(name:"risk_factor", value:"Medium");
  name = "RedHat Security Advisory RHSA-2009:1081";
  script_name(name);
 
@@ -74,7 +74,7 @@
 http://rhn.redhat.com/errata/RHSA-2009-1081.html
 http://www.redhat.com/security/updates/classification/#important
 
-Risk factor : High";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/RHSA_2009_1101.nasl
===================================================================
--- trunk/openvas-plugins/scripts/RHSA_2009_1101.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/RHSA_2009_1101.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,8 +30,8 @@
  script_id(64211);
  script_cve_id("CVE-2004-2541", "CVE-2006-4262", "CVE-2009-0148", "CVE-2009-1577");
  script_version ("$");
- script_tag(name:"cvss_base", value:"9.3");
- script_tag(name:"risk_factor", value:"Critical");
+ script_tag(name:"cvss_base", value:"6.9");
+ script_tag(name:"risk_factor", value:"High");
  name = "RedHat Security Advisory RHSA-2009:1101";
  script_name(name);
 
@@ -57,7 +57,7 @@
 http://rhn.redhat.com/errata/RHSA-2009-1101.html
 http://www.redhat.com/security/updates/classification/#moderate
 
-Risk factor : Medium";
+Risk factor : High";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/RHSA_2009_1102.nasl
===================================================================
--- trunk/openvas-plugins/scripts/RHSA_2009_1102.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/RHSA_2009_1102.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,8 +30,8 @@
  script_id(64212);
  script_cve_id("CVE-2004-2541", "CVE-2009-0148");
  script_version ("$");
- script_tag(name:"cvss_base", value:"9.3");
- script_tag(name:"risk_factor", value:"Critical");
+ script_tag(name:"cvss_base", value:"6.9");
+ script_tag(name:"risk_factor", value:"High");
  name = "RedHat Security Advisory RHSA-2009:1102";
  script_name(name);
 
@@ -57,7 +57,7 @@
 http://rhn.redhat.com/errata/RHSA-2009-1102.html
 http://www.redhat.com/security/updates/classification/#moderate
 
-Risk factor : Medium";
+Risk factor : High";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/RHSA_2009_1106.nasl
===================================================================
--- trunk/openvas-plugins/scripts/RHSA_2009_1106.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/RHSA_2009_1106.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,8 +30,8 @@
  script_id(64213);
  script_cve_id("CVE-2009-1072", "CVE-2009-1192", "CVE-2009-1439", "CVE-2009-1630", "CVE-2009-1633", "CVE-2009-1758");
  script_version ("$");
- script_tag(name:"cvss_base", value:"7.8");
- script_tag(name:"risk_factor", value:"High");
+ script_tag(name:"cvss_base", value:"4.9");
+ script_tag(name:"risk_factor", value:"Medium");
  name = "RedHat Security Advisory RHSA-2009:1106";
  script_name(name);
 
@@ -83,7 +83,7 @@
 http://rhn.redhat.com/errata/RHSA-2009-1106.html
 http://www.redhat.com/security/updates/classification/#important
 
-Risk factor : High";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/RHSA_2009_1107.nasl
===================================================================
--- trunk/openvas-plugins/scripts/RHSA_2009_1107.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/RHSA_2009_1107.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,8 +30,8 @@
  script_id(64214);
  script_cve_id("CVE-2009-0023", "CVE-2009-1955", "CVE-2009-1956");
  script_version ("$");
- script_tag(name:"cvss_base", value:"6.4");
- script_tag(name:"risk_factor", value:"High");
+ script_tag(name:"cvss_base", value:"4.3");
+ script_tag(name:"risk_factor", value:"Medium");
  name = "RedHat Security Advisory RHSA-2009:1107";
  script_name(name);
 

Modified: trunk/openvas-plugins/scripts/RHSA_2009_1108.nasl
===================================================================
--- trunk/openvas-plugins/scripts/RHSA_2009_1108.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/RHSA_2009_1108.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,8 +30,8 @@
  script_id(64215);
  script_cve_id("CVE-2009-0023", "CVE-2009-1955", "CVE-2009-1956");
  script_version ("$");
- script_tag(name:"cvss_base", value:"6.4");
- script_tag(name:"risk_factor", value:"High");
+ script_tag(name:"cvss_base", value:"4.3");
+ script_tag(name:"risk_factor", value:"Medium");
  name = "RedHat Security Advisory RHSA-2009:1108";
  script_name(name);
 

Modified: trunk/openvas-plugins/scripts/RHSA_2009_1109.nasl
===================================================================
--- trunk/openvas-plugins/scripts/RHSA_2009_1109.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/RHSA_2009_1109.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,7 +30,7 @@
  script_id(64216);
  script_cve_id("CVE-2009-0198", "CVE-2009-0509", "CVE-2009-0510", "CVE-2009-0511", "CVE-2009-0512", "CVE-2009-0888", "CVE-2009-0889", "CVE-2009-1855", "CVE-2009-1856", "CVE-2009-1857", "CVE-2009-1858", "CVE-2009-1859", "CVE-2009-1861", "CVE-2009-2028");
  script_version ("$");
- script_tag(name:"cvss_base", value:"10.0");
+ script_tag(name:"cvss_base", value:"9.3");
  script_tag(name:"risk_factor", value:"Critical");
  name = "RedHat Security Advisory RHSA-2009:1109";
  script_name(name);
@@ -62,7 +62,7 @@
 http://www.redhat.com/security/updates/classification/#critical
 http://www.adobe.com/support/security/bulletins/apsb09-07.html
 
-Risk factor : High";
+Risk factor : Critical";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/RHSA_2009_1125.nasl
===================================================================
--- trunk/openvas-plugins/scripts/RHSA_2009_1125.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/RHSA_2009_1125.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,8 +30,8 @@
  script_id(64278);
  script_cve_id("CVE-2009-1303", "CVE-2009-1305", "CVE-2009-1306", "CVE-2009-1307", "CVE-2009-1309", "CVE-2009-1392", "CVE-2009-1833", "CVE-2009-1838");
  script_version ("$");
- script_tag(name:"cvss_base", value:"9.3");
- script_tag(name:"risk_factor", value:"Critical");
+ script_tag(name:"cvss_base", value:"5.0");
+ script_tag(name:"risk_factor", value:"Medium");
  name = "RedHat Security Advisory RHSA-2009:1125";
  script_name(name);
 

Modified: trunk/openvas-plugins/scripts/RHSA_2009_1126.nasl
===================================================================
--- trunk/openvas-plugins/scripts/RHSA_2009_1126.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/RHSA_2009_1126.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,8 +30,8 @@
  script_id(64279);
  script_cve_id("CVE-2009-1303", "CVE-2009-1305", "CVE-2009-1306", "CVE-2009-1307", "CVE-2009-1308", "CVE-2009-1309", "CVE-2009-1392", "CVE-2009-1833", "CVE-2009-1836", "CVE-2009-1838");
  script_version ("$");
- script_tag(name:"cvss_base", value:"9.3");
- script_tag(name:"risk_factor", value:"Critical");
+ script_tag(name:"cvss_base", value:"5.0");
+ script_tag(name:"risk_factor", value:"Medium");
  name = "RedHat Security Advisory RHSA-2009:1126";
  script_name(name);
 

Modified: trunk/openvas-plugins/scripts/RHSA_2009_1132.nasl
===================================================================
--- trunk/openvas-plugins/scripts/RHSA_2009_1132.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/RHSA_2009_1132.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,8 +30,8 @@
  script_id(64333);
  script_cve_id("CVE-2009-1072", "CVE-2009-1192", "CVE-2009-1385", "CVE-2009-1630", "CVE-2009-1758");
  script_version ("$");
- script_tag(name:"cvss_base", value:"7.8");
- script_tag(name:"risk_factor", value:"High");
+ script_tag(name:"cvss_base", value:"4.9");
+ script_tag(name:"risk_factor", value:"Medium");
  name = "RedHat Security Advisory RHSA-2009:1132";
  script_name(name);
 
@@ -75,7 +75,7 @@
 http://rhn.redhat.com/errata/RHSA-2009-1132.html
 http://www.redhat.com/security/updates/classification/#important
 
-Risk factor : High";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/RHSA_2009_1140.nasl
===================================================================
--- trunk/openvas-plugins/scripts/RHSA_2009_1140.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/RHSA_2009_1140.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,8 +30,8 @@
  script_id(64337);
  script_cve_id("CVE-2007-1558", "CVE-2009-0642", "CVE-2009-1904");
  script_version ("$");
- script_tag(name:"cvss_base", value:"6.8");
- script_tag(name:"risk_factor", value:"High");
+ script_tag(name:"cvss_base", value:"2.6");
+ script_tag(name:"risk_factor", value:"Medium");
  name = "RedHat Security Advisory RHSA-2009:1140";
  script_name(name);
 

Modified: trunk/openvas-plugins/scripts/RHSA_2009_1148.nasl
===================================================================
--- trunk/openvas-plugins/scripts/RHSA_2009_1148.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/RHSA_2009_1148.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,8 +30,8 @@
  script_id(64385);
  script_cve_id("CVE-2009-1890", "CVE-2009-1891");
  script_version ("$");
- script_tag(name:"cvss_base", value:"5.0");
- script_tag(name:"risk_factor", value:"Medium");
+ script_tag(name:"cvss_base", value:"7.1");
+ script_tag(name:"risk_factor", value:"High");
  name = "RedHat Security Advisory RHSA-2009:1148";
  script_name(name);
 

Modified: trunk/openvas-plugins/scripts/RHSA_2009_1156.nasl
===================================================================
--- trunk/openvas-plugins/scripts/RHSA_2009_1156.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/RHSA_2009_1156.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,7 +30,7 @@
  script_id(64388);
  script_cve_id("CVE-2009-1195", "CVE-2009-1890", "CVE-2009-1891");
  script_version ("$");
- script_tag(name:"cvss_base", value:"5.0");
+ script_tag(name:"cvss_base", value:"4.9");
  script_tag(name:"risk_factor", value:"Medium");
  name = "RedHat Security Advisory RHSA-2009:1156";
  script_name(name);
@@ -68,7 +68,7 @@
 http://rhn.redhat.com/errata/RHSA-2009-1156.html
 http://www.redhat.com/security/updates/classification/#important
 
-Risk factor : High";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/RHSA_2009_1159.nasl
===================================================================
--- trunk/openvas-plugins/scripts/RHSA_2009_1159.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/RHSA_2009_1159.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,8 +30,8 @@
  script_id(64390);
  script_cve_id("CVE-2009-2285", "CVE-2009-2347");
  script_version ("$");
- script_tag(name:"cvss_base", value:"9.3");
- script_tag(name:"risk_factor", value:"Critical");
+ script_tag(name:"cvss_base", value:"4.3");
+ script_tag(name:"risk_factor", value:"Medium");
  name = "RedHat Security Advisory RHSA-2009:1159";
  script_name(name);
 

Modified: trunk/openvas-plugins/scripts/RHSA_2009_1176.nasl
===================================================================
--- trunk/openvas-plugins/scripts/RHSA_2009_1176.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/RHSA_2009_1176.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,8 +30,8 @@
  script_id(64453);
  script_cve_id("CVE-2007-2052", "CVE-2007-4965", "CVE-2008-1721", "CVE-2008-1887", "CVE-2008-2315", "CVE-2008-3142", "CVE-2008-3143", "CVE-2008-3144", "CVE-2008-4864", "CVE-2008-5031");
  script_version ("$");
- script_tag(name:"cvss_base", value:"10.0");
- script_tag(name:"risk_factor", value:"Critical");
+ script_tag(name:"cvss_base", value:"5.0");
+ script_tag(name:"risk_factor", value:"Medium");
  script_name("RedHat Security Advisory RHSA-2009:1176");
 
  desc = "The remote host is missing updates announced in

Modified: trunk/openvas-plugins/scripts/RHSA_2009_1177.nasl
===================================================================
--- trunk/openvas-plugins/scripts/RHSA_2009_1177.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/RHSA_2009_1177.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,8 +30,8 @@
  script_id(64454);
  script_cve_id("CVE-2008-1679", "CVE-2008-1721", "CVE-2008-1887", "CVE-2008-2315", "CVE-2008-3142", "CVE-2008-3143", "CVE-2008-3144", "CVE-2008-4864", "CVE-2008-5031");
  script_version ("$");
- script_tag(name:"cvss_base", value:"10.0");
- script_tag(name:"risk_factor", value:"Critical");
+ script_tag(name:"cvss_base", value:"6.8");
+ script_tag(name:"risk_factor", value:"High");
  script_name("RedHat Security Advisory RHSA-2009:1177");
 
  desc = "The remote host is missing updates announced in
@@ -86,7 +86,7 @@
 http://rhn.redhat.com/errata/RHSA-2009-1177.html
 http://www.redhat.com/security/updates/classification/#moderate
 
-Risk factor : Medium";
+Risk factor : High";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/RHSA_2009_1178.nasl
===================================================================
--- trunk/openvas-plugins/scripts/RHSA_2009_1178.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/RHSA_2009_1178.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,8 +30,8 @@
  script_id(64455);
  script_cve_id("CVE-2008-1679", "CVE-2008-1887", "CVE-2008-2315", "CVE-2008-3142", "CVE-2008-3143", "CVE-2008-3144", "CVE-2008-4864", "CVE-2008-5031");
  script_version ("$");
- script_tag(name:"cvss_base", value:"10.0");
- script_tag(name:"risk_factor", value:"Critical");
+ script_tag(name:"cvss_base", value:"6.8");
+ script_tag(name:"risk_factor", value:"High");
  script_name("RedHat Security Advisory RHSA-2009:1178");
 
  desc = "The remote host is missing updates announced in
@@ -80,7 +80,7 @@
 http://rhn.redhat.com/errata/RHSA-2009-1178.html
 http://www.redhat.com/security/updates/classification/#moderate
 
-Risk factor : Medium";
+Risk factor : High";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/RHSA_2009_1193.nasl
===================================================================
--- trunk/openvas-plugins/scripts/RHSA_2009_1193.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/RHSA_2009_1193.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,7 +30,7 @@
  script_id(64514);
  script_cve_id("CVE-2007-5966", "CVE-2009-1385", "CVE-2009-1388", "CVE-2009-1389", "CVE-2009-1895", "CVE-2009-2406", "CVE-2009-2407");
  script_version ("$");
- script_tag(name:"cvss_base", value:"7.8");
+ script_tag(name:"cvss_base", value:"7.2");
  script_tag(name:"risk_factor", value:"High");
  script_name("RedHat Security Advisory RHSA-2009:1193");
 

Modified: trunk/openvas-plugins/scripts/RHSA_2009_1198.nasl
===================================================================
--- trunk/openvas-plugins/scripts/RHSA_2009_1198.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/RHSA_2009_1198.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,8 +30,8 @@
  script_id(64592);
  script_cve_id("CVE-2009-1093", "CVE-2009-1094", "CVE-2009-1095", "CVE-2009-1096", "CVE-2009-1097", "CVE-2009-1098", "CVE-2009-1099", "CVE-2009-1100", "CVE-2009-1101", "CVE-2009-1103", "CVE-2009-1104", "CVE-2009-1105", "CVE-2009-1106", "CVE-2009-1107");
  script_version ("$Revision$");
- script_tag(name:"cvss_base", value:"10.0");
- script_tag(name:"risk_factor", value:"Critical");
+ script_tag(name:"cvss_base", value:"5.0");
+ script_tag(name:"risk_factor", value:"Medium");
  script_name("RedHat Security Advisory RHSA-2009:1198");
 
  desc = "The remote host is missing updates announced in
@@ -61,7 +61,7 @@
 http://www.redhat.com/security/updates/classification/#critical
 http://www.ibm.com/developerworks/java/jdk/alerts/
 
-Risk factor : High";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/RHSA_2009_1199.nasl
===================================================================
--- trunk/openvas-plugins/scripts/RHSA_2009_1199.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/RHSA_2009_1199.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,8 +30,8 @@
  script_id(64589);
  script_cve_id("CVE-2009-2475", "CVE-2009-2625", "CVE-2009-2670", "CVE-2009-2671", "CVE-2009-2672", "CVE-2009-2673", "CVE-2009-2675", "CVE-2009-2676", "CVE-2009-2689");
  script_version ("$Revision$");
- script_tag(name:"cvss_base", value:"10.0");
- script_tag(name:"risk_factor", value:"Critical");
+ script_tag(name:"cvss_base", value:"7.8");
+ script_tag(name:"risk_factor", value:"High");
  script_name("RedHat Security Advisory RHSA-2009:1199");
 
  desc = "The remote host is missing updates announced in

Modified: trunk/openvas-plugins/scripts/RHSA_2009_1200.nasl
===================================================================
--- trunk/openvas-plugins/scripts/RHSA_2009_1200.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/RHSA_2009_1200.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,8 +30,8 @@
  script_id(64590);
  script_cve_id("CVE-2009-0217", "CVE-2009-2475", "CVE-2009-2476", "CVE-2009-2625", "CVE-2009-2670", "CVE-2009-2671", "CVE-2009-2672", "CVE-2009-2673", "CVE-2009-2674", "CVE-2009-2675", "CVE-2009-2676", "CVE-2009-2690");
  script_version ("$Revision$");
- script_tag(name:"cvss_base", value:"10.0");
- script_tag(name:"risk_factor", value:"Critical");
+ script_tag(name:"cvss_base", value:"5.0");
+ script_tag(name:"risk_factor", value:"Medium");
  script_name("RedHat Security Advisory RHSA-2009:1200");
 
  desc = "The remote host is missing updates announced in
@@ -62,7 +62,7 @@
 http://blogs.sun.com/security/entry/advance_notification_of_security_updates5
 http://sunsolve.sun.com/search/document.do?assetkey=1-21-125139-16-1
 
-Risk factor : High";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/RHSA_2009_1201.nasl
===================================================================
--- trunk/openvas-plugins/scripts/RHSA_2009_1201.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/RHSA_2009_1201.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,8 +30,8 @@
  script_id(64591);
  script_cve_id("CVE-2009-0217", "CVE-2009-2475", "CVE-2009-2476", "CVE-2009-2625", "CVE-2009-2670", "CVE-2009-2671", "CVE-2009-2672", "CVE-2009-2673", "CVE-2009-2674", "CVE-2009-2675", "CVE-2009-2689", "CVE-2009-2690");
  script_version ("$Revision$");
- script_tag(name:"cvss_base", value:"10.0");
- script_tag(name:"risk_factor", value:"Critical");
+ script_tag(name:"cvss_base", value:"5.0");
+ script_tag(name:"risk_factor", value:"Medium");
  script_name("RedHat Security Advisory RHSA-2009:1201");
 
  desc = "The remote host is missing updates to OpenJDK 6 Software Development Kit
@@ -53,7 +53,7 @@
 http://www.redhat.com/security/updates/classification/#important
 http://blogs.sun.com/security/entry/advance_notification_of_security_updates5
 
-Risk factor : High";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/RHSA_2009_1205.nasl
===================================================================
--- trunk/openvas-plugins/scripts/RHSA_2009_1205.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/RHSA_2009_1205.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,8 +30,8 @@
  script_id(64595);
  script_cve_id("CVE-2009-1891", "CVE-2009-2412");
  script_version ("$Revision$");
- script_tag(name:"cvss_base", value:"10.0");
- script_tag(name:"risk_factor", value:"Critical");
+ script_tag(name:"cvss_base", value:"7.1");
+ script_tag(name:"risk_factor", value:"High");
  script_name("RedHat Security Advisory RHSA-2009:1205");
 
  desc = "The remote host is missing updates announced in
@@ -76,7 +76,7 @@
 http://rhn.redhat.com/errata/RHSA-2009-1205.html
 http://www.redhat.com/security/updates/classification/#moderate
 
-Risk factor : Medium";
+Risk factor : High";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/RHSA_2009_1236.nasl
===================================================================
--- trunk/openvas-plugins/scripts/RHSA_2009_1236.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/RHSA_2009_1236.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,8 +30,8 @@
  script_id(64672);
  script_cve_id("CVE-2009-2625", "CVE-2009-2670", "CVE-2009-2671", "CVE-2009-2672", "CVE-2009-2673", "CVE-2009-2675");
  script_version ("$");
- script_tag(name:"cvss_base", value:"10.0");
- script_tag(name:"risk_factor", value:"Critical");
+ script_tag(name:"cvss_base", value:"5.0");
+ script_tag(name:"risk_factor", value:"Medium");
  script_name("RedHat Security Advisory RHSA-2009:1236");
 
  desc = "The remote host is missing updates announced in
@@ -67,7 +67,7 @@
 http://www.redhat.com/security/updates/classification/#critical
 http://www.ibm.com/developerworks/java/jdk/alerts/
 
-Risk factor : High";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/RHSA_2009_1289.nasl
===================================================================
--- trunk/openvas-plugins/scripts/RHSA_2009_1289.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/RHSA_2009_1289.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,8 +30,8 @@
  script_id(64804);
  script_cve_id("CVE-2008-2079", "CVE-2008-3963", "CVE-2008-4456", "CVE-2009-2446");
  script_version ("$");
- script_tag(name:"cvss_base", value:"8.5");
- script_tag(name:"risk_factor", value:"Critical");
+ script_tag(name:"cvss_base", value:"4.6");
+ script_tag(name:"risk_factor", value:"Medium");
  script_name("RedHat Security Advisory RHSA-2009:1289");
 
  desc = "The remote host is missing updates to MySQL announced in

Modified: trunk/openvas-plugins/scripts/RHSA_2009_1341.nasl
===================================================================
--- trunk/openvas-plugins/scripts/RHSA_2009_1341.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/RHSA_2009_1341.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,8 +30,8 @@
  script_id(64801);
  script_cve_id("CVE-2008-4579", "CVE-2008-6552");
  script_version ("$");
- script_tag(name:"cvss_base", value:"6.9");
- script_tag(name:"risk_factor", value:"High");
+ script_tag(name:"cvss_base", value:"1.9");
+ script_tag(name:"risk_factor", value:"Low");
  script_name("RedHat Security Advisory RHSA-2009:1341");
 
  desc = "The remote host is missing updates announced in

Modified: trunk/openvas-plugins/scripts/RHSA_2009_1427.nasl
===================================================================
--- trunk/openvas-plugins/scripts/RHSA_2009_1427.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/RHSA_2009_1427.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,8 +30,8 @@
  script_id(64808);
  script_cve_id("CVE-2007-4565", "CVE-2008-2711", "CVE-2009-2666");
  script_version ("$");
- script_tag(name:"cvss_base", value:"6.4");
- script_tag(name:"risk_factor", value:"High");
+ script_tag(name:"cvss_base", value:"5.0");
+ script_tag(name:"risk_factor", value:"Medium");
  script_name("RedHat Security Advisory RHSA-2009:1427");
 
  desc = "The remote host is missing updates announced in

Modified: trunk/openvas-plugins/scripts/RHSA_2009_1430.nasl
===================================================================
--- trunk/openvas-plugins/scripts/RHSA_2009_1430.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/RHSA_2009_1430.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,8 +30,8 @@
  script_id(64832);
  script_cve_id("CVE-2009-2654", "CVE-2009-3070", "CVE-2009-3071", "CVE-2009-3072", "CVE-2009-3074", "CVE-2009-3075", "CVE-2009-3076", "CVE-2009-3077", "CVE-2009-3078", "CVE-2009-3079");
  script_version ("$");
- script_tag(name:"cvss_base", value:"10.0");
- script_tag(name:"risk_factor", value:"Critical");
+ script_tag(name:"cvss_base", value:"5.8");
+ script_tag(name:"risk_factor", value:"High");
  script_name("RedHat Security Advisory RHSA-2009:1430");
 
  desc = "The remote host is missing updates announced in

Modified: trunk/openvas-plugins/scripts/RHSA_2009_1431.nasl
===================================================================
--- trunk/openvas-plugins/scripts/RHSA_2009_1431.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/RHSA_2009_1431.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,8 +30,8 @@
  script_id(64833);
  script_cve_id("CVE-2009-2654", "CVE-2009-3072", "CVE-2009-3075", "CVE-2009-3076", "CVE-2009-3077");
  script_version ("$");
- script_tag(name:"cvss_base", value:"10.0");
- script_tag(name:"risk_factor", value:"Critical");
+ script_tag(name:"cvss_base", value:"5.8");
+ script_tag(name:"risk_factor", value:"High");
  script_name("RedHat Security Advisory RHSA-2009:1431");
 
  desc = "The remote host is missing updates announced in

Modified: trunk/openvas-plugins/scripts/RHSA_2009_1432.nasl
===================================================================
--- trunk/openvas-plugins/scripts/RHSA_2009_1432.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/RHSA_2009_1432.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,8 +30,8 @@
  script_id(64834);
  script_cve_id("CVE-2009-2408", "CVE-2009-2409", "CVE-2009-2654", "CVE-2009-3072", "CVE-2009-3075", "CVE-2009-3076", "CVE-2009-3077");
  script_version ("$");
- script_tag(name:"cvss_base", value:"10.0");
- script_tag(name:"risk_factor", value:"Critical");
+ script_tag(name:"cvss_base", value:"6.8");
+ script_tag(name:"risk_factor", value:"High");
  script_name("RedHat Security Advisory RHSA-2009:1432");
 
  desc = "The remote host is missing updates announced in

Modified: trunk/openvas-plugins/scripts/RHSA_2009_1438.nasl
===================================================================
--- trunk/openvas-plugins/scripts/RHSA_2009_1438.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/RHSA_2009_1438.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,8 +30,8 @@
  script_id(64835);
  script_cve_id("CVE-2009-1883", "CVE-2009-1895", "CVE-2009-2847", "CVE-2009-2848");
  script_version ("$");
- script_tag(name:"cvss_base", value:"7.2");
- script_tag(name:"risk_factor", value:"High");
+ script_tag(name:"cvss_base", value:"4.4");
+ script_tag(name:"risk_factor", value:"Medium");
  script_name("RedHat Security Advisory RHSA-2009:1438");
 
  desc = "The remote host is missing updates to the Linux kernel announced in
@@ -68,7 +68,7 @@
 http://rhn.redhat.com/errata/RHSA-2009-1438.html
 http://www.redhat.com/security/updates/classification/#important
 
-Risk factor : High";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/RHSA_2009_1452.nasl
===================================================================
--- trunk/openvas-plugins/scripts/RHSA_2009_1452.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/RHSA_2009_1452.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,8 +30,8 @@
  script_id(64941);
  script_cve_id("CVE-2009-2473", "CVE-2009-2474");
  script_version ("$");
- script_tag(name:"cvss_base", value:"6.8");
- script_tag(name:"risk_factor", value:"High");
+ script_tag(name:"cvss_base", value:"4.3");
+ script_tag(name:"risk_factor", value:"Medium");
  script_name("RedHat Security Advisory RHSA-2009:1452");
 
  desc = "The remote host is missing updates announced in

Modified: trunk/openvas-plugins/scripts/RHSA_2009_1459.nasl
===================================================================
--- trunk/openvas-plugins/scripts/RHSA_2009_1459.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/RHSA_2009_1459.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,8 +30,8 @@
  script_id(64944);
  script_cve_id("CVE-2009-2632", "CVE-2009-3235");
  script_version ("$");
- script_tag(name:"cvss_base", value:"7.5");
- script_tag(name:"risk_factor", value:"High");
+ script_tag(name:"cvss_base", value:"4.4");
+ script_tag(name:"risk_factor", value:"Medium");
  script_name("RedHat Security Advisory RHSA-2009:1459");
 
  desc = "The remote host is missing updates announced in
@@ -57,7 +57,7 @@
 http://rhn.redhat.com/errata/RHSA-2009-1459.html
 http://www.redhat.com/security/updates/classification/#important
 
-Risk factor : High";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/RHSA_2009_1461.nasl
===================================================================
--- trunk/openvas-plugins/scripts/RHSA_2009_1461.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/RHSA_2009_1461.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,8 +30,8 @@
  script_id(64945);
  script_cve_id("CVE-2008-4456", "CVE-2009-2446", "CVE-2009-2687", "CVE-2009-3094", "CVE-2009-3095", "CVE-2009-3229", "CVE-2009-3230", "CVE-2009-3231", "CVE-2007-6600");
  script_version ("$");
- script_tag(name:"cvss_base", value:"8.5");
- script_tag(name:"risk_factor", value:"Critical");
+ script_tag(name:"cvss_base", value:"2.6");
+ script_tag(name:"risk_factor", value:"Medium");
  script_name("RedHat Security Advisory RHSA-2009:1461");
 
  desc = "The remote host is missing updates announced in
@@ -53,7 +53,7 @@
 http://rhn.redhat.com/errata/RHSA-2009-1461.html
 http://www.redhat.com/security/updates/classification/#important
 
-Risk factor : High";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/RHSA_2009_1471.nasl
===================================================================
--- trunk/openvas-plugins/scripts/RHSA_2009_1471.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/RHSA_2009_1471.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,8 +30,8 @@
  script_id(64993);
  script_cve_id("CVE-2007-2027", "CVE-2008-7224");
  script_version ("$");
- script_tag(name:"cvss_base", value:"7.8");
- script_tag(name:"risk_factor", value:"High");
+ script_tag(name:"cvss_base", value:"4.4");
+ script_tag(name:"risk_factor", value:"Medium");
  script_name("RedHat Security Advisory RHSA-2009:1471");
 
  desc = "The remote host is missing updates announced in
@@ -64,7 +64,7 @@
 http://rhn.redhat.com/errata/RHSA-2009-1471.html
 http://www.redhat.com/security/updates/classification/#important
 
-Risk factor : High";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/RHSA_2009_1484.nasl
===================================================================
--- trunk/openvas-plugins/scripts/RHSA_2009_1484.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/RHSA_2009_1484.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,8 +30,8 @@
  script_id(65729);
  script_cve_id("CVE-2009-0922", "CVE-2009-3230", "CVE-2007-6600");
  script_version ("$Revision$");
- script_tag(name:"cvss_base", value:"6.5");
- script_tag(name:"risk_factor", value:"High");
+ script_tag(name:"cvss_base", value:"4.0");
+ script_tag(name:"risk_factor", value:"Medium");
  script_name("RedHat Security Advisory RHSA-2009:1484");
 
  desc = "The remote host is missing updates announced in

Modified: trunk/openvas-plugins/scripts/RHSA_2009_1499.nasl
===================================================================
--- trunk/openvas-plugins/scripts/RHSA_2009_1499.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/RHSA_2009_1499.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,8 +30,8 @@
  script_id(66010);
  script_cve_id("CVE-2009-2979", "CVE-2009-2980", "CVE-2009-2981", "CVE-2009-2983", "CVE-2009-2985", "CVE-2009-2986", "CVE-2009-2988", "CVE-2009-2990", "CVE-2009-2991", "CVE-2009-2993", "CVE-2009-2994", "CVE-2009-2996", "CVE-2009-2997", "CVE-2009-2998", "CVE-2009-3431", "CVE-2009-3458", "CVE-2009-3459", "CVE-2009-3462");
  script_version ("$Revision$");
- script_tag(name:"cvss_base", value:"9.3");
- script_tag(name:"risk_factor", value:"Critical");
+ script_tag(name:"cvss_base", value:"4.3");
+ script_tag(name:"risk_factor", value:"Medium");
  script_name("RedHat Security Advisory RHSA-2009:1499");
 
  desc = "The remote host is missing updates announced in
@@ -69,7 +69,7 @@
 http://www.redhat.com/security/updates/classification/#critical
 http://www.adobe.com/support/security/bulletins/apsb09-15.html
 
-Risk factor : High";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/RHSA_2009_1500.nasl
===================================================================
--- trunk/openvas-plugins/scripts/RHSA_2009_1500.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/RHSA_2009_1500.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,8 +30,8 @@
  script_id(66012);
  script_cve_id("CVE-2009-0791", "CVE-2009-3604", "CVE-2009-3606", "CVE-2009-3609");
  script_version ("$Revision$");
- script_tag(name:"cvss_base", value:"9.3");
- script_tag(name:"risk_factor", value:"Critical");
+ script_tag(name:"cvss_base", value:"6.8");
+ script_tag(name:"risk_factor", value:"High");
  script_name("RedHat Security Advisory RHSA-2009:1500");
 
  desc = "The remote host is missing updates announced in

Modified: trunk/openvas-plugins/scripts/RHSA_2009_1501.nasl
===================================================================
--- trunk/openvas-plugins/scripts/RHSA_2009_1501.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/RHSA_2009_1501.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,8 +30,8 @@
  script_id(66013);
  script_cve_id("CVE-2009-0791", "CVE-2009-1188", "CVE-2009-3604", "CVE-2009-3606", "CVE-2009-3608", "CVE-2009-3609");
  script_version ("$Revision$");
- script_tag(name:"cvss_base", value:"9.3");
- script_tag(name:"risk_factor", value:"Critical");
+ script_tag(name:"cvss_base", value:"6.8");
+ script_tag(name:"risk_factor", value:"High");
  script_name("RedHat Security Advisory RHSA-2009:1501");
 
  desc = "The remote host is missing updates announced in

Modified: trunk/openvas-plugins/scripts/RHSA_2009_1502.nasl
===================================================================
--- trunk/openvas-plugins/scripts/RHSA_2009_1502.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/RHSA_2009_1502.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,8 +30,8 @@
  script_id(66014);
  script_cve_id("CVE-2009-0791", "CVE-2009-1188", "CVE-2009-3604", "CVE-2009-3606", "CVE-2009-3608", "CVE-2009-3609");
  script_version ("$Revision$");
- script_tag(name:"cvss_base", value:"9.3");
- script_tag(name:"risk_factor", value:"Critical");
+ script_tag(name:"cvss_base", value:"6.8");
+ script_tag(name:"risk_factor", value:"High");
  script_name("RedHat Security Advisory RHSA-2009:1502");
 
  desc = "The remote host is missing updates announced in

Modified: trunk/openvas-plugins/scripts/RHSA_2009_1503.nasl
===================================================================
--- trunk/openvas-plugins/scripts/RHSA_2009_1503.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/RHSA_2009_1503.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,8 +30,8 @@
  script_id(66015);
  script_cve_id("CVE-2009-0791", "CVE-2009-1188", "CVE-2009-3604", "CVE-2009-3608", "CVE-2009-3609");
  script_version ("$Revision$");
- script_tag(name:"cvss_base", value:"9.3");
- script_tag(name:"risk_factor", value:"Critical");
+ script_tag(name:"cvss_base", value:"6.8");
+ script_tag(name:"risk_factor", value:"High");
  script_name("RedHat Security Advisory RHSA-2009:1503");
 
  desc = "The remote host is missing updates announced in

Modified: trunk/openvas-plugins/scripts/RHSA_2009_1512.nasl
===================================================================
--- trunk/openvas-plugins/scripts/RHSA_2009_1512.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/RHSA_2009_1512.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,8 +30,8 @@
  script_id(66017);
  script_cve_id("CVE-2009-0791", "CVE-2009-1188", "CVE-2009-3604", "CVE-2009-3608", "CVE-2009-3609");
  script_version ("$Revision$");
- script_tag(name:"cvss_base", value:"9.3");
- script_tag(name:"risk_factor", value:"Critical");
+ script_tag(name:"cvss_base", value:"6.8");
+ script_tag(name:"risk_factor", value:"High");
  script_name("RedHat Security Advisory RHSA-2009:1512");
 
  desc = "The remote host is missing updates announced in

Modified: trunk/openvas-plugins/scripts/RHSA_2009_1529.nasl
===================================================================
--- trunk/openvas-plugins/scripts/RHSA_2009_1529.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/RHSA_2009_1529.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,7 +30,7 @@
  script_id(66119);
  script_cve_id("CVE-2009-1888", "CVE-2009-2813", "CVE-2009-2906", "CVE-2009-2948");
  script_version ("$Revision$");
- script_tag(name:"cvss_base", value:"6.0");
+ script_tag(name:"cvss_base", value:"5.8");
  script_tag(name:"risk_factor", value:"High");
  script_name("RedHat Security Advisory RHSA-2009:1529");
 
@@ -79,7 +79,7 @@
 http://rhn.redhat.com/errata/RHSA-2009-1529.html
 http://www.redhat.com/security/updates/classification/#moderate
 
-Risk factor : Medium";
+Risk factor : High";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/RHSA_2009_1540.nasl
===================================================================
--- trunk/openvas-plugins/scripts/RHSA_2009_1540.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/RHSA_2009_1540.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,7 +30,7 @@
  script_id(66174);
  script_cve_id("CVE-2009-1895", "CVE-2009-2691", "CVE-2009-2695", "CVE-2009-2849", "CVE-2009-2910", "CVE-2009-3002", "CVE-2009-3228", "CVE-2009-3547", "CVE-2009-3612", "CVE-2009-3613", "CVE-2009-3620", "CVE-2009-3621", "CVE-2009-3001");
  script_version ("$Revision$");
- script_tag(name:"cvss_base", value:"7.8");
+ script_tag(name:"cvss_base", value:"7.2");
  script_tag(name:"risk_factor", value:"High");
  script_name("RedHat Security Advisory RHSA-2009:1540");
 

Modified: trunk/openvas-plugins/scripts/RHSA_2009_1548.nasl
===================================================================
--- trunk/openvas-plugins/scripts/RHSA_2009_1548.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/RHSA_2009_1548.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,7 +30,7 @@
  script_id(66176);
  script_cve_id("CVE-2009-2695", "CVE-2009-2908", "CVE-2009-3228", "CVE-2009-3286", "CVE-2009-3547", "CVE-2009-3613");
  script_version ("$Revision$");
- script_tag(name:"cvss_base", value:"7.8");
+ script_tag(name:"cvss_base", value:"7.2");
  script_tag(name:"risk_factor", value:"High");
  script_name("RedHat Security Advisory RHSA-2009:1548");
 

Modified: trunk/openvas-plugins/scripts/RHSA_2009_1550.nasl
===================================================================
--- trunk/openvas-plugins/scripts/RHSA_2009_1550.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/RHSA_2009_1550.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,8 +30,8 @@
  script_id(66178);
  script_cve_id("CVE-2008-5029", "CVE-2008-5300", "CVE-2009-1337", "CVE-2009-1385", "CVE-2009-1895", "CVE-2009-2848", "CVE-2009-3002", "CVE-2009-3547", "CVE-2009-3001");
  script_version ("$Revision$");
- script_tag(name:"cvss_base", value:"7.8");
- script_tag(name:"risk_factor", value:"High");
+ script_tag(name:"cvss_base", value:"4.9");
+ script_tag(name:"risk_factor", value:"Medium");
  script_name("RedHat Security Advisory RHSA-2009:1550");
 
  desc = "The remote host is missing updates announced in
@@ -53,7 +53,7 @@
 http://www.redhat.com/security/updates/classification/#important
 http://kbase.redhat.com/faq/docs/DOC-17866
 
-Risk factor : High";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/RHSA_2009_1560.nasl
===================================================================
--- trunk/openvas-plugins/scripts/RHSA_2009_1560.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/RHSA_2009_1560.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,8 +30,8 @@
  script_id(66180);
  script_cve_id("CVE-2009-2409", "CVE-2009-3728", "CVE-2009-3729", "CVE-2009-3865", "CVE-2009-3866", "CVE-2009-3867", "CVE-2009-3868", "CVE-2009-3869", "CVE-2009-3871", "CVE-2009-3872", "CVE-2009-3873", "CVE-2009-3874", "CVE-2009-3875", "CVE-2009-3876", "CVE-2009-3877", "CVE-2009-3879", "CVE-2009-3880", "CVE-2009-3881", "CVE-2009-3882", "CVE-2009-3883", "CVE-2009-3884", "CVE-2009-3886");
  script_version ("$Revision$");
- script_tag(name:"cvss_base", value:"9.3");
- script_tag(name:"risk_factor", value:"Critical");
+ script_tag(name:"cvss_base", value:"5.1");
+ script_tag(name:"risk_factor", value:"High");
  script_name("RedHat Security Advisory RHSA-2009:1560");
 
  desc = "The remote host is missing updates announced in

Modified: trunk/openvas-plugins/scripts/RHSA_2009_1571.nasl
===================================================================
--- trunk/openvas-plugins/scripts/RHSA_2009_1571.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/RHSA_2009_1571.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,8 +30,8 @@
  script_id(66238);
  script_cve_id("CVE-2009-2409", "CVE-2009-3728", "CVE-2009-3873", "CVE-2009-3876", "CVE-2009-3877", "CVE-2009-3879", "CVE-2009-3880", "CVE-2009-3881", "CVE-2009-3882", "CVE-2009-3883", "CVE-2009-3884");
  script_version ("$Revision$");
- script_tag(name:"cvss_base", value:"9.3");
- script_tag(name:"risk_factor", value:"Critical");
+ script_tag(name:"cvss_base", value:"5.1");
+ script_tag(name:"risk_factor", value:"High");
  script_name("RedHat Security Advisory RHSA-2009:1571");
 
  desc = "The remote host is missing updates announced in

Modified: trunk/openvas-plugins/scripts/RHSA_2009_1579.nasl
===================================================================
--- trunk/openvas-plugins/scripts/RHSA_2009_1579.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/RHSA_2009_1579.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,8 +30,8 @@
  script_id(66241);
  script_cve_id("CVE-2009-3094", "CVE-2009-3095", "CVE-2009-3555");
  script_version ("$Revision$");
- script_tag(name:"cvss_base", value:"7.5");
- script_tag(name:"risk_factor", value:"High");
+ script_tag(name:"cvss_base", value:"2.6");
+ script_tag(name:"risk_factor", value:"Medium");
  script_name("RedHat Security Advisory RHSA-2009:1579");
 
  desc = "The remote host is missing updates announced in

Modified: trunk/openvas-plugins/scripts/RHSA_2009_1580.nasl
===================================================================
--- trunk/openvas-plugins/scripts/RHSA_2009_1580.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/RHSA_2009_1580.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,7 +30,7 @@
  script_id(66240);
  script_cve_id("CVE-2009-1891", "CVE-2009-3094", "CVE-2009-3095", "CVE-2009-3555");
  script_version ("$Revision$");
- script_tag(name:"cvss_base", value:"7.5");
+ script_tag(name:"cvss_base", value:"7.1");
  script_tag(name:"risk_factor", value:"High");
  script_name("RedHat Security Advisory RHSA-2009:1580");
 
@@ -84,7 +84,7 @@
 http://www.redhat.com/security/updates/classification/#moderate
 http://kbase.redhat.com/faq/docs/DOC-20491
 
-Risk factor : Medium";
+Risk factor : High";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/RHSA_2009_1582.nasl
===================================================================
--- trunk/openvas-plugins/scripts/RHSA_2009_1582.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/RHSA_2009_1582.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,8 +30,8 @@
  script_id(66242);
  script_cve_id("CVE-2009-2625", "CVE-2009-2670", "CVE-2009-2671", "CVE-2009-2672", "CVE-2009-2673", "CVE-2009-2674", "CVE-2009-2675", "CVE-2009-2676");
  script_version ("$Revision$");
- script_tag(name:"cvss_base", value:"10.0");
- script_tag(name:"risk_factor", value:"Critical");
+ script_tag(name:"cvss_base", value:"5.0");
+ script_tag(name:"risk_factor", value:"Medium");
  script_name("RedHat Security Advisory RHSA-2009:1582");
 
  desc = "The remote host is missing updates announced in
@@ -59,7 +59,7 @@
 http://www.redhat.com/security/updates/classification/#critical
 http://www.ibm.com/developerworks/java/jdk/alerts/
 
-Risk factor : High";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/RHSA_2009_1584.nasl
===================================================================
--- trunk/openvas-plugins/scripts/RHSA_2009_1584.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/RHSA_2009_1584.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,8 +30,8 @@
  script_id(66244);
  script_cve_id("CVE-2009-2409", "CVE-2009-3728", "CVE-2009-3869", "CVE-2009-3871", "CVE-2009-3873", "CVE-2009-3874", "CVE-2009-3875", "CVE-2009-3876", "CVE-2009-3877", "CVE-2009-3879", "CVE-2009-3880", "CVE-2009-3881", "CVE-2009-3882", "CVE-2009-3883", "CVE-2009-3884");
  script_version ("$Revision$");
- script_tag(name:"cvss_base", value:"9.3");
- script_tag(name:"risk_factor", value:"Critical");
+ script_tag(name:"cvss_base", value:"5.1");
+ script_tag(name:"risk_factor", value:"High");
  script_name("RedHat Security Advisory RHSA-2009:1584");
 
  desc = "The remote host is missing updates to OpenJDK announced in

Modified: trunk/openvas-plugins/scripts/RHSA_2009_1585.nasl
===================================================================
--- trunk/openvas-plugins/scripts/RHSA_2009_1585.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/RHSA_2009_1585.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,7 +30,7 @@
  script_id(66243);
  script_cve_id("CVE-2009-1888", "CVE-2009-2813", "CVE-2009-2906", "CVE-2009-2948");
  script_version ("$Revision$");
- script_tag(name:"cvss_base", value:"6.0");
+ script_tag(name:"cvss_base", value:"5.8");
  script_tag(name:"risk_factor", value:"High");
  script_name("RedHat Security Advisory RHSA-2009:1585");
 
@@ -88,7 +88,7 @@
 http://www.redhat.com/support/policy/soc/production/preview_scope/
 http://samba.org/samba/history/
 
-Risk factor : Medium";
+Risk factor : High";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/RHSA_2009_1595.nasl
===================================================================
--- trunk/openvas-plugins/scripts/RHSA_2009_1595.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/RHSA_2009_1595.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,7 +30,7 @@
  script_id(66287);
  script_cve_id("CVE-2009-2820", "CVE-2009-3553");
  script_version ("$Revision$");
- script_tag(name:"cvss_base", value:"5.0");
+ script_tag(name:"cvss_base", value:"4.3");
  script_tag(name:"risk_factor", value:"Medium");
  script_name("RedHat Security Advisory RHSA-2009:1595");
 

Modified: trunk/openvas-plugins/scripts/RHSA_2009_1620.nasl
===================================================================
--- trunk/openvas-plugins/scripts/RHSA_2009_1620.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/RHSA_2009_1620.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,7 +30,7 @@
  script_id(66319);
  script_cve_id("CVE-2009-4022");
  script_version ("$Revision$");
- script_tag(name:"cvss_base", value:"4.0");
+ script_tag(name:"cvss_base", value:"2.6");
  script_tag(name:"risk_factor", value:"Medium");
  script_name("RedHat Security Advisory RHSA-2009:1620");
 

Modified: trunk/openvas-plugins/scripts/RHSA_2009_1670.nasl
===================================================================
--- trunk/openvas-plugins/scripts/RHSA_2009_1670.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/RHSA_2009_1670.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,8 +30,8 @@
  script_id(66534);
  script_cve_id("CVE-2009-3612", "CVE-2009-3620", "CVE-2009-3621", "CVE-2009-3726");
  script_version ("$Revision$");
- script_tag(name:"cvss_base", value:"7.8");
- script_tag(name:"risk_factor", value:"High");
+ script_tag(name:"cvss_base", value:"4.9");
+ script_tag(name:"risk_factor", value:"Medium");
  script_name("RedHat Security Advisory RHSA-2009:1670");
 
  desc = "The remote host is missing updates announced in
@@ -77,7 +77,7 @@
 http://www.redhat.com/security/updates/classification/#important
 http://kbase.redhat.com/faq/docs/DOC-20536
 
-Risk factor : High";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/RHSA_2009_1671.nasl
===================================================================
--- trunk/openvas-plugins/scripts/RHSA_2009_1671.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/RHSA_2009_1671.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,8 +30,8 @@
  script_id(66535);
  script_cve_id("CVE-2009-2910", "CVE-2009-3613", "CVE-2009-3620", "CVE-2009-3621");
  script_version ("$Revision$");
- script_tag(name:"cvss_base", value:"7.8");
- script_tag(name:"risk_factor", value:"High");
+ script_tag(name:"cvss_base", value:"4.9");
+ script_tag(name:"risk_factor", value:"Medium");
  script_name("RedHat Security Advisory RHSA-2009:1671");
 
  desc = "The remote host is missing updates announced in
@@ -75,7 +75,7 @@
 http://rhn.redhat.com/errata/RHSA-2009-1671.html
 http://www.redhat.com/security/updates/classification/#important
 
-Risk factor : High";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/RHSA_2009_1694.nasl
===================================================================
--- trunk/openvas-plugins/scripts/RHSA_2009_1694.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/RHSA_2009_1694.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,8 +30,8 @@
  script_id(66543);
  script_cve_id("CVE-2009-0217", "CVE-2009-3865", "CVE-2009-3866", "CVE-2009-3867", "CVE-2009-3868", "CVE-2009-3869", "CVE-2009-3871", "CVE-2009-3872", "CVE-2009-3873", "CVE-2009-3874", "CVE-2009-3875", "CVE-2009-3876", "CVE-2009-3877");
  script_version ("$Revision$");
- script_tag(name:"cvss_base", value:"9.3");
- script_tag(name:"risk_factor", value:"Critical");
+ script_tag(name:"cvss_base", value:"5.0");
+ script_tag(name:"risk_factor", value:"Medium");
  script_name("RedHat Security Advisory RHSA-2009:1694");
 
  desc = "The remote host is missing updates announced in
@@ -60,7 +60,7 @@
 http://www.redhat.com/security/updates/classification/#critical
 http://www.ibm.com/developerworks/java/jdk/alerts/
 
-Risk factor : High";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/SHN_Sendmail_DoublePipe.nasl
===================================================================
--- trunk/openvas-plugins/scripts/SHN_Sendmail_DoublePipe.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/SHN_Sendmail_DoublePipe.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -28,8 +28,8 @@
  script_bugtraq_id(5845);
  script_cve_id("CVE-2002-1165", "CVE-2002-1337");
  script_version ("$Revision$");
- script_tag(name:"cvss_base", value:"10.0");
- script_tag(name:"risk_factor", value:"Critical");
+ script_tag(name:"cvss_base", value:"4.6");
+ script_tag(name:"risk_factor", value:"Medium");
  script_xref(name:"RHSA", value:"RHSA-2003:073-06");
  script_xref(name:"SuSE", value:"SUSE-SA:2003:023");
 

Modified: trunk/openvas-plugins/scripts/aardvark_422_remote_file_include.nasl
===================================================================
--- trunk/openvas-plugins/scripts/aardvark_422_remote_file_include.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/aardvark_422_remote_file_include.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -28,7 +28,7 @@
 if (description) {
  script_id(200005); 
  script_version("$Revision: 1.0 $");
- script_tag(name:"cvss_base", value:"6.0");
+ script_tag(name:"cvss_base", value:"6.4");
  script_tag(name:"risk_factor", value:"High");
 
  script_cve_id("CVE-2006-2149");
@@ -63,7 +63,7 @@
 
 Disable PHP's 'register_globals' or upgrade to the latest release.
 
-Risk factor: High / CVSS Base Score : 6 
+Risk factor : High / CVSS Base Score : 6 
 (AV:R/AC:H/Au:NR/C:P/A:P/I:P/B:N)";
  script_description(desc);
  summary = "Checks for a file include in Aardvark Topsites less or equal to 4.2.2";

Modified: trunk/openvas-plugins/scripts/agora.nasl
===================================================================
--- trunk/openvas-plugins/scripts/agora.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/agora.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -27,8 +27,8 @@
  script_id(10836);
  script_bugtraq_id(3702);
  script_version ("$Revision$");
- script_tag(name:"cvss_base", value:"3.0");
- script_tag(name:"risk_factor", value:"Medium");
+ script_tag(name:"cvss_base", value:"7.5");
+ script_tag(name:"risk_factor", value:"High");
  script_cve_id("CVE-2001-1199");
  
  name = "Agora CGI Cross Site Scripting";
@@ -50,7 +50,7 @@
 
 Upgrade to Agora 4.0e or newer.
 
-Risk factor: Medium / CVSS Base Score : 3
+Risk factor : High / CVSS Base Score : 3
 (AV:R/AC:H/Au:NR/C:P/A:N/I:N/B:C)";
 
  script_description(desc);

Modified: trunk/openvas-plugins/scripts/apache_Tomcat_Servlet_XSS.nasl
===================================================================
--- trunk/openvas-plugins/scripts/apache_Tomcat_Servlet_XSS.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/apache_Tomcat_Servlet_XSS.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -32,8 +32,8 @@
  script_id(11041);
  script_bugtraq_id(5193);
  script_version("$Revision$");
- script_tag(name:"cvss_base", value:"3.0");
- script_tag(name:"risk_factor", value:"Medium");
+ script_tag(name:"cvss_base", value:"7.5");
+ script_tag(name:"risk_factor", value:"High");
  script_cve_id("CVE-2002-0682");
  
  name = "Apache Tomcat /servlet Cross Site Scripting";
@@ -71,7 +71,7 @@
 
 www.westpoint.ltd.uk/advisories/wp-02-0008.txt
 
-Risk factor: Medium / CVSS Base Score : 3
+Risk factor : High / CVSS Base Score : 3
 (AV:R/AC:H/Au:NR/C:P/A:N/I:N/B:C)";
 
  script_description(desc);

Modified: trunk/openvas-plugins/scripts/apache_Tomcat_TroubleShooter.nasl
===================================================================
--- trunk/openvas-plugins/scripts/apache_Tomcat_TroubleShooter.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/apache_Tomcat_TroubleShooter.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -31,7 +31,7 @@
  script_cve_id("CVE-2002-2006");
  script_bugtraq_id(4575);
  script_version("$Revision$");
- script_tag(name:"cvss_base", value:"3.0");
+ script_tag(name:"cvss_base", value:"5.0");
  script_tag(name:"risk_factor", value:"Medium");
  name = "Apache Tomcat TroubleShooter Servlet Installed";
  script_name(name);
@@ -58,7 +58,7 @@
 
 http://www.osvdb.org/displayvuln.php?osvdb_id=849
 
-Risk factor: Medium / CVSS Base Score : 3
+Risk factor : Medium / CVSS Base Score : 3
 (AV:R/AC:H/Au:NR/C:P/A:N/I:N/B:C)";
 
  script_description(desc);

Modified: trunk/openvas-plugins/scripts/apcupsd_overflows.nasl
===================================================================
--- trunk/openvas-plugins/scripts/apcupsd_overflows.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/apcupsd_overflows.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -32,8 +32,8 @@
 
   
   script_version ("$Revision: 1.8 $");
-  script_tag(name:"cvss_base", value:"10.0");
-  script_tag(name:"risk_factor", value:"Critical");
+  script_tag(name:"cvss_base", value:"2.1");
+  script_tag(name:"risk_factor", value:"Medium");
  
   script_name("apcupsd overflows");
  
@@ -45,7 +45,7 @@
 *** OpenVAS solely relied on the version number of the 
 *** remote server, so this might be a false positive
 
-Risk factor: Critical";
+Risk factor : Medium";
 
   script_description(desc);
  

Modified: trunk/openvas-plugins/scripts/articlelive_xss.nasl
===================================================================
--- trunk/openvas-plugins/scripts/articlelive_xss.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/articlelive_xss.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,7 +30,7 @@
 {
  script_id(17612);
  script_version("$Revision$");
- script_tag(name:"cvss_base", value:"3.0");
+ script_tag(name:"cvss_base", value:"4.3");
  script_tag(name:"risk_factor", value:"Medium");
  script_cve_id("CVE-2005-0881");
  script_bugtraq_id(12879);
@@ -59,7 +59,7 @@
 
 Upgrade to the newest version of this software
 
-Risk factor: Medium / CVSS Base Score : 3
+Risk factor : Medium / CVSS Base Score : 3
 (AV:R/AC:H/Au:NR/C:P/A:N/I:N/B:C)";
 
  script_description(desc);

Modified: trunk/openvas-plugins/scripts/aspdev_imgtag.nasl
===================================================================
--- trunk/openvas-plugins/scripts/aspdev_imgtag.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/aspdev_imgtag.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -33,7 +33,7 @@
  script_cve_id("CVE-2005-1008");
  script_bugtraq_id(12958);
  script_version("$Revision$");
- script_tag(name:"cvss_base", value:"5.0");
+ script_tag(name:"cvss_base", value:"4.3");
  script_tag(name:"risk_factor", value:"Medium");
  name = "ASP-DEv XM Forum IMG Tag Script Injection Vulnerability";
  script_name(name);

Modified: trunk/openvas-plugins/scripts/asterisk_sdp_header_overflow.nasl
===================================================================
--- trunk/openvas-plugins/scripts/asterisk_sdp_header_overflow.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/asterisk_sdp_header_overflow.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -34,8 +34,8 @@
 if (description) {
  script_id(9999992);
  script_version("$Revision: 1.0 $");
- script_tag(name:"cvss_base", value:"5.0");
- script_tag(name:"risk_factor", value:"Medium");
+ script_tag(name:"cvss_base", value:"7.8");
+ script_tag(name:"risk_factor", value:"High");
  script_bugtraq_id(23031);
  script_cve_id("CVE-2007-1561");
 
@@ -66,7 +66,7 @@
 
 Upgrade to Asterisk release 1.4.2/1.2.17 or newer.
 
-Risk factor : Medium
+Risk factor : High
 
 Medium / CVSS Base Score : 5.0
 (AV:R/AC:L/Au:NR/C:N/A:C/I:N/B:A)";

Modified: trunk/openvas-plugins/scripts/atutor_multiple_flaws.nasl
===================================================================
--- trunk/openvas-plugins/scripts/atutor_multiple_flaws.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/atutor_multiple_flaws.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -49,7 +49,7 @@
 
 Apply patch 1.5.1-pl1 or upgrade to version 1.5.2 or later.
 
-Risk factor: High / CVSS Base Score : 6
+Risk factor : Medium / CVSS Base Score : 6
 (AV:R/AC:H/Au:NR/C:P/A:P/I:P/B:N)"; 
 
 if(description)
@@ -65,8 +65,8 @@
   script_xref(name:"OSVDB", value:"20349");
 
   script_version("$Revision$");
-  script_tag(name:"cvss_base", value:"6.0");
-  script_tag(name:"risk_factor", value:"High");
+  script_tag(name:"cvss_base", value:"4.3");
+  script_tag(name:"risk_factor", value:"Medium");
   script_name("ATutor < 1.5.1-pl1 Multiple Flaws");
 
   script_description(desc);

Modified: trunk/openvas-plugins/scripts/atutor_password_reminder_sql.nasl
===================================================================
--- trunk/openvas-plugins/scripts/atutor_password_reminder_sql.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/atutor_password_reminder_sql.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -25,8 +25,8 @@
 if (description) {
   script_id(19765);
   script_version("$Revision$");
-  script_tag(name:"cvss_base", value:"5.0");
-  script_tag(name:"risk_factor", value:"Medium");
+  script_tag(name:"cvss_base", value:"7.5");
+  script_tag(name:"risk_factor", value:"High");
   script_cve_id("CVE-2005-2954");
   script_bugtraq_id(14831);
 

Modified: trunk/openvas-plugins/scripts/atutor_xss.nasl
===================================================================
--- trunk/openvas-plugins/scripts/atutor_xss.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/atutor_xss.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,7 +30,7 @@
  script_xref(name:"OSVDB", value:"18842");
  script_xref(name:"OSVDB", value:"18843");
  script_version ("$Revision$");
- script_tag(name:"cvss_base", value:"3.0");
+ script_tag(name:"cvss_base", value:"4.3");
  script_tag(name:"risk_factor", value:"Medium");
 
  name = "ATutor Cross Site Scripting Vulnerability";
@@ -59,7 +59,7 @@
 
 Unknown at this time.
 
-Risk factor: Medium / CVSS Base Score : 3
+Risk factor : Medium / CVSS Base Score : 3
 (AV:R/AC:H/Au:NR/C:P/A:N/I:N/B:C)";
 
  script_description(desc);

Modified: trunk/openvas-plugins/scripts/basilix_arbitrary_file_disclosure.nasl
===================================================================
--- trunk/openvas-plugins/scripts/basilix_arbitrary_file_disclosure.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/basilix_arbitrary_file_disclosure.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -25,7 +25,7 @@
 if (description) {
   script_id(14305);
   script_version ("$Revision$"); 
-  script_tag(name:"cvss_base", value:"4.0");
+  script_tag(name:"cvss_base", value:"3.6");
   script_tag(name:"risk_factor", value:"Medium");
 
   script_cve_id("CVE-2002-1710");

Modified: trunk/openvas-plugins/scripts/basilix_attachment_disclosure.nasl
===================================================================
--- trunk/openvas-plugins/scripts/basilix_attachment_disclosure.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/basilix_attachment_disclosure.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -25,8 +25,8 @@
 if (description) {
   script_id(14306);
   script_version ("$Revision$"); 
-  script_tag(name:"cvss_base", value:"2.0");
-  script_tag(name:"risk_factor", value:"Low");
+  script_tag(name:"cvss_base", value:"2.1");
+  script_tag(name:"risk_factor", value:"Medium");
 
   script_cve_id("CVE-2002-1711");
   script_bugtraq_id(5065);

Modified: trunk/openvas-plugins/scripts/basilix_message_content_script_injection.nasl
===================================================================
--- trunk/openvas-plugins/scripts/basilix_message_content_script_injection.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/basilix_message_content_script_injection.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -25,8 +25,8 @@
 if (description) {
   script_id(14218);
   script_version("$Revision$");
-  script_tag(name:"cvss_base", value:"2.0");
-  script_tag(name:"risk_factor", value:"Low");
+  script_tag(name:"cvss_base", value:"6.8");
+  script_tag(name:"risk_factor", value:"High");
 
   script_cve_id("CVE-2002-1708");
   script_bugtraq_id(5060);

Modified: trunk/openvas-plugins/scripts/basilix_sql_injection.nasl
===================================================================
--- trunk/openvas-plugins/scripts/basilix_sql_injection.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/basilix_sql_injection.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -25,8 +25,8 @@
 if (description) {
   script_id(14219);
   script_version ("$Revision$"); 
-  script_tag(name:"cvss_base", value:"4.0");
-  script_tag(name:"risk_factor", value:"Medium");
+  script_tag(name:"cvss_base", value:"6.4");
+  script_tag(name:"risk_factor", value:"High");
 
   script_cve_id("CVE-2002-1709");
   script_bugtraq_id(5061);

Modified: trunk/openvas-plugins/scripts/basilix_webmail.nasl
===================================================================
--- trunk/openvas-plugins/scripts/basilix_webmail.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/basilix_webmail.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -34,8 +34,8 @@
  script_id(11072);
  script_bugtraq_id(2995);
  script_version ("$Revision$");
-  script_tag(name:"cvss_base", value:"2.0");
-  script_tag(name:"risk_factor", value:"Low");
+  script_tag(name:"cvss_base", value:"5.0");
+  script_tag(name:"risk_factor", value:"Medium");
  script_cve_id("CVE-2001-1045");
  name = "Basilix Webmail Dummy Request Vulnerability";
  script_name(name);

Modified: trunk/openvas-plugins/scripts/bind_37118.nasl
===================================================================
--- trunk/openvas-plugins/scripts/bind_37118.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/bind_37118.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,7 +30,7 @@
  script_bugtraq_id(37118);
  script_cve_id("CVE-2009-4022");
  script_version ("1.0-$Revision$");
- script_tag(name:"cvss_base", value:"4.0");
+ script_tag(name:"cvss_base", value:"2.6");
  script_tag(name:"risk_factor", value:"Medium");
 
  script_name("ISC BIND 9 DNSSEC Query Response Additional Section Remote Cache Poisoning Vulnerability");

Modified: trunk/openvas-plugins/scripts/bookreview_xss.nasl
===================================================================
--- trunk/openvas-plugins/scripts/bookreview_xss.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/bookreview_xss.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -26,7 +26,7 @@
 {
  script_id(18375);
  script_version ("$Revision$");
- script_tag(name:"cvss_base", value:"3.0");
+ script_tag(name:"cvss_base", value:"4.3");
  script_tag(name:"risk_factor", value:"Medium");
 
  script_cve_id("CVE-2005-1782");
@@ -67,7 +67,7 @@
 
 None at this time
 
-Risk factor: Medium / CVSS Base Score : 3
+Risk factor : Medium / CVSS Base Score : 3
 (AV:R/AC:H/Au:NR/C:P/A:N/I:N/B:C)";
 
  script_description(desc);

Modified: trunk/openvas-plugins/scripts/calendar_express_flaws.nasl
===================================================================
--- trunk/openvas-plugins/scripts/calendar_express_flaws.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/calendar_express_flaws.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,8 +30,8 @@
  script_cve_id("CVE-2007-3627");
  script_bugtraq_id(14504, 14505);
  script_version("$Revision$");
- script_tag(name:"cvss_base", value:"5.0");
- script_tag(name:"risk_factor", value:"Medium");
+ script_tag(name:"cvss_base", value:"7.5");
+ script_tag(name:"risk_factor", value:"High");
  
  name = "Calendar Express Multiple Flaws";
 

Modified: trunk/openvas-plugins/scripts/calendar_scheduler_xss.nasl
===================================================================
--- trunk/openvas-plugins/scripts/calendar_scheduler_xss.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/calendar_scheduler_xss.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,7 +30,7 @@
 {
  script_id(17613);
  script_version("$Revision$");
- script_tag(name:"cvss_base", value:"3.0");
+ script_tag(name:"cvss_base", value:"4.3");
  script_tag(name:"risk_factor", value:"Medium");
 
  script_cve_id("CVE-2005-0872");
@@ -59,7 +59,7 @@
 
 Disable this module or upgrade to a newer version
 
-Risk factor: Medium / CVSS Base Score : 3 
+Risk factor : Medium / CVSS Base Score : 3 
 (AV:R/AC:H/Au:NR/C:P/A:N/I:N/B:C)";
 
  script_description(desc);

Modified: trunk/openvas-plugins/scripts/cart32_xss.nasl
===================================================================
--- trunk/openvas-plugins/scripts/cart32_xss.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/cart32_xss.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -32,8 +32,8 @@
  script_cve_id("CVE-2004-0675");
  script_bugtraq_id(10617);
  script_version("$Revision$");
- script_tag(name:"cvss_base", value:"3.0");
- script_tag(name:"risk_factor", value:"Medium");
+ script_tag(name:"cvss_base", value:"6.8");
+ script_tag(name:"risk_factor", value:"High");
  
  name = "Cart32 GetLatestBuilds XSS";
 
@@ -59,7 +59,7 @@
 
 Upgrade to the newest version of this software
 
-Risk factor: Medium / CVSS Base Score : 3 
+Risk factor : High / CVSS Base Score : 3 
 (AV:R/AC:H/Au:NR/C:P/A:N/I:N/B:C)";
 
  script_description(desc);

Modified: trunk/openvas-plugins/scripts/cesarftp_mkd_command_buffer_overflow.nasl
===================================================================
--- trunk/openvas-plugins/scripts/cesarftp_mkd_command_buffer_overflow.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/cesarftp_mkd_command_buffer_overflow.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -28,7 +28,7 @@
 if (description) {
  script_id(200058); 
  script_version("$Revision: 1.0 $");
- script_tag(name:"cvss_base", value:"6.0");
+ script_tag(name:"cvss_base", value:"7.5");
  script_tag(name:"risk_factor", value:"High");
 
  script_cve_id("CVE-2006-2961");
@@ -69,7 +69,7 @@
 Filter access to the FTP service, so that it can be used by trusted
 sources only.
 
-Risk factor: High / CVSS Base Score : 6 
+Risk factor : High / CVSS Base Score : 6 
 (AV:R/AC:L/Au:R/C:C/A:C/I:C/B:N)";
  script_description(desc);
  summary = "Detect a buffer overflow in CesarFTP server via a long MKD string";

Modified: trunk/openvas-plugins/scripts/cgiwrap.nasl
===================================================================
--- trunk/openvas-plugins/scripts/cgiwrap.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/cgiwrap.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -27,8 +27,8 @@
  script_id(10041);
  script_bugtraq_id(1238, 777);
  script_version ("$Revision$");
- script_tag(name:"cvss_base", value:"7.5");
- script_tag(name:"risk_factor", value:"High");
+ script_tag(name:"cvss_base", value:"3.6");
+ script_tag(name:"risk_factor", value:"Medium");
  script_cve_id("CVE-1999-1530", "CVE-2000-0431");
 
 
@@ -45,7 +45,7 @@
 of cgiwrap are not affected.
 
 Solution : upgrade your Cobalt RaQ to apply fix
-Risk factor: High";
+Risk factor : Medium";
 
 
 

Modified: trunk/openvas-plugins/scripts/chargen.nasl
===================================================================
--- trunk/openvas-plugins/scripts/chargen.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/chargen.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -26,8 +26,8 @@
 {
  script_id(10043);
  script_version ("$Revision$");
- script_tag(name:"cvss_base", value:"2.0");
- script_tag(name:"risk_factor", value:"Low");
+ script_tag(name:"cvss_base", value:"5.0");
+ script_tag(name:"risk_factor", value:"Medium");
  script_cve_id("CVE-1999-0103"); 
  name = "Chargen";
  script_name(name);

Modified: trunk/openvas-plugins/scripts/cherokee_0_4_7.nasl
===================================================================
--- trunk/openvas-plugins/scripts/cherokee_0_4_7.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/cherokee_0_4_7.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -31,7 +31,7 @@
  script_xref(name:"OSVDB", value:3707);
 
  script_version("$Revision$");
- script_tag(name:"cvss_base", value:"3.0");
+ script_tag(name:"cvss_base", value:"4.3");
  script_tag(name:"risk_factor", value:"Medium");
  name = "Cross-Site Scripting in Cherokee Error Pages";
 
@@ -54,7 +54,7 @@
 
 Upgrade to Cherokee 0.4.8 or newer.
 
-Risk factor: Medium / CVSS Base Score : 3 
+Risk factor : Medium / CVSS Base Score : 3 
 (AV:R/AC:H/Au:NR/C:P/A:N/I:N/B:C)";
 
  script_description(desc);

Modified: trunk/openvas-plugins/scripts/cisco_default_pw.nasl
===================================================================
--- trunk/openvas-plugins/scripts/cisco_default_pw.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/cisco_default_pw.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -60,8 +60,8 @@
  script_id(23938);
  script_cve_id("CVE-1999-0508");
  script_version ("$Revision: 1.9 $");
- script_tag(name:"cvss_base", value:"10.0");
- script_tag(name:"risk_factor", value:"Critical");
+ script_tag(name:"cvss_base", value:"4.6");
+ script_tag(name:"risk_factor", value:"Medium");
 
 
  name = "Cisco default password";

Modified: trunk/openvas-plugins/scripts/cisco_ios_ftp_server_auth_bypass.nasl
===================================================================
--- trunk/openvas-plugins/scripts/cisco_ios_ftp_server_auth_bypass.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/cisco_ios_ftp_server_auth_bypass.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -43,14 +43,14 @@
 Disable the FTP Server by using 'no ftp-server enable'
 or upgrade to a newer release (see cisco-sa-20070509-iosftp). 
 
-Risk factor: Critical / CVSS Base Score : 8.5 
+Risk factor : Critical / CVSS Base Score : 8.5 
 (AV:R/AC:L/Au:NR/C:C/A:P/I:P/B:C)";
 script_description(desc);
 
 if (description) {
  script_id(9999996);
  script_version("$Revision: 1.0 $");
- script_tag(name:"cvss_base", value:"8.5");
+ script_tag(name:"cvss_base", value:"9.3");
  script_tag(name:"risk_factor", value:"Critical");
  script_cve_id("CVE-2007-2586");
  script_bugtraq_id(23885);

Modified: trunk/openvas-plugins/scripts/cisco_vpn_client_priv_escalation.nasl
===================================================================
--- trunk/openvas-plugins/scripts/cisco_vpn_client_priv_escalation.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/cisco_vpn_client_priv_escalation.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -25,7 +25,7 @@
 if (description) {
  script_id(25550);
  script_version("$Revision: 1.2 $");
- script_tag(name:"cvss_base", value:"7.0");
+ script_tag(name:"cvss_base", value:"7.2");
  script_tag(name:"risk_factor", value:"High");
 
  script_cve_id("CVE-2006-2679");

Modified: trunk/openvas-plugins/scripts/codethatshoppingcart_sql.nasl
===================================================================
--- trunk/openvas-plugins/scripts/codethatshoppingcart_sql.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/codethatshoppingcart_sql.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -31,7 +31,7 @@
  script_xref(name:"OSVDB", value:"16156");
  script_xref(name:"OSVDB", value:"16157");
  script_version ("$Revision$");
- script_tag(name:"cvss_base", value:"7.5");
+ script_tag(name:"cvss_base", value:"6.8");
  script_tag(name:"risk_factor", value:"High");
 
  name = "CodeThatShoppingCart Input Validation Vulnerabilities";

Modified: trunk/openvas-plugins/scripts/comersus_xss.nasl
===================================================================
--- trunk/openvas-plugins/scripts/comersus_xss.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/comersus_xss.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -32,7 +32,7 @@
  script_cve_id("CVE-2004-0681", "CVE-2004-0682");
  script_bugtraq_id(10674);
  script_version("$Revision$");
- script_tag(name:"cvss_base", value:"7.5");
+ script_tag(name:"cvss_base", value:"6.8");
  script_tag(name:"risk_factor", value:"High");
  
  name = "Comersus Cart Cross-Site Scripting Vulnerability";
@@ -47,7 +47,7 @@
 down IIS.
 
 Solution: Upgrade to version 5.098 or newer
-Risk factor: High";
+Risk factor : High";
 
  script_description(desc);
  

Modified: trunk/openvas-plugins/scripts/cubecart_xss.nasl
===================================================================
--- trunk/openvas-plugins/scripts/cubecart_xss.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/cubecart_xss.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -29,7 +29,7 @@
   script_cve_id("CVE-2005-3152");
   script_bugtraq_id(14962);
   script_version ("$Revision$");
-  script_tag(name:"cvss_base", value:"3.0");
+  script_tag(name:"cvss_base", value:"4.3");
   script_tag(name:"risk_factor", value:"Medium");
   script_name("Multiple CubeCart XSS vulnerabilities");
   desc = "
@@ -42,7 +42,7 @@
   http://lostmon.blogspot.com/2005/09/cubecart-303-multiple-variable-cross.html
   Solution:
   Upgrade to CubeCart version 3.0.4 or later.
-  Risk factor: Medium / CVSS Base Score : 3
+  Risk factor : Medium / CVSS Base Score : 3
   (AV:R/AC:H/Au:NR/C:P/A:N/I:N/B:C)";
 
   script_description(desc);

Modified: trunk/openvas-plugins/scripts/cutenews_dir_traversal.nasl
===================================================================
--- trunk/openvas-plugins/scripts/cutenews_dir_traversal.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/cutenews_dir_traversal.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -34,8 +34,8 @@
   script_xref(name:"OSVDB", value:"20473");
   script_xref(name:"OSVDB", value:"20474");
   script_version("$Revision$");
-  script_tag(name:"cvss_base", value:"7.0");
-  script_tag(name:"risk_factor", value:"High");
+  script_tag(name:"cvss_base", value:"5.0");
+  script_tag(name:"risk_factor", value:"Medium");
   script_name("CuteNews directory traversal flaw");
   desc = "
   Description :
@@ -51,7 +51,7 @@
   http://retrogod.altervista.org/cute141.html
   Solution: Unknown at this time.
 
-  Risk factor: High;
+  Risk factor : Medium;
   High / CVSS Base Score : 7
   (AV:R/AC:L/Au:NR/C:P/A:P/I:P/B:N)";
   script_description(desc);

Modified: trunk/openvas-plugins/scripts/cutenews_indexphp_xss.nasl
===================================================================
--- trunk/openvas-plugins/scripts/cutenews_indexphp_xss.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/cutenews_indexphp_xss.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -31,8 +31,8 @@
  script_cve_id("CVE-2004-1659");
  script_bugtraq_id(11097);
  script_version ("$Revision$");
-  script_tag(name:"cvss_base", value:"2.0");
-  script_tag(name:"risk_factor", value:"Low");
+  script_tag(name:"cvss_base", value:"4.3");
+  script_tag(name:"risk_factor", value:"Medium");
  
  name = "CuteNews index.php XSS";
 

Modified: trunk/openvas-plugins/scripts/cutenews_show_news_xss.nasl
===================================================================
--- trunk/openvas-plugins/scripts/cutenews_show_news_xss.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/cutenews_show_news_xss.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,8 +30,8 @@
 {
  script_id(12291);
  script_version("$Revision$");
-  script_tag(name:"cvss_base", value:"2.0");
-  script_tag(name:"risk_factor", value:"Low");
+  script_tag(name:"cvss_base", value:"6.8");
+  script_tag(name:"risk_factor", value:"High");
 
  script_cve_id("CVE-2004-0660");
  script_bugtraq_id(10620, 10750);

Modified: trunk/openvas-plugins/scripts/deb_2070_1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/deb_2070_1.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/deb_2070_1.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,7 +30,8 @@
  script_id(67706);
  script_cve_id("CVE-2010-2497", "CVE-2010-2498", "CVE-2010-2499", "CVE-2010-2500", "CVE-2010-2519", "CVE-2010-2520", "CVE-2010-2527");
  script_tag(name:"risk_factor", value:"High");
- script_version ("$Revision$");
+ script_tag(name:"cvss_base", value:"6.8");
+ script_version("$Revision$");
  script_name("Debian Security Advisory DSA 2070-1 (freetype)");
 
  desc = "The remote host is missing an update to freetype

Modified: trunk/openvas-plugins/scripts/deb_2122_1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/deb_2122_1.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/deb_2122_1.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,7 +30,8 @@
  script_id(68463);
  script_cve_id("CVE-2010-3847", "CVE-2010-3856");
  script_tag(name:"risk_factor", value:"High");
- script_version ("$Revision$");
+ script_tag(name:"cvss_base", value:"6.9");
+ script_version("$Revision$");
  script_name("Debian Security Advisory DSA 2122-1 (glibc)");
 
  desc = "The remote host is missing an update to glibc

Modified: trunk/openvas-plugins/scripts/deb_2190_1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/deb_2190_1.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/deb_2190_1.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -29,8 +29,9 @@
 {
  script_id(69326);
  script_cve_id("CVE-2011-0700", "CVE-2011-0701");
- script_tag(name:"risk_factor", value:"High");
- script_version ("$Revision$");
+ script_tag(name:"risk_factor", value:"Medium");
+ script_tag(name:"cvss_base", value:"3.5");
+ script_version("$Revision$");
  script_name("Debian Security Advisory DSA 2190-1 (wordpress)");
 
  desc = "The remote host is missing an update to wordpress
@@ -72,7 +73,7 @@
 Solution:
 https://secure1.securityspace.com/smysecure/catid.html?in=DSA%202190-1
 
-Risk factor : High";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/deb_2192_1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/deb_2192_1.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/deb_2192_1.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -29,8 +29,9 @@
 {
  script_id(69328);
  script_cve_id("CVE-2011-0779", "CVE-2011-1290");
- script_tag(name:"risk_factor", value:"High");
- script_version ("$Revision$");
+ script_tag(name:"risk_factor", value:"Medium");
+ script_tag(name:"cvss_base", value:"5.0");
+ script_version("$Revision$");
  script_name("Debian Security Advisory DSA 2192-1 (chromium-browser)");
 
  desc = "The remote host is missing an update to chromium-browser
@@ -68,7 +69,7 @@
 Solution:
 https://secure1.securityspace.com/smysecure/catid.html?in=DSA%202192-1
 
-Risk factor : High";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/deb_2197_1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/deb_2197_1.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/deb_2197_1.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -29,8 +29,9 @@
 {
  script_id(69333);
  script_cve_id("CVE-2010-1674", "CVE-2010-1675");
- script_tag(name:"risk_factor", value:"High");
- script_version ("$Revision$");
+ script_tag(name:"risk_factor", value:"Medium");
+ script_tag(name:"cvss_base", value:"5.0");
+ script_version("$Revision$");
  script_name("Debian Security Advisory DSA 2197-1 (quagga)");
 
  desc = "The remote host is missing an update to quagga
@@ -73,7 +74,7 @@
 Solution:
 https://secure1.securityspace.com/smysecure/catid.html?in=DSA%202197-1
 
-Risk factor : High";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/deb_2277_1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/deb_2277_1.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/deb_2277_1.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -29,8 +29,9 @@
 {
  script_id(69983);
  script_cve_id("CVE-2011-2516");
- script_tag(name:"risk_factor", value:"High");
- script_version ("$Revision$");
+ script_tag(name:"risk_factor", value:"Medium");
+ script_tag(name:"cvss_base", value:"5.0");
+ script_version("$Revision$");
  script_name("Debian Security Advisory DSA 2277-1 (xml-security-c)");
 
  desc = "The remote host is missing an update to xml-security-c
@@ -60,7 +61,7 @@
 Solution:
 https://secure1.securityspace.com/smysecure/catid.html?in=DSA%202277-1
 
-Risk factor : High";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/deb_2279_1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/deb_2279_1.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/deb_2279_1.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,7 +30,8 @@
  script_id(69988);
  script_cve_id("CVE-2011-2688");
  script_tag(name:"risk_factor", value:"High");
- script_version ("$Revision$");
+ script_tag(name:"cvss_base", value:"7.5");
+ script_version("$Revision$");
  script_name("Debian Security Advisory DSA 2279-1 (libapache2-mod-authnz-external)");
 
  desc = "The remote host is missing an update to libapache2-mod-authnz-external

Modified: trunk/openvas-plugins/scripts/deb_2284_1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/deb_2284_1.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/deb_2284_1.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,7 +30,8 @@
  script_id(70058);
  script_cve_id("CVE-2011-1411");
  script_tag(name:"risk_factor", value:"High");
- script_version ("$Revision$");
+ script_tag(name:"cvss_base", value:"5.8");
+ script_version("$Revision$");
  script_name("Debian Security Advisory DSA 2284-1 (opensaml2)");
 
  desc = "The remote host is missing an update to opensaml2

Modified: trunk/openvas-plugins/scripts/e107_sql_injection.nasl
===================================================================
--- trunk/openvas-plugins/scripts/e107_sql_injection.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/e107_sql_injection.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,8 +30,8 @@
  script_cve_id("CVE-2005-3521");
  script_bugtraq_id(15125);
  script_version("$Revision$");
- script_tag(name:"cvss_base", value:"5.0");
- script_tag(name:"risk_factor", value:"Medium");
+ script_tag(name:"cvss_base", value:"7.5");
+ script_tag(name:"risk_factor", value:"High");
  name = "e107 resetcore.php SQL Injection";
  script_name(name);
  

Modified: trunk/openvas-plugins/scripts/easy_message_board_cmd_exec.nasl
===================================================================
--- trunk/openvas-plugins/scripts/easy_message_board_cmd_exec.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/easy_message_board_cmd_exec.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -36,14 +36,14 @@
 the web server.
 
 Solution : Upgrade to the newest version of this CGI or disable it
-Risk factor : High';
+Risk factor : Medium';
 
 if(description)
 {
  script_id(18211);
  script_version ("$Revision$");
- script_tag(name:"cvss_base", value:"7.5");
- script_tag(name:"risk_factor", value:"High");
+ script_tag(name:"cvss_base", value:"5.0");
+ script_tag(name:"risk_factor", value:"Medium");
 
  script_cve_id("CVE-2005-1549", "CVE-2005-1550");
  script_bugtraq_id(13555, 13551);

Modified: trunk/openvas-plugins/scripts/fcore_2008_11923.nasl
===================================================================
--- trunk/openvas-plugins/scripts/fcore_2008_11923.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/fcore_2008_11923.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,8 +30,8 @@
  script_id(63385);
  script_cve_id("CVE-2008-4298", "CVE-2008-4359", "CVE-2008-4360");
  script_version ("$");
- script_tag(name:"cvss_base", value:"7.8");
- script_tag(name:"risk_factor", value:"High");
+ script_tag(name:"cvss_base", value:"5.0");
+ script_tag(name:"risk_factor", value:"Medium");
  name = "Fedora Core 9 FEDORA-2008-11923 (lighttpd)";
  script_name(name);
 
@@ -78,7 +78,7 @@
 
 https://secure1.securityspace.com/smysecure/catid.html?in=FEDORA-2008-11923
 
-Risk factor : High";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/fcore_2009_0059.nasl
===================================================================
--- trunk/openvas-plugins/scripts/fcore_2009_0059.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/fcore_2009_0059.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,8 +30,8 @@
  script_id(63116);
  script_cve_id("CVE-2003-0063", "CVE-2003-0071", "CVE-2008-2383");
  script_version ("$");
- script_tag(name:"cvss_base", value:"9.3");
- script_tag(name:"risk_factor", value:"Critical");
+ script_tag(name:"cvss_base", value:"7.5");
+ script_tag(name:"risk_factor", value:"High");
  name = "Fedora Core 9 FEDORA-2009-0059 (xterm)";
  script_name(name);
 
@@ -66,7 +66,7 @@
 
 https://secure1.securityspace.com/smysecure/catid.html?in=FEDORA-2009-0059
 
-Risk factor: Critical";
+Risk factor : High";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/fcore_2009_0091.nasl
===================================================================
--- trunk/openvas-plugins/scripts/fcore_2009_0091.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/fcore_2009_0091.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,8 +30,8 @@
  script_id(63120);
  script_cve_id("CVE-2003-0063", "CVE-2003-0071", "CVE-2008-2383");
  script_version ("$");
- script_tag(name:"cvss_base", value:"9.3");
- script_tag(name:"risk_factor", value:"Critical");
+ script_tag(name:"cvss_base", value:"7.5");
+ script_tag(name:"risk_factor", value:"High");
  name = "Fedora Core 10 FEDORA-2009-0091 (xterm)";
  script_name(name);
 
@@ -66,7 +66,7 @@
 
 https://secure1.securityspace.com/smysecure/catid.html?in=FEDORA-2009-0091
 
-Risk factor: Critical";
+Risk factor : High";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/fcore_2009_0154.nasl
===================================================================
--- trunk/openvas-plugins/scripts/fcore_2009_0154.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/fcore_2009_0154.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,8 +30,8 @@
  script_id(63121);
  script_cve_id("CVE-2003-0063", "CVE-2003-0071", "CVE-2008-2383");
  script_version ("$");
- script_tag(name:"cvss_base", value:"9.3");
- script_tag(name:"risk_factor", value:"Critical");
+ script_tag(name:"cvss_base", value:"7.5");
+ script_tag(name:"risk_factor", value:"High");
  name = "Fedora Core 8 FEDORA-2009-0154 (xterm)";
  script_name(name);
 
@@ -66,7 +66,7 @@
 
 https://secure1.securityspace.com/smysecure/catid.html?in=FEDORA-2009-0154
 
-Risk factor: Critical";
+Risk factor : High";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/fcore_2009_0160.nasl
===================================================================
--- trunk/openvas-plugins/scripts/fcore_2009_0160.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/fcore_2009_0160.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,8 +30,8 @@
  script_id(63122);
  script_cve_id("CVE-2009-0022", "CVE-2008-4314");
  script_version ("$");
- script_tag(name:"cvss_base", value:"8.5");
- script_tag(name:"risk_factor", value:"Critical");
+ script_tag(name:"cvss_base", value:"6.3");
+ script_tag(name:"risk_factor", value:"High");
  name = "Fedora Core 10 FEDORA-2009-0160 (samba)";
  script_name(name);
 
@@ -60,7 +60,7 @@
 
 https://secure1.securityspace.com/smysecure/catid.html?in=FEDORA-2009-0160
 
-Risk factor: Critical";
+Risk factor : High";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/fcore_2009_0268.nasl
===================================================================
--- trunk/openvas-plugins/scripts/fcore_2009_0268.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/fcore_2009_0268.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,8 +30,8 @@
  script_id(63140);
  script_cve_id("CVE-2009-0022", "CVE-2008-4314", "CVE-2008-3789", "CVE-2008-1105");
  script_version ("$");
- script_tag(name:"cvss_base", value:"8.5");
- script_tag(name:"risk_factor", value:"Critical");
+ script_tag(name:"cvss_base", value:"6.3");
+ script_tag(name:"risk_factor", value:"High");
  name = "Fedora Core 9 FEDORA-2009-0268 (samba)";
  script_name(name);
 
@@ -63,7 +63,7 @@
 
 https://secure1.securityspace.com/smysecure/catid.html?in=FEDORA-2009-0268
 
-Risk factor: Critical";
+Risk factor : High";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/fcore_2009_0350.nasl
===================================================================
--- trunk/openvas-plugins/scripts/fcore_2009_0350.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/fcore_2009_0350.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,8 +30,8 @@
  script_id(63208);
  script_cve_id("CVE-2009-0025", "CVE-2008-1447");
  script_version ("$");
- script_tag(name:"cvss_base", value:"6.4");
- script_tag(name:"risk_factor", value:"High");
+ script_tag(name:"cvss_base", value:"5.0");
+ script_tag(name:"risk_factor", value:"Medium");
  name = "Fedora Core 9 FEDORA-2009-0350 (bind)";
  script_name(name);
 
@@ -67,7 +67,7 @@
 
 https://secure1.securityspace.com/smysecure/catid.html?in=FEDORA-2009-0350
 
-Risk factor : High";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/fcore_2009_0483.nasl
===================================================================
--- trunk/openvas-plugins/scripts/fcore_2009_0483.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/fcore_2009_0483.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,7 +30,7 @@
  script_id(63211);
  script_cve_id("CVE-2008-5234", "CVE-2008-5236", "CVE-2008-5237", "CVE-2008-5239", "CVE-2008-5240", "CVE-2008-5243");
  script_version ("$");
- script_tag(name:"cvss_base", value:"10.0");
+ script_tag(name:"cvss_base", value:"9.3");
  script_tag(name:"risk_factor", value:"Critical");
  name = "Fedora Core 10 FEDORA-2009-0483 (xine-lib)";
  script_name(name);
@@ -74,7 +74,7 @@
 
 https://secure1.securityspace.com/smysecure/catid.html?in=FEDORA-2009-0483
 
-Risk factor: Critical";
+Risk factor : Critical";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/fcore_2009_0542.nasl
===================================================================
--- trunk/openvas-plugins/scripts/fcore_2009_0542.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/fcore_2009_0542.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,7 +30,7 @@
  script_id(63213);
  script_cve_id("CVE-2008-5234", "CVE-2008-5236", "CVE-2008-5237", "CVE-2008-5239", "CVE-2008-5240", "CVE-2008-5243", "CVE-2008-3231");
  script_version ("$");
- script_tag(name:"cvss_base", value:"10.0");
+ script_tag(name:"cvss_base", value:"9.3");
  script_tag(name:"risk_factor", value:"Critical");
  name = "Fedora Core 9 FEDORA-2009-0542 (xine-lib)";
  script_name(name);
@@ -75,7 +75,7 @@
 
 https://secure1.securityspace.com/smysecure/catid.html?in=FEDORA-2009-0542
 
-Risk factor: Critical";
+Risk factor : Critical";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/fcore_2009_0544.nasl
===================================================================
--- trunk/openvas-plugins/scripts/fcore_2009_0544.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/fcore_2009_0544.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,8 +30,8 @@
  script_id(63267);
  script_cve_id("CVE-2009-0021", "CVE-2008-5077");
  script_version ("$");
- script_tag(name:"cvss_base", value:"5.8");
- script_tag(name:"risk_factor", value:"High");
+ script_tag(name:"cvss_base", value:"5.0");
+ script_tag(name:"risk_factor", value:"Medium");
  name = "Fedora Core 10 FEDORA-2009-0544 (ntp)";
  script_name(name);
 
@@ -65,7 +65,7 @@
 
 https://secure1.securityspace.com/smysecure/catid.html?in=FEDORA-2009-0544
 
-Risk factor : High";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/fcore_2009_0547.nasl
===================================================================
--- trunk/openvas-plugins/scripts/fcore_2009_0547.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/fcore_2009_0547.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,8 +30,8 @@
  script_id(63266);
  script_cve_id("CVE-2009-0021", "CVE-2008-5077");
  script_version ("$");
- script_tag(name:"cvss_base", value:"5.8");
- script_tag(name:"risk_factor", value:"High");
+ script_tag(name:"cvss_base", value:"5.0");
+ script_tag(name:"risk_factor", value:"Medium");
  name = "Fedora Core 9 FEDORA-2009-0547 (ntp)";
  script_name(name);
 
@@ -65,7 +65,7 @@
 
 https://secure1.securityspace.com/smysecure/catid.html?in=FEDORA-2009-0547
 
-Risk factor : High";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/fcore_2009_0814.nasl
===================================================================
--- trunk/openvas-plugins/scripts/fcore_2009_0814.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/fcore_2009_0814.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,8 +30,8 @@
  script_id(63260);
  script_cve_id("CVE-2008-5153", "CVE-2008-4796");
  script_version ("$");
- script_tag(name:"cvss_base", value:"10.0");
- script_tag(name:"risk_factor", value:"Critical");
+ script_tag(name:"cvss_base", value:"6.9");
+ script_tag(name:"risk_factor", value:"High");
  name = "Fedora Core 9 FEDORA-2009-0814 (moodle)";
  script_name(name);
 
@@ -63,7 +63,7 @@
 
 https://secure1.securityspace.com/smysecure/catid.html?in=FEDORA-2009-0814
 
-Risk factor: Critical";
+Risk factor : High";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/fcore_2009_0816.nasl
===================================================================
--- trunk/openvas-plugins/scripts/fcore_2009_0816.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/fcore_2009_0816.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,8 +30,8 @@
  script_id(63290);
  script_cve_id("CVE-2009-0029", "CVE-2009-0065", "CVE-2008-5079", "CVE-2008-3528", "CVE-2008-3525", "CVE-2008-3831", "CVE-2008-2750");
  script_version ("$");
- script_tag(name:"cvss_base", value:"10.0");
- script_tag(name:"risk_factor", value:"Critical");
+ script_tag(name:"cvss_base", value:"7.2");
+ script_tag(name:"risk_factor", value:"High");
  name = "Fedora Core 9 FEDORA-2009-0816 (kernel)";
  script_name(name);
 
@@ -93,7 +93,7 @@
 
 https://secure1.securityspace.com/smysecure/catid.html?in=FEDORA-2009-0816
 
-Risk factor: Critical";
+Risk factor : High";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/fcore_2009_0819.nasl
===================================================================
--- trunk/openvas-plugins/scripts/fcore_2009_0819.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/fcore_2009_0819.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,8 +30,8 @@
  script_id(63261);
  script_cve_id("CVE-2008-5153", "CVE-2008-4796");
  script_version ("$");
- script_tag(name:"cvss_base", value:"10.0");
- script_tag(name:"risk_factor", value:"Critical");
+ script_tag(name:"cvss_base", value:"6.9");
+ script_tag(name:"risk_factor", value:"High");
  name = "Fedora Core 10 FEDORA-2009-0819 (moodle)";
  script_name(name);
 
@@ -69,7 +69,7 @@
 
 https://secure1.securityspace.com/smysecure/catid.html?in=FEDORA-2009-0819
 
-Risk factor: Critical";
+Risk factor : High";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/fcore_2009_0923.nasl
===================================================================
--- trunk/openvas-plugins/scripts/fcore_2009_0923.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/fcore_2009_0923.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,8 +30,8 @@
  script_id(63287);
  script_cve_id("CVE-2009-0029", "CVE-2009-0065", "CVE-2008-5079");
  script_version ("$");
- script_tag(name:"cvss_base", value:"10.0");
- script_tag(name:"risk_factor", value:"Critical");
+ script_tag(name:"cvss_base", value:"7.2");
+ script_tag(name:"risk_factor", value:"High");
  name = "Fedora Core 10 FEDORA-2009-0923 (kernel)";
  script_name(name);
 
@@ -101,7 +101,7 @@
 
 https://secure1.securityspace.com/smysecure/catid.html?in=FEDORA-2009-0923
 
-Risk factor: Critical";
+Risk factor : High";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/fcore_2009_10165.nasl
===================================================================
--- trunk/openvas-plugins/scripts/fcore_2009_10165.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/fcore_2009_10165.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,8 +30,8 @@
  script_id(64999);
  script_cve_id("CVE-2009-2903", "CVE-2009-3290", "CVE-2009-2847", "CVE-2009-2692", "CVE-2009-2406", "CVE-2009-2407", "CVE-2009-1895", "CVE-2009-1897", "CVE-2009-0065", "CVE-2008-5079", "CVE-2009-3001", "CVE-2009-3002");
  script_version ("$");
- script_tag(name:"cvss_base", value:"10.0");
- script_tag(name:"risk_factor", value:"Critical");
+ script_tag(name:"cvss_base", value:"7.1");
+ script_tag(name:"risk_factor", value:"High");
  script_name("Fedora Core 10 FEDORA-2009-10165 (kernel)");
 
  desc = "The remote host is missing an update to kernel
@@ -94,7 +94,7 @@
 
 https://secure1.securityspace.com/smysecure/catid.html?in=FEDORA-2009-10165
 
-Risk factor: Critical";
+Risk factor : High";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/fcore_2009_10172.nasl
===================================================================
--- trunk/openvas-plugins/scripts/fcore_2009_10172.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/fcore_2009_10172.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,8 +30,8 @@
  script_id(65001);
  script_cve_id("CVE-2009-2813", "CVE-2009-2948", "CVE-2009-2906", "CVE-2009-0022", "CVE-2008-4314");
  script_version ("$");
- script_tag(name:"cvss_base", value:"8.5");
- script_tag(name:"risk_factor", value:"Critical");
+ script_tag(name:"cvss_base", value:"6.0");
+ script_tag(name:"risk_factor", value:"High");
  script_name("Fedora Core 10 FEDORA-2009-10172 (samba)");
 
  desc = "The remote host is missing an update to samba
@@ -65,7 +65,7 @@
 
 https://secure1.securityspace.com/smysecure/catid.html?in=FEDORA-2009-10172
 
-Risk factor: Critical";
+Risk factor : High";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/fcore_2009_10525.nasl
===================================================================
--- trunk/openvas-plugins/scripts/fcore_2009_10525.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/fcore_2009_10525.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,8 +30,8 @@
  script_id(66048);
  script_cve_id("CVE-2009-2908", "CVE-2009-2903", "CVE-2009-3290", "CVE-2009-2847", "CVE-2009-2692", "CVE-2009-2406", "CVE-2009-2407", "CVE-2009-1895", "CVE-2009-1897", "CVE-2009-0065", "CVE-2008-5079", "CVE-2009-2909", "CVE-2009-2910");
  script_version ("$Revision$");
- script_tag(name:"cvss_base", value:"10.0");
- script_tag(name:"risk_factor", value:"Critical");
+ script_tag(name:"cvss_base", value:"4.9");
+ script_tag(name:"risk_factor", value:"Medium");
  script_name("Fedora Core 10 FEDORA-2009-10525 (kernel)");
 
  desc = "The remote host is missing an update to kernel
@@ -61,7 +61,7 @@
 
 https://secure1.securityspace.com/smysecure/catid.html?in=FEDORA-2009-10525
 
-Risk factor: Critical";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/fcore_2009_10639.nasl
===================================================================
--- trunk/openvas-plugins/scripts/fcore_2009_10639.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/fcore_2009_10639.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,8 +30,8 @@
  script_id(66133);
  script_cve_id("CVE-2009-3612", "CVE-2009-2909", "CVE-2009-2908", "CVE-2009-2903", "CVE-2009-3290", "CVE-2009-2847", "CVE-2009-2910");
  script_version ("$Revision$");
- script_tag(name:"cvss_base", value:"7.2");
- script_tag(name:"risk_factor", value:"High");
+ script_tag(name:"cvss_base", value:"4.9");
+ script_tag(name:"risk_factor", value:"Medium");
  script_name("Fedora Core 11 FEDORA-2009-10639 (kernel)");
 
  desc = "The remote host is missing an update to kernel
@@ -70,7 +70,7 @@
 
 https://secure1.securityspace.com/smysecure/catid.html?in=FEDORA-2009-10639
 
-Risk factor : High";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/fcore_2009_10648.nasl
===================================================================
--- trunk/openvas-plugins/scripts/fcore_2009_10648.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/fcore_2009_10648.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,8 +30,8 @@
  script_id(66092);
  script_cve_id("CVE-2009-1188", "CVE-2009-3603", "CVE-2009-3604", "CVE-2009-3606", "CVE-2009-3608", "CVE-2009-3609", "CVE-2009-3605");
  script_version ("$Revision$");
- script_tag(name:"cvss_base", value:"9.3");
- script_tag(name:"risk_factor", value:"Critical");
+ script_tag(name:"cvss_base", value:"5.0");
+ script_tag(name:"risk_factor", value:"Medium");
  script_name("Fedora Core 11 FEDORA-2009-10648 (xpdf)");
 
  desc = "The remote host is missing an update to xpdf
@@ -76,7 +76,7 @@
 
 https://secure1.securityspace.com/smysecure/catid.html?in=FEDORA-2009-10648
 
-Risk factor: Critical";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/fcore_2009_10662.nasl
===================================================================
--- trunk/openvas-plugins/scripts/fcore_2009_10662.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/fcore_2009_10662.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,8 +30,8 @@
  script_id(66093);
  script_cve_id("CVE-2009-3615", "CVE-2009-2703", "CVE-2009-3083", "CVE-2009-3084", "CVE-2009-3085", "CVE-2009-2694");
  script_version ("$Revision$");
- script_tag(name:"cvss_base", value:"10.0");
- script_tag(name:"risk_factor", value:"Critical");
+ script_tag(name:"cvss_base", value:"5.0");
+ script_tag(name:"risk_factor", value:"Medium");
  script_name("Fedora Core 11 FEDORA-2009-10662 (pidgin)");
 
  desc = "The remote host is missing an update to pidgin
@@ -61,7 +61,7 @@
 
 https://secure1.securityspace.com/smysecure/catid.html?in=FEDORA-2009-10662
 
-Risk factor: Critical";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/fcore_2009_10694.nasl
===================================================================
--- trunk/openvas-plugins/scripts/fcore_2009_10694.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/fcore_2009_10694.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,8 +30,8 @@
  script_id(66094);
  script_cve_id("CVE-2009-1188", "CVE-2009-3603", "CVE-2009-3604", "CVE-2009-3606", "CVE-2009-3608", "CVE-2009-3609", "CVE-2009-3605", "CVE-2009-0799", "CVE-2009-0800", "CVE-2009-1179", "CVE-2009-1180", "CVE-2009-1181", "CVE-2009-1182", "CVE-2009-1183");
  script_version ("$Revision$");
- script_tag(name:"cvss_base", value:"9.3");
- script_tag(name:"risk_factor", value:"Critical");
+ script_tag(name:"cvss_base", value:"5.0");
+ script_tag(name:"risk_factor", value:"Medium");
  script_name("Fedora Core 10 FEDORA-2009-10694 (xpdf)");
 
  desc = "The remote host is missing an update to xpdf
@@ -71,7 +71,7 @@
 
 https://secure1.securityspace.com/smysecure/catid.html?in=FEDORA-2009-10694
 
-Risk factor: Critical";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/fcore_2009_10702.nasl
===================================================================
--- trunk/openvas-plugins/scripts/fcore_2009_10702.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/fcore_2009_10702.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,8 +30,8 @@
  script_id(66095);
  script_cve_id("CVE-2009-3615", "CVE-2009-2703", "CVE-2009-3083", "CVE-2009-3084", "CVE-2009-3085", "CVE-2009-2694");
  script_version ("$Revision$");
- script_tag(name:"cvss_base", value:"10.0");
- script_tag(name:"risk_factor", value:"Critical");
+ script_tag(name:"cvss_base", value:"5.0");
+ script_tag(name:"risk_factor", value:"Medium");
  script_name("Fedora Core 10 FEDORA-2009-10702 (pidgin)");
 
  desc = "The remote host is missing an update to pidgin
@@ -61,7 +61,7 @@
 
 https://secure1.securityspace.com/smysecure/catid.html?in=FEDORA-2009-10702
 
-Risk factor: Critical";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/fcore_2009_10737.nasl
===================================================================
--- trunk/openvas-plugins/scripts/fcore_2009_10737.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/fcore_2009_10737.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,7 +30,7 @@
  script_id(66129);
  script_cve_id("CVE-2008-3520", "CVE-2008-3522");
  script_version ("$Revision$");
- script_tag(name:"cvss_base", value:"10.0");
+ script_tag(name:"cvss_base", value:"9.3");
  script_tag(name:"risk_factor", value:"Critical");
  script_name("Fedora Core 10 FEDORA-2009-10737 (jasper)");
 
@@ -60,7 +60,7 @@
 
 https://secure1.securityspace.com/smysecure/catid.html?in=FEDORA-2009-10737
 
-Risk factor: Critical";
+Risk factor : Critical";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/fcore_2009_10761.nasl
===================================================================
--- trunk/openvas-plugins/scripts/fcore_2009_10761.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/fcore_2009_10761.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,7 +30,7 @@
  script_id(66132);
  script_cve_id("CVE-2008-3520", "CVE-2008-3522");
  script_version ("$Revision$");
- script_tag(name:"cvss_base", value:"10.0");
+ script_tag(name:"cvss_base", value:"9.3");
  script_tag(name:"risk_factor", value:"Critical");
  script_name("Fedora Core 11 FEDORA-2009-10761 (jasper)");
 
@@ -60,7 +60,7 @@
 
 https://secure1.securityspace.com/smysecure/catid.html?in=FEDORA-2009-10761
 
-Risk factor: Critical";
+Risk factor : Critical";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/fcore_2009_10891.nasl
===================================================================
--- trunk/openvas-plugins/scripts/fcore_2009_10891.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/fcore_2009_10891.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,8 +30,8 @@
  script_id(66426);
  script_cve_id("CVE-2009-2820", "CVE-2009-3553", "CVE-2009-0163", "CVE-2009-0164");
  script_version ("$Revision$");
- script_tag(name:"cvss_base", value:"6.8");
- script_tag(name:"risk_factor", value:"High");
+ script_tag(name:"cvss_base", value:"4.3");
+ script_tag(name:"risk_factor", value:"Medium");
  script_name("Fedora Core 11 FEDORA-2009-10891 (cups)");
 
  desc = "The remote host is missing an update to cups
@@ -82,7 +82,7 @@
 
 https://secure1.securityspace.com/smysecure/catid.html?in=FEDORA-2009-10891
 
-Risk factor : High";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/fcore_2009_11032.nasl
===================================================================
--- trunk/openvas-plugins/scripts/fcore_2009_11032.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/fcore_2009_11032.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,7 +30,7 @@
  script_id(66200);
  script_cve_id("CVE-2009-3547", "CVE-2009-3638", "CVE-2009-3624", "CVE-2009-3621", "CVE-2009-3620", "CVE-2009-3612", "CVE-2009-2909", "CVE-2009-2908", "CVE-2009-2903", "CVE-2009-3290", "CVE-2009-2847");
  script_version ("$Revision$");
- script_tag(name:"cvss_base", value:"7.2");
+ script_tag(name:"cvss_base", value:"6.9");
  script_tag(name:"risk_factor", value:"High");
  script_name("Fedora Core 11 FEDORA-2009-11032 (kernel)");
 

Modified: trunk/openvas-plugins/scripts/fcore_2009_11038.nasl
===================================================================
--- trunk/openvas-plugins/scripts/fcore_2009_11038.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/fcore_2009_11038.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,8 +30,8 @@
  script_id(66202);
  script_cve_id("CVE-2009-3547", "CVE-2009-3638", "CVE-2009-3621", "CVE-2009-3620", "CVE-2009-3612", "CVE-2009-2908", "CVE-2009-2903", "CVE-2009-3290", "CVE-2009-2847", "CVE-2009-2692", "CVE-2009-2406", "CVE-2009-2407", "CVE-2009-1895", "CVE-2009-1897", "CVE-2009-0065", "CVE-2008-5079");
  script_version ("$Revision$");
- script_tag(name:"cvss_base", value:"10.0");
- script_tag(name:"risk_factor", value:"Critical");
+ script_tag(name:"cvss_base", value:"6.9");
+ script_tag(name:"risk_factor", value:"High");
  script_name("Fedora Core 10 FEDORA-2009-11038 (kernel)");
 
  desc = "The remote host is missing an update to kernel
@@ -62,7 +62,7 @@
 
 https://secure1.securityspace.com/smysecure/catid.html?in=FEDORA-2009-11038
 
-Risk factor: Critical";
+Risk factor : High";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/fcore_2009_11062.nasl
===================================================================
--- trunk/openvas-plugins/scripts/fcore_2009_11062.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/fcore_2009_11062.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,8 +30,8 @@
  script_id(66435);
  script_cve_id("CVE-2009-2820", "CVE-2008-5183", "CVE-2008-5286", "CVE-2008-1722");
  script_version ("$Revision$");
- script_tag(name:"cvss_base", value:"7.5");
- script_tag(name:"risk_factor", value:"High");
+ script_tag(name:"cvss_base", value:"4.3");
+ script_tag(name:"risk_factor", value:"Medium");
  script_name("Fedora Core 10 FEDORA-2009-11062 (cups)");
 
  desc = "The remote host is missing an update to cups
@@ -67,7 +67,7 @@
 
 https://secure1.securityspace.com/smysecure/catid.html?in=FEDORA-2009-11062
 
-Risk factor : High";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/fcore_2009_11314.nasl
===================================================================
--- trunk/openvas-plugins/scripts/fcore_2009_11314.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/fcore_2009_11314.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,7 +30,7 @@
  script_id(66430);
  script_cve_id("CVE-2009-2820", "CVE-2009-3553");
  script_version ("$Revision$");
- script_tag(name:"cvss_base", value:"5.0");
+ script_tag(name:"cvss_base", value:"4.3");
  script_tag(name:"risk_factor", value:"Medium");
  script_name("Fedora Core 12 FEDORA-2009-11314 (cups)");
 
@@ -82,7 +82,7 @@
 
 https://secure1.securityspace.com/smysecure/catid.html?in=FEDORA-2009-11314
 
-Risk factor: Medium";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/fcore_2009_11486.nasl
===================================================================
--- trunk/openvas-plugins/scripts/fcore_2009_11486.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/fcore_2009_11486.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,8 +30,8 @@
  script_id(66262);
  script_cve_id("CVE-2009-2409", "CVE-2009-3873", "CVE-2009-3875", "CVE-2009-3876", "CVE-2009-3877", "CVE-2009-3869", "CVE-2009-3871", "CVE-2009-3874", "CVE-2009-3728", "CVE-2009-3881", "CVE-2009-3882", "CVE-2009-3883", "CVE-2009-3880", "CVE-2009-3879", "CVE-2009-3884");
  script_version ("$Revision$");
- script_tag(name:"cvss_base", value:"9.3");
- script_tag(name:"risk_factor", value:"Critical");
+ script_tag(name:"cvss_base", value:"5.1");
+ script_tag(name:"risk_factor", value:"High");
  script_name("Fedora Core 11 FEDORA-2009-11486 (java-1.6.0-openjdk)");
 
  desc = "The remote host is missing an update to java-1.6.0-openjdk
@@ -51,7 +51,7 @@
 
 https://secure1.securityspace.com/smysecure/catid.html?in=FEDORA-2009-11486
 
-Risk factor: Critical";
+Risk factor : High";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/fcore_2009_11487.nasl
===================================================================
--- trunk/openvas-plugins/scripts/fcore_2009_11487.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/fcore_2009_11487.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,7 +30,7 @@
  script_id(66263);
  script_cve_id("CVE-2009-3384", "CVE-2009-2816");
  script_version ("$Revision$");
- script_tag(name:"cvss_base", value:"10.0");
+ script_tag(name:"cvss_base", value:"9.3");
  script_tag(name:"risk_factor", value:"Critical");
  script_name("Fedora Core 12 FEDORA-2009-11487 (qt)");
 
@@ -68,7 +68,7 @@
 
 https://secure1.securityspace.com/smysecure/catid.html?in=FEDORA-2009-11487
 
-Risk factor: Critical";
+Risk factor : Critical";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/fcore_2009_11488.nasl
===================================================================
--- trunk/openvas-plugins/scripts/fcore_2009_11488.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/fcore_2009_11488.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,7 +30,7 @@
  script_id(66264);
  script_cve_id("CVE-2009-3384", "CVE-2009-2816", "CVE-2009-2700", "CVE-2009-1725");
  script_version ("$Revision$");
- script_tag(name:"cvss_base", value:"10.0");
+ script_tag(name:"cvss_base", value:"9.3");
  script_tag(name:"risk_factor", value:"Critical");
  script_name("Fedora Core 10 FEDORA-2009-11488 (qt)");
 
@@ -67,7 +67,7 @@
 
 https://secure1.securityspace.com/smysecure/catid.html?in=FEDORA-2009-11488
 
-Risk factor: Critical";
+Risk factor : Critical";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/fcore_2009_11489.nasl
===================================================================
--- trunk/openvas-plugins/scripts/fcore_2009_11489.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/fcore_2009_11489.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,8 +30,8 @@
  script_id(66265);
  script_cve_id("CVE-2009-2409", "CVE-2009-3873", "CVE-2009-3875", "CVE-2009-3876", "CVE-2009-3877", "CVE-2009-3869", "CVE-2009-3871", "CVE-2009-3874", "CVE-2009-3728", "CVE-2009-3881", "CVE-2009-3882", "CVE-2009-3883", "CVE-2009-3880", "CVE-2009-3879", "CVE-2009-3884");
  script_version ("$Revision$");
- script_tag(name:"cvss_base", value:"9.3");
- script_tag(name:"risk_factor", value:"Critical");
+ script_tag(name:"cvss_base", value:"5.1");
+ script_tag(name:"risk_factor", value:"High");
  script_name("Fedora Core 12 FEDORA-2009-11489 (java-1.6.0-openjdk)");
 
  desc = "The remote host is missing an update to java-1.6.0-openjdk
@@ -49,7 +49,7 @@
 
 https://secure1.securityspace.com/smysecure/catid.html?in=FEDORA-2009-11489
 
-Risk factor: Critical";
+Risk factor : High";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/fcore_2009_11490.nasl
===================================================================
--- trunk/openvas-plugins/scripts/fcore_2009_11490.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/fcore_2009_11490.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,8 +30,8 @@
  script_id(66266);
  script_cve_id("CVE-2009-2409", "CVE-2009-3873", "CVE-2009-3875", "CVE-2009-3876", "CVE-2009-3877", "CVE-2009-3869", "CVE-2009-3871", "CVE-2009-3874", "CVE-2009-3728", "CVE-2009-3881", "CVE-2009-3882", "CVE-2009-3883", "CVE-2009-3880", "CVE-2009-3879", "CVE-2009-3884");
  script_version ("$Revision$");
- script_tag(name:"cvss_base", value:"9.3");
- script_tag(name:"risk_factor", value:"Critical");
+ script_tag(name:"cvss_base", value:"5.1");
+ script_tag(name:"risk_factor", value:"High");
  script_name("Fedora Core 10 FEDORA-2009-11490 (java-1.6.0-openjdk)");
 
  desc = "The remote host is missing an update to java-1.6.0-openjdk
@@ -49,7 +49,7 @@
 
 https://secure1.securityspace.com/smysecure/catid.html?in=FEDORA-2009-11490
 
-Risk factor: Critical";
+Risk factor : High";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/fcore_2009_11491.nasl
===================================================================
--- trunk/openvas-plugins/scripts/fcore_2009_11491.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/fcore_2009_11491.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,7 +30,7 @@
  script_id(66267);
  script_cve_id("CVE-2009-3384", "CVE-2009-2816", "CVE-2009-2700", "CVE-2009-1725");
  script_version ("$Revision$");
- script_tag(name:"cvss_base", value:"10.0");
+ script_tag(name:"cvss_base", value:"9.3");
  script_tag(name:"risk_factor", value:"Critical");
  script_name("Fedora Core 11 FEDORA-2009-11491 (qt)");
 
@@ -67,7 +67,7 @@
 
 https://secure1.securityspace.com/smysecure/catid.html?in=FEDORA-2009-11491
 
-Risk factor: Critical";
+Risk factor : Critical";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/fcore_2009_12017.nasl
===================================================================
--- trunk/openvas-plugins/scripts/fcore_2009_12017.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/fcore_2009_12017.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,8 +30,8 @@
  script_id(66441);
  script_cve_id("CVE-2009-3546");
  script_version ("$Revision$");
- script_tag(name:"cvss_base", value:"7.5");
- script_tag(name:"risk_factor", value:"High");
+ script_tag(name:"cvss_base", value:"9.3");
+ script_tag(name:"risk_factor", value:"Critical");
  script_name("Fedora Core 12 FEDORA-2009-12017 (maniadrive)");
 
  desc = "The remote host is missing an update to maniadrive
@@ -55,7 +55,7 @@
 
 https://secure1.securityspace.com/smysecure/catid.html?in=FEDORA-2009-12017
 
-Risk factor : High";
+Risk factor : Critical";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/fcore_2009_12180.nasl
===================================================================
--- trunk/openvas-plugins/scripts/fcore_2009_12180.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/fcore_2009_12180.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,8 +30,8 @@
  script_id(66508);
  script_cve_id("CVE-2009-4019", "CVE-2009-2446");
  script_version ("$Revision$");
- script_tag(name:"cvss_base", value:"8.5");
- script_tag(name:"risk_factor", value:"Critical");
+ script_tag(name:"cvss_base", value:"4.0");
+ script_tag(name:"risk_factor", value:"Medium");
  script_name("Fedora Core 10 FEDORA-2009-12180 (mysql)");
 
  desc = "The remote host is missing an update to mysql
@@ -66,7 +66,7 @@
 
 https://secure1.securityspace.com/smysecure/catid.html?in=FEDORA-2009-12180
 
-Risk factor: Critical";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/fcore_2009_12218.nasl
===================================================================
--- trunk/openvas-plugins/scripts/fcore_2009_12218.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/fcore_2009_12218.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,7 +30,7 @@
  script_id(66327);
  script_cve_id("CVE-2009-4022", "CVE-2009-0696");
  script_version ("$Revision$");
- script_tag(name:"cvss_base", value:"4.3");
+ script_tag(name:"cvss_base", value:"2.6");
  script_tag(name:"risk_factor", value:"Medium");
  script_name("Fedora Core 11 FEDORA-2009-12218 (bind)");
 
@@ -62,7 +62,7 @@
 
 https://secure1.securityspace.com/smysecure/catid.html?in=FEDORA-2009-12218
 
-Risk factor: Medium";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/fcore_2009_12229.nasl
===================================================================
--- trunk/openvas-plugins/scripts/fcore_2009_12229.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/fcore_2009_12229.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,7 +30,7 @@
  script_id(66563);
  script_cve_id("CVE-2009-3555");
  script_version ("$Revision$");
- script_tag(name:"cvss_base", value:"6.4");
+ script_tag(name:"cvss_base", value:"5.8");
  script_tag(name:"risk_factor", value:"High");
  script_name("Fedora Core 12 FEDORA-2009-12229 (tomcat-native)");
 

Modified: trunk/openvas-plugins/scripts/fcore_2009_12233.nasl
===================================================================
--- trunk/openvas-plugins/scripts/fcore_2009_12233.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/fcore_2009_12233.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,7 +30,7 @@
  script_id(66328);
  script_cve_id("CVE-2009-4022");
  script_version ("$Revision$");
- script_tag(name:"cvss_base", value:"4.0");
+ script_tag(name:"cvss_base", value:"2.6");
  script_tag(name:"risk_factor", value:"Medium");
  script_name("Fedora Core 12 FEDORA-2009-12233 (bind)");
 
@@ -64,7 +64,7 @@
 
 https://secure1.securityspace.com/smysecure/catid.html?in=FEDORA-2009-12233
 
-Risk factor: Medium";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/fcore_2009_12305.nasl
===================================================================
--- trunk/openvas-plugins/scripts/fcore_2009_12305.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/fcore_2009_12305.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,7 +30,7 @@
  script_id(66562);
  script_cve_id("CVE-2009-3555");
  script_version ("$Revision$");
- script_tag(name:"cvss_base", value:"6.4");
+ script_tag(name:"cvss_base", value:"5.8");
  script_tag(name:"risk_factor", value:"High");
  script_name("Fedora Core 11 FEDORA-2009-12305 (tomcat-native)");
 

Modified: trunk/openvas-plugins/scripts/fcore_2009_12461.nasl
===================================================================
--- trunk/openvas-plugins/scripts/fcore_2009_12461.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/fcore_2009_12461.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,8 +30,8 @@
  script_id(66505);
  script_cve_id("CVE-2009-4055", "CVE-2008-7220", "CVE-2009-0041");
  script_version ("$Revision$");
- script_tag(name:"cvss_base", value:"7.5");
- script_tag(name:"risk_factor", value:"High");
+ script_tag(name:"cvss_base", value:"5.0");
+ script_tag(name:"risk_factor", value:"Medium");
  script_name("Fedora Core 10 FEDORA-2009-12461 (asterisk)");
 
  desc = "The remote host is missing an update to asterisk
@@ -59,7 +59,7 @@
 
 https://secure1.securityspace.com/smysecure/catid.html?in=FEDORA-2009-12461
 
-Risk factor : High";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/fcore_2009_12506.nasl
===================================================================
--- trunk/openvas-plugins/scripts/fcore_2009_12506.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/fcore_2009_12506.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,8 +30,8 @@
  script_id(66574);
  script_cve_id("CVE-2009-4055", "CVE-2008-7220");
  script_version ("$Revision$");
- script_tag(name:"cvss_base", value:"7.5");
- script_tag(name:"risk_factor", value:"High");
+ script_tag(name:"cvss_base", value:"5.0");
+ script_tag(name:"risk_factor", value:"Medium");
  script_name("Fedora Core 11 FEDORA-2009-12506 (asterisk)");
 
  desc = "The remote host is missing an update to asterisk
@@ -56,7 +56,7 @@
 
 https://secure1.securityspace.com/smysecure/catid.html?in=FEDORA-2009-12506
 
-Risk factor : High";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/fcore_2009_12604.nasl
===================================================================
--- trunk/openvas-plugins/scripts/fcore_2009_12604.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/fcore_2009_12604.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,7 +30,7 @@
  script_id(66498);
  script_cve_id("CVE-2009-3555", "CVE-2009-3094", "CVE-2009-3095");
  script_version ("$Revision$");
- script_tag(name:"cvss_base", value:"7.5");
+ script_tag(name:"cvss_base", value:"5.8");
  script_tag(name:"risk_factor", value:"High");
  script_name("Fedora Core 10 FEDORA-2009-12604 (httpd)");
 

Modified: trunk/openvas-plugins/scripts/fcore_2009_12606.nasl
===================================================================
--- trunk/openvas-plugins/scripts/fcore_2009_12606.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/fcore_2009_12606.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,7 +30,7 @@
  script_id(66557);
  script_cve_id("CVE-2009-3555", "CVE-2009-3094", "CVE-2009-3095");
  script_version ("$Revision$");
- script_tag(name:"cvss_base", value:"7.5");
+ script_tag(name:"cvss_base", value:"5.8");
  script_tag(name:"risk_factor", value:"High");
  script_name("Fedora Core 12 FEDORA-2009-12606 (httpd)");
 

Modified: trunk/openvas-plugins/scripts/fcore_2009_12652.nasl
===================================================================
--- trunk/openvas-plugins/scripts/fcore_2009_12652.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/fcore_2009_12652.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,8 +30,8 @@
  script_id(66443);
  script_cve_id("CVE-2009-3553", "CVE-2009-2820", "CVE-2008-5183", "CVE-2008-5286", "CVE-2008-1722");
  script_version ("$Revision$");
- script_tag(name:"cvss_base", value:"7.5");
- script_tag(name:"risk_factor", value:"High");
+ script_tag(name:"cvss_base", value:"5.0");
+ script_tag(name:"risk_factor", value:"Medium");
  script_name("Fedora Core 10 FEDORA-2009-12652 (cups)");
 
  desc = "The remote host is missing an update to cups
@@ -73,7 +73,7 @@
 
 https://secure1.securityspace.com/smysecure/catid.html?in=FEDORA-2009-12652
 
-Risk factor : High";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/fcore_2009_12750.nasl
===================================================================
--- trunk/openvas-plugins/scripts/fcore_2009_12750.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/fcore_2009_12750.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,7 +30,7 @@
  script_id(66449);
  script_cve_id("CVE-2009-3555", "CVE-2009-3896", "CVE-2009-2629");
  script_version ("$Revision$");
- script_tag(name:"cvss_base", value:"7.5");
+ script_tag(name:"cvss_base", value:"5.8");
  script_tag(name:"risk_factor", value:"High");
  script_name("Fedora Core 12 FEDORA-2009-12750 (nginx)");
 

Modified: trunk/openvas-plugins/scripts/fcore_2009_12783.nasl
===================================================================
--- trunk/openvas-plugins/scripts/fcore_2009_12783.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/fcore_2009_12783.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,7 +30,7 @@
  script_id(66506);
  script_cve_id("CVE-2009-3585", "CVE-2009-4151");
  script_version ("$Revision$");
- script_tag(name:"cvss_base", value:"7.5");
+ script_tag(name:"cvss_base", value:"5.8");
  script_tag(name:"risk_factor", value:"High");
  script_name("Fedora Core 12 FEDORA-2009-12783 (rt3)");
 

Modified: trunk/openvas-plugins/scripts/fcore_2009_12817.nasl
===================================================================
--- trunk/openvas-plugins/scripts/fcore_2009_12817.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/fcore_2009_12817.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,7 +30,7 @@
  script_id(66510);
  script_cve_id("CVE-2009-3585", "CVE-2009-4151");
  script_version ("$Revision$");
- script_tag(name:"cvss_base", value:"7.5");
+ script_tag(name:"cvss_base", value:"5.8");
  script_tag(name:"risk_factor", value:"High");
  script_name("Fedora Core 10 FEDORA-2009-12817 (rt3)");
 

Modified: trunk/openvas-plugins/scripts/fcore_2009_12827.nasl
===================================================================
--- trunk/openvas-plugins/scripts/fcore_2009_12827.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/fcore_2009_12827.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,7 +30,7 @@
  script_id(66512);
  script_cve_id("CVE-2009-3585", "CVE-2009-4151");
  script_version ("$Revision$");
- script_tag(name:"cvss_base", value:"7.5");
+ script_tag(name:"cvss_base", value:"5.8");
  script_tag(name:"risk_factor", value:"High");
  script_name("Fedora Core 11 FEDORA-2009-12827 (rt3)");
 

Modified: trunk/openvas-plugins/scripts/fcore_2009_12966.nasl
===================================================================
--- trunk/openvas-plugins/scripts/fcore_2009_12966.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/fcore_2009_12966.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,7 +30,7 @@
  script_id(66496);
  script_cve_id("CVE-2009-4214", "CVE-2009-3009", "CVE-2008-5189");
  script_version ("$Revision$");
- script_tag(name:"cvss_base", value:"5.0");
+ script_tag(name:"cvss_base", value:"4.3");
  script_tag(name:"risk_factor", value:"Medium");
  script_name("Fedora Core 10 FEDORA-2009-12966 (rubygem-actionpack)");
 
@@ -66,7 +66,7 @@
 
 https://secure1.securityspace.com/smysecure/catid.html?in=FEDORA-2009-12966
 
-Risk factor: Medium";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/fcore_2009_12968.nasl
===================================================================
--- trunk/openvas-plugins/scripts/fcore_2009_12968.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/fcore_2009_12968.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,7 +30,7 @@
  script_id(66497);
  script_cve_id("CVE-2009-3555");
  script_version ("$Revision$");
- script_tag(name:"cvss_base", value:"6.4");
+ script_tag(name:"cvss_base", value:"5.8");
  script_tag(name:"risk_factor", value:"High");
  script_name("Fedora Core 12 FEDORA-2009-12968 (nss-util)");
 

Modified: trunk/openvas-plugins/scripts/fcore_2009_13040.nasl
===================================================================
--- trunk/openvas-plugins/scripts/fcore_2009_13040.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/fcore_2009_13040.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,8 +30,8 @@
  script_id(66500);
  script_cve_id("CVE-2009-1171", "CVE-2009-0499", "CVE-2008-5153", "CVE-2008-4796");
  script_version ("$Revision$");
- script_tag(name:"cvss_base", value:"10.0");
- script_tag(name:"risk_factor", value:"Critical");
+ script_tag(name:"cvss_base", value:"4.3");
+ script_tag(name:"risk_factor", value:"Medium");
  script_name("Fedora Core 10 FEDORA-2009-13040 (moodle)");
 
  desc = "The remote host is missing an update to moodle
@@ -62,7 +62,7 @@
 
 https://secure1.securityspace.com/smysecure/catid.html?in=FEDORA-2009-13040
 
-Risk factor: Critical";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/fcore_2009_13090.nasl
===================================================================
--- trunk/openvas-plugins/scripts/fcore_2009_13090.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/fcore_2009_13090.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,7 +30,7 @@
  script_id(66507);
  script_cve_id("CVE-2009-3563", "CVE-2009-1252");
  script_version ("$Revision$");
- script_tag(name:"cvss_base", value:"6.8");
+ script_tag(name:"cvss_base", value:"6.4");
  script_tag(name:"risk_factor", value:"High");
  script_name("Fedora Core 11 FEDORA-2009-13090 (ntp)");
 

Modified: trunk/openvas-plugins/scripts/fcore_2009_13098.nasl
===================================================================
--- trunk/openvas-plugins/scripts/fcore_2009_13098.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/fcore_2009_13098.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,8 +30,8 @@
  script_id(66509);
  script_cve_id("CVE-2009-4031", "CVE-2009-3547", "CVE-2009-3638", "CVE-2009-3621", "CVE-2009-3620", "CVE-2009-3612", "CVE-2009-2908", "CVE-2009-2903", "CVE-2009-3290", "CVE-2009-2847", "CVE-2009-2692", "CVE-2009-2406", "CVE-2009-2407", "CVE-2009-1895", "CVE-2009-1897", "CVE-2009-0065", "CVE-2008-5079", "CVE-2009-3080", "CVE-2009-4005");
  script_version ("$Revision$");
- script_tag(name:"cvss_base", value:"10.0");
- script_tag(name:"risk_factor", value:"Critical");
+ script_tag(name:"cvss_base", value:"7.8");
+ script_tag(name:"risk_factor", value:"High");
  script_name("Fedora Core 10 FEDORA-2009-13098 (kernel)");
 
  desc = "The remote host is missing an update to the kernel
@@ -62,7 +62,7 @@
 
 https://secure1.securityspace.com/smysecure/catid.html?in=FEDORA-2009-13098
 
-Risk factor: Critical";
+Risk factor : High";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/fcore_2009_13121.nasl
===================================================================
--- trunk/openvas-plugins/scripts/fcore_2009_13121.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/fcore_2009_13121.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,7 +30,7 @@
  script_id(66511);
  script_cve_id("CVE-2009-3563", "CVE-2009-1252", "CVE-2009-0159", "CVE-2009-0021");
  script_version ("$Revision$");
- script_tag(name:"cvss_base", value:"6.8");
+ script_tag(name:"cvss_base", value:"6.4");
  script_tag(name:"risk_factor", value:"High");
  script_name("Fedora Core 10 FEDORA-2009-13121 (ntp)");
 

Modified: trunk/openvas-plugins/scripts/fcore_2009_13236.nasl
===================================================================
--- trunk/openvas-plugins/scripts/fcore_2009_13236.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/fcore_2009_13236.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,7 +30,7 @@
  script_id(66585);
  script_cve_id("CVE-2009-3555", "CVE-2009-3639");
  script_version ("$Revision$");
- script_tag(name:"cvss_base", value:"6.4");
+ script_tag(name:"cvss_base", value:"5.8");
  script_tag(name:"risk_factor", value:"High");
  script_name("Fedora Core 11 FEDORA-2009-13236 (proftpd)");
 

Modified: trunk/openvas-plugins/scripts/fcore_2009_13250.nasl
===================================================================
--- trunk/openvas-plugins/scripts/fcore_2009_13250.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/fcore_2009_13250.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,7 +30,7 @@
  script_id(66583);
  script_cve_id("CVE-2009-3555");
  script_version ("$Revision$");
- script_tag(name:"cvss_base", value:"6.4");
+ script_tag(name:"cvss_base", value:"5.8");
  script_tag(name:"risk_factor", value:"High");
  script_name("Fedora Core 12 FEDORA-2009-13250 (proftpd)");
 

Modified: trunk/openvas-plugins/scripts/fcore_2009_13466.nasl
===================================================================
--- trunk/openvas-plugins/scripts/fcore_2009_13466.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/fcore_2009_13466.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,8 +30,8 @@
  script_id(66573);
  script_cve_id("CVE-2009-4019", "CVE-2009-4028");
  script_version ("$Revision$");
- script_tag(name:"cvss_base", value:"6.4");
- script_tag(name:"risk_factor", value:"High");
+ script_tag(name:"cvss_base", value:"4.0");
+ script_tag(name:"risk_factor", value:"Medium");
  script_name("Fedora Core 12 FEDORA-2009-13466 (mysql)");
 
  desc = "The remote host is missing an update to mysql
@@ -80,7 +80,7 @@
 
 https://secure1.securityspace.com/smysecure/catid.html?in=FEDORA-2009-13466
 
-Risk factor : High";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/fcore_2009_13504.nasl
===================================================================
--- trunk/openvas-plugins/scripts/fcore_2009_13504.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/fcore_2009_13504.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,8 +30,8 @@
  script_id(66577);
  script_cve_id("CVE-2009-4019", "CVE-2009-4028");
  script_version ("$Revision$");
- script_tag(name:"cvss_base", value:"6.4");
- script_tag(name:"risk_factor", value:"High");
+ script_tag(name:"cvss_base", value:"4.0");
+ script_tag(name:"risk_factor", value:"Medium");
  script_name("Fedora Core 11 FEDORA-2009-13504 (mysql)");
 
  desc = "The remote host is missing an update to mysql
@@ -70,7 +70,7 @@
 
 https://secure1.securityspace.com/smysecure/catid.html?in=FEDORA-2009-13504
 
-Risk factor : High";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/fcore_2009_13694.nasl
===================================================================
--- trunk/openvas-plugins/scripts/fcore_2009_13694.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/fcore_2009_13694.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,7 +30,7 @@
  script_id(66581);
  script_cve_id("CVE-2009-3547", "CVE-2009-3638", "CVE-2009-3624", "CVE-2009-3621", "CVE-2009-3620", "CVE-2009-3612", "CVE-2009-2909", "CVE-2009-2908", "CVE-2009-2903", "CVE-2009-3290", "CVE-2009-2847", "CVE-2009-4410");
  script_version ("$Revision$");
- script_tag(name:"cvss_base", value:"7.2");
+ script_tag(name:"cvss_base", value:"6.9");
  script_tag(name:"risk_factor", value:"High");
  script_name("Fedora Core 11 FEDORA-2009-13694 (kernel)");
 

Modified: trunk/openvas-plugins/scripts/fcore_2009_1641.nasl
===================================================================
--- trunk/openvas-plugins/scripts/fcore_2009_1641.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/fcore_2009_1641.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,8 +30,8 @@
  script_id(63390);
  script_cve_id("CVE-2009-0499", "CVE-2008-5153", "CVE-2008-4796", "CVE-2009-0500", "CVE-2009-0502", "CVE-2009-0501");
  script_version ("$");
- script_tag(name:"cvss_base", value:"10.0");
- script_tag(name:"risk_factor", value:"Critical");
+ script_tag(name:"cvss_base", value:"6.4");
+ script_tag(name:"risk_factor", value:"High");
  name = "Fedora Core 9 FEDORA-2009-1641 (moodle)";
  script_name(name);
 
@@ -77,7 +77,7 @@
 
 https://secure1.securityspace.com/smysecure/catid.html?in=FEDORA-2009-1641
 
-Risk factor: Critical";
+Risk factor : High";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/fcore_2009_1699.nasl
===================================================================
--- trunk/openvas-plugins/scripts/fcore_2009_1699.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/fcore_2009_1699.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,8 +30,8 @@
  script_id(63405);
  script_cve_id("CVE-2009-0499", "CVE-2008-5153", "CVE-2008-4796", "CVE-2009-0502", "CVE-2009-0500", "CVE-2009-0501");
  script_version ("$");
- script_tag(name:"cvss_base", value:"10.0");
- script_tag(name:"risk_factor", value:"Critical");
+ script_tag(name:"cvss_base", value:"6.4");
+ script_tag(name:"risk_factor", value:"High");
  name = "Fedora Core 10 FEDORA-2009-1699 (moodle)";
  script_name(name);
 
@@ -73,7 +73,7 @@
 
 https://secure1.securityspace.com/smysecure/catid.html?in=FEDORA-2009-1699
 
-Risk factor: Critical";
+Risk factor : High";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/fcore_2009_1776.nasl
===================================================================
--- trunk/openvas-plugins/scripts/fcore_2009_1776.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/fcore_2009_1776.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,8 +30,8 @@
  script_id(63492);
  script_cve_id("CVE-2008-4640", "CVE-2008-4641", "CVE-2008-4575");
  script_version ("$");
- script_tag(name:"cvss_base", value:"10.0");
- script_tag(name:"risk_factor", value:"Critical");
+ script_tag(name:"cvss_base", value:"3.6");
+ script_tag(name:"risk_factor", value:"Medium");
  name = "Fedora Core 9 FEDORA-2009-1776 (jhead)";
  script_name(name);
 
@@ -67,7 +67,7 @@
 
 https://secure1.securityspace.com/smysecure/catid.html?in=FEDORA-2009-1776
 
-Risk factor: Critical";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/fcore_2009_1824.nasl
===================================================================
--- trunk/openvas-plugins/scripts/fcore_2009_1824.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/fcore_2009_1824.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,8 +30,8 @@
  script_id(63491);
  script_cve_id("CVE-2008-4640", "CVE-2008-4641");
  script_version ("$");
- script_tag(name:"cvss_base", value:"10.0");
- script_tag(name:"risk_factor", value:"Critical");
+ script_tag(name:"cvss_base", value:"3.6");
+ script_tag(name:"risk_factor", value:"Medium");
  name = "Fedora Core 10 FEDORA-2009-1824 (jhead)";
  script_name(name);
 
@@ -69,7 +69,7 @@
 
 https://secure1.securityspace.com/smysecure/catid.html?in=FEDORA-2009-1824
 
-Risk factor: Critical";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/fcore_2009_2045.nasl
===================================================================
--- trunk/openvas-plugins/scripts/fcore_2009_2045.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/fcore_2009_2045.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,7 +30,7 @@
  script_id(63530);
  script_cve_id("CVE-2009-0040", "CVE-2008-1382");
  script_version ("$");
- script_tag(name:"cvss_base", value:"7.5");
+ script_tag(name:"cvss_base", value:"6.8");
  script_tag(name:"risk_factor", value:"High");
  name = "Fedora Core 9 FEDORA-2009-2045 (libpng10)";
  script_name(name);

Modified: trunk/openvas-plugins/scripts/fcore_2009_2128.nasl
===================================================================
--- trunk/openvas-plugins/scripts/fcore_2009_2128.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/fcore_2009_2128.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,7 +30,7 @@
  script_id(63463);
  script_cve_id("CVE-2009-0040", "CVE-2008-1382");
  script_version ("$");
- script_tag(name:"cvss_base", value:"7.5");
+ script_tag(name:"cvss_base", value:"6.8");
  script_tag(name:"risk_factor", value:"High");
  name = "Fedora Core 9 FEDORA-2009-2128 (libpng)";
  script_name(name);

Modified: trunk/openvas-plugins/scripts/fcore_2009_2179.nasl
===================================================================
--- trunk/openvas-plugins/scripts/fcore_2009_2179.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/fcore_2009_2179.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,8 +30,8 @@
  script_id(63465);
  script_cve_id("CVE-2008-5189", "CVE-2008-4094");
  script_version ("$");
- script_tag(name:"cvss_base", value:"7.5");
- script_tag(name:"risk_factor", value:"High");
+ script_tag(name:"cvss_base", value:"5.0");
+ script_tag(name:"risk_factor", value:"Medium");
  name = "Fedora Core 9 FEDORA-2009-2179 (rubygem-actionpack)";
  script_name(name);
 
@@ -65,7 +65,7 @@
 
 https://secure1.securityspace.com/smysecure/catid.html?in=FEDORA-2009-2179
 
-Risk factor : High";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/fcore_2009_2231.nasl
===================================================================
--- trunk/openvas-plugins/scripts/fcore_2009_2231.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/fcore_2009_2231.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,8 +30,8 @@
  script_id(63486);
  script_cve_id("CVE-2008-5249", "CVE-2008-5250", "CVE-2008-5252", "CVE-2008-5687", "CVE-2008-5688", "CVE-2009-0737");
  script_version ("$");
- script_tag(name:"cvss_base", value:"5.8");
- script_tag(name:"risk_factor", value:"High");
+ script_tag(name:"cvss_base", value:"4.3");
+ script_tag(name:"risk_factor", value:"Medium");
  name = "Fedora Core 10 FEDORA-2009-2231 (mediawiki)";
  script_name(name);
 
@@ -66,7 +66,7 @@
 
 https://secure1.securityspace.com/smysecure/catid.html?in=FEDORA-2009-2231
 
-Risk factor : High";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/fcore_2009_2237.nasl
===================================================================
--- trunk/openvas-plugins/scripts/fcore_2009_2237.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/fcore_2009_2237.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,8 +30,8 @@
  script_id(63487);
  script_cve_id("CVE-2008-5249", "CVE-2008-5250", "CVE-2008-5252", "CVE-2008-5687", "CVE-2008-5688", "CVE-2009-0737");
  script_version ("$");
- script_tag(name:"cvss_base", value:"5.8");
- script_tag(name:"risk_factor", value:"High");
+ script_tag(name:"cvss_base", value:"4.3");
+ script_tag(name:"risk_factor", value:"Medium");
  name = "Fedora Core 9 FEDORA-2009-2237 (mediawiki)";
  script_name(name);
 
@@ -66,7 +66,7 @@
 
 https://secure1.securityspace.com/smysecure/catid.html?in=FEDORA-2009-2237
 
-Risk factor : High";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/fcore_2009_2417.nasl
===================================================================
--- trunk/openvas-plugins/scripts/fcore_2009_2417.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/fcore_2009_2417.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,7 +30,7 @@
  script_id(63602);
  script_cve_id("CVE-2008-4437", "CVE-2008-6098", "CVE-2009-0481", "CVE-2009-0483", "CVE-2009-0484", "CVE-2009-0485", "CVE-2009-0486", "CVE-2009-0482");
  script_version ("$");
- script_tag(name:"cvss_base", value:"7.5");
+ script_tag(name:"cvss_base", value:"7.1");
  script_tag(name:"risk_factor", value:"High");
  name = "Fedora Core 10 FEDORA-2009-2417 (bugzilla)";
  script_name(name);

Modified: trunk/openvas-plugins/scripts/fcore_2009_2418.nasl
===================================================================
--- trunk/openvas-plugins/scripts/fcore_2009_2418.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/fcore_2009_2418.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,7 +30,7 @@
  script_id(63596);
  script_cve_id("CVE-2008-4437", "CVE-2008-6098", "CVE-2009-0481", "CVE-2009-0483", "CVE-2009-0484", "CVE-2009-0485", "CVE-2009-0486", "CVE-2009-0482");
  script_version ("$");
- script_tag(name:"cvss_base", value:"7.5");
+ script_tag(name:"cvss_base", value:"7.1");
  script_tag(name:"risk_factor", value:"High");
  name = "Fedora Core 9 FEDORA-2009-2418 (bugzilla)";
  script_name(name);

Modified: trunk/openvas-plugins/scripts/fcore_2009_2419.nasl
===================================================================
--- trunk/openvas-plugins/scripts/fcore_2009_2419.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/fcore_2009_2419.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,8 +30,8 @@
  script_id(63527);
  script_cve_id("CVE-2009-0365", "CVE-2009-0578");
  script_version ("$");
- script_tag(name:"cvss_base", value:"6.2");
- script_tag(name:"risk_factor", value:"High");
+ script_tag(name:"cvss_base", value:"4.6");
+ script_tag(name:"risk_factor", value:"Medium");
  name = "Fedora Core 10 FEDORA-2009-2419 (knetworkmanager)";
  script_name(name);
 
@@ -59,7 +59,7 @@
 
 https://secure1.securityspace.com/smysecure/catid.html?in=FEDORA-2009-2419
 
-Risk factor : High";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/fcore_2009_2420.nasl
===================================================================
--- trunk/openvas-plugins/scripts/fcore_2009_2420.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/fcore_2009_2420.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,8 +30,8 @@
  script_id(63526);
  script_cve_id("CVE-2009-0365", "CVE-2009-0578");
  script_version ("$");
- script_tag(name:"cvss_base", value:"6.2");
- script_tag(name:"risk_factor", value:"High");
+ script_tag(name:"cvss_base", value:"4.6");
+ script_tag(name:"risk_factor", value:"Medium");
  name = "Fedora Core 9 FEDORA-2009-2420 (NetworkManager)";
  script_name(name);
 
@@ -56,7 +56,7 @@
 
 https://secure1.securityspace.com/smysecure/catid.html?in=FEDORA-2009-2420
 
-Risk factor : High";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/fcore_2009_2784.nasl
===================================================================
--- trunk/openvas-plugins/scripts/fcore_2009_2784.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/fcore_2009_2784.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,8 +30,8 @@
  script_id(63597);
  script_cve_id("CVE-2009-0547", "CVE-2009-0582");
  script_version ("$");
- script_tag(name:"cvss_base", value:"5.8");
- script_tag(name:"risk_factor", value:"High");
+ script_tag(name:"cvss_base", value:"5.0");
+ script_tag(name:"risk_factor", value:"Medium");
  name = "Fedora Core 10 FEDORA-2009-2784 (evolution-data-server)";
  script_name(name);
 
@@ -80,7 +80,7 @@
 
 https://secure1.securityspace.com/smysecure/catid.html?in=FEDORA-2009-2784
 
-Risk factor : High";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/fcore_2009_2792.nasl
===================================================================
--- trunk/openvas-plugins/scripts/fcore_2009_2792.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/fcore_2009_2792.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,8 +30,8 @@
  script_id(63598);
  script_cve_id("CVE-2009-0547", "CVE-2009-0582");
  script_version ("$");
- script_tag(name:"cvss_base", value:"5.8");
- script_tag(name:"risk_factor", value:"High");
+ script_tag(name:"cvss_base", value:"5.0");
+ script_tag(name:"risk_factor", value:"Medium");
  name = "Fedora Core 9 FEDORA-2009-2792 (evolution-data-server)";
  script_name(name);
 
@@ -76,7 +76,7 @@
 
 https://secure1.securityspace.com/smysecure/catid.html?in=FEDORA-2009-2792
 
-Risk factor : High";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/fcore_2009_2834.nasl
===================================================================
--- trunk/openvas-plugins/scripts/fcore_2009_2834.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/fcore_2009_2834.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,8 +30,8 @@
  script_id(63777);
  script_cve_id("CVE-2009-0844", "CVE-2009-0845", "CVE-2009-0846", "CVE-2009-0847");
  script_version ("$");
- script_tag(name:"cvss_base", value:"10.0");
- script_tag(name:"risk_factor", value:"Critical");
+ script_tag(name:"cvss_base", value:"5.8");
+ script_tag(name:"risk_factor", value:"High");
  name = "Fedora Core 9 FEDORA-2009-2834 (krb5)";
  script_name(name);
 
@@ -78,7 +78,7 @@
 
 https://secure1.securityspace.com/smysecure/catid.html?in=FEDORA-2009-2834
 
-Risk factor: Critical";
+Risk factor : High";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/fcore_2009_2852.nasl
===================================================================
--- trunk/openvas-plugins/scripts/fcore_2009_2852.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/fcore_2009_2852.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,8 +30,8 @@
  script_id(63778);
  script_cve_id("CVE-2009-0844", "CVE-2009-0845", "CVE-2009-0846", "CVE-2009-0847");
  script_version ("$");
- script_tag(name:"cvss_base", value:"10.0");
- script_tag(name:"risk_factor", value:"Critical");
+ script_tag(name:"cvss_base", value:"5.8");
+ script_tag(name:"risk_factor", value:"High");
  name = "Fedora Core 10 FEDORA-2009-2852 (krb5)";
  script_name(name);
 
@@ -78,7 +78,7 @@
 
 https://secure1.securityspace.com/smysecure/catid.html?in=FEDORA-2009-2852
 
-Risk factor: Critical";
+Risk factor : High";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/fcore_2009_2882.nasl
===================================================================
--- trunk/openvas-plugins/scripts/fcore_2009_2882.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/fcore_2009_2882.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,8 +30,8 @@
  script_id(63655);
  script_cve_id("CVE-2009-0040", "CVE-2009-0352", "CVE-2009-0353", "CVE-2009-0772", "CVE-2009-0774", "CVE-2009-0775", "CVE-2009-0355", "CVE-2009-0776");
  script_version ("$");
- script_tag(name:"cvss_base", value:"10.0");
- script_tag(name:"risk_factor", value:"Critical");
+ script_tag(name:"cvss_base", value:"6.8");
+ script_tag(name:"risk_factor", value:"High");
  name = "Fedora Core 10 FEDORA-2009-2882 (thunderbird)";
  script_name(name);
 
@@ -88,7 +88,7 @@
 
 https://secure1.securityspace.com/smysecure/catid.html?in=FEDORA-2009-2882
 
-Risk factor: Critical";
+Risk factor : High";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/fcore_2009_2884.nasl
===================================================================
--- trunk/openvas-plugins/scripts/fcore_2009_2884.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/fcore_2009_2884.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,8 +30,8 @@
  script_id(63657);
  script_cve_id("CVE-2009-0040", "CVE-2009-0352", "CVE-2009-0353", "CVE-2009-0772", "CVE-2009-0774", "CVE-2009-0775", "CVE-2009-0355", "CVE-2009-0776");
  script_version ("$");
- script_tag(name:"cvss_base", value:"10.0");
- script_tag(name:"risk_factor", value:"Critical");
+ script_tag(name:"cvss_base", value:"6.8");
+ script_tag(name:"risk_factor", value:"High");
  name = "Fedora Core 9 FEDORA-2009-2884 (thunderbird)";
  script_name(name);
 
@@ -84,7 +84,7 @@
 
 https://secure1.securityspace.com/smysecure/catid.html?in=FEDORA-2009-2884
 
-Risk factor: Critical";
+Risk factor : High";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/fcore_2009_3034.nasl
===================================================================
--- trunk/openvas-plugins/scripts/fcore_2009_3034.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/fcore_2009_3034.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,8 +30,8 @@
  script_id(63673);
  script_cve_id("CVE-2009-0581", "CVE-2009-0723", "CVE-2009-0733");
  script_version ("$");
- script_tag(name:"cvss_base", value:"9.3");
- script_tag(name:"risk_factor", value:"Critical");
+ script_tag(name:"cvss_base", value:"4.3");
+ script_tag(name:"risk_factor", value:"Medium");
  name = "Fedora Core 9 FEDORA-2009-3034 (java-1.6.0-openjdk)";
  script_name(name);
 
@@ -69,7 +69,7 @@
 
 https://secure1.securityspace.com/smysecure/catid.html?in=FEDORA-2009-3034
 
-Risk factor: Critical";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/fcore_2009_3101.nasl
===================================================================
--- trunk/openvas-plugins/scripts/fcore_2009_3101.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/fcore_2009_3101.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,7 +30,7 @@
  script_id(63723);
  script_cve_id("CVE-2009-1044", "CVE-2009-1169", "CVE-2009-0776", "CVE-2009-0771", "CVE-2009-0772", "CVE-2009-0773", "CVE-2009-0774", "CVE-2009-0357", "CVE-2009-0352", "CVE-2009-0353");
  script_version ("$");
- script_tag(name:"cvss_base", value:"10.0");
+ script_tag(name:"cvss_base", value:"9.3");
  script_tag(name:"risk_factor", value:"Critical");
  name = "Fedora Core 9 FEDORA-2009-3101 (seamonkey)";
  script_name(name);
@@ -86,7 +86,7 @@
 
 https://secure1.securityspace.com/smysecure/catid.html?in=FEDORA-2009-3101
 
-Risk factor: Critical";
+Risk factor : Critical";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/fcore_2009_3161.nasl
===================================================================
--- trunk/openvas-plugins/scripts/fcore_2009_3161.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/fcore_2009_3161.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,7 +30,7 @@
  script_id(63724);
  script_cve_id("CVE-2009-1044", "CVE-2009-1169", "CVE-2009-0776", "CVE-2009-0771", "CVE-2009-0772", "CVE-2009-0773", "CVE-2009-0774", "CVE-2009-0357", "CVE-2009-0352", "CVE-2009-0353");
  script_version ("$");
- script_tag(name:"cvss_base", value:"10.0");
+ script_tag(name:"cvss_base", value:"9.3");
  script_tag(name:"risk_factor", value:"Critical");
  name = "Fedora Core 10 FEDORA-2009-3161 (seamonkey)";
  script_name(name);
@@ -81,7 +81,7 @@
 
 https://secure1.securityspace.com/smysecure/catid.html?in=FEDORA-2009-3161
 
-Risk factor: Critical";
+Risk factor : Critical";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/fcore_2009_3280.nasl
===================================================================
--- trunk/openvas-plugins/scripts/fcore_2009_3280.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/fcore_2009_3280.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,8 +30,8 @@
  script_id(63726);
  script_cve_id("CVE-2009-1171", "CVE-2009-0499", "CVE-2008-5153", "CVE-2008-4796");
  script_version ("$");
- script_tag(name:"cvss_base", value:"10.0");
- script_tag(name:"risk_factor", value:"Critical");
+ script_tag(name:"cvss_base", value:"4.3");
+ script_tag(name:"risk_factor", value:"Medium");
  name = "Fedora Core 10 FEDORA-2009-3280 (moodle)";
  script_name(name);
 
@@ -84,7 +84,7 @@
 
 https://secure1.securityspace.com/smysecure/catid.html?in=FEDORA-2009-3280
 
-Risk factor: Critical";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/fcore_2009_3283.nasl
===================================================================
--- trunk/openvas-plugins/scripts/fcore_2009_3283.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/fcore_2009_3283.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,8 +30,8 @@
  script_id(63727);
  script_cve_id("CVE-2009-1171", "CVE-2009-0499", "CVE-2008-5153", "CVE-2008-4796");
  script_version ("$");
- script_tag(name:"cvss_base", value:"10.0");
- script_tag(name:"risk_factor", value:"Critical");
+ script_tag(name:"cvss_base", value:"4.3");
+ script_tag(name:"risk_factor", value:"Medium");
  name = "Fedora Core 9 FEDORA-2009-3283 (moodle)";
  script_name(name);
 
@@ -84,7 +84,7 @@
 
 https://secure1.securityspace.com/smysecure/catid.html?in=FEDORA-2009-3283
 
-Risk factor: Critical";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/fcore_2009_3449.nasl
===================================================================
--- trunk/openvas-plugins/scripts/fcore_2009_3449.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/fcore_2009_3449.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,7 +30,7 @@
  script_id(63783);
  script_cve_id("CVE-2009-0115");
  script_version ("$");
- script_tag(name:"cvss_base", value:"6.9");
+ script_tag(name:"cvss_base", value:"7.2");
  script_tag(name:"risk_factor", value:"High");
  name = "Fedora Core 10 FEDORA-2009-3449 (device-mapper-multipath)";
  script_name(name);

Modified: trunk/openvas-plugins/scripts/fcore_2009_3453.nasl
===================================================================
--- trunk/openvas-plugins/scripts/fcore_2009_3453.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/fcore_2009_3453.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,7 +30,7 @@
  script_id(63784);
  script_cve_id("CVE-2009-0115");
  script_version ("$");
- script_tag(name:"cvss_base", value:"6.9");
+ script_tag(name:"cvss_base", value:"7.2");
  script_tag(name:"risk_factor", value:"High");
  name = "Fedora Core 9 FEDORA-2009-3453 (device-mapper-multipath)";
  script_name(name);

Modified: trunk/openvas-plugins/scripts/fcore_2009_3753.nasl
===================================================================
--- trunk/openvas-plugins/scripts/fcore_2009_3753.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/fcore_2009_3753.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,8 +30,8 @@
  script_id(63876);
  script_cve_id("CVE-2009-0163", "CVE-2009-0164", "CVE-2009-0146", "CVE-2009-0147", "CVE-2009-0166", "CVE-2008-5183", "CVE-2008-5286", "CVE-2008-1722", "CVE-2008-3639", "CVE-2008-3640", "CVE-2008-3641", "CVE-2008-1373");
  script_version ("$");
- script_tag(name:"cvss_base", value:"10.0");
- script_tag(name:"risk_factor", value:"Critical");
+ script_tag(name:"cvss_base", value:"6.8");
+ script_tag(name:"risk_factor", value:"High");
  name = "Fedora Core 9 FEDORA-2009-3753 (cups)";
  script_name(name);
 
@@ -90,7 +90,7 @@
 
 https://secure1.securityspace.com/smysecure/catid.html?in=FEDORA-2009-3753
 
-Risk factor: Critical";
+Risk factor : High";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/fcore_2009_3769.nasl
===================================================================
--- trunk/openvas-plugins/scripts/fcore_2009_3769.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/fcore_2009_3769.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,7 +30,7 @@
  script_id(63877);
  script_cve_id("CVE-2009-0163", "CVE-2009-0164", "CVE-2009-0146", "CVE-2009-0147", "CVE-2009-0166", "CVE-2008-5183", "CVE-2008-5286", "CVE-2008-1722");
  script_version ("$");
- script_tag(name:"cvss_base", value:"7.5");
+ script_tag(name:"cvss_base", value:"6.8");
  script_tag(name:"risk_factor", value:"High");
  name = "Fedora Core 10 FEDORA-2009-3769 (cups)";
  script_name(name);

Modified: trunk/openvas-plugins/scripts/fcore_2009_3794.nasl
===================================================================
--- trunk/openvas-plugins/scripts/fcore_2009_3794.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/fcore_2009_3794.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,8 +30,8 @@
  script_id(63878);
  script_cve_id("CVE-2009-0799", "CVE-2009-0800", "CVE-2009-1179", "CVE-2009-1180", "CVE-2009-1181", "CVE-2009-1182", "CVE-2009-1183", "CVE-2009-0146", "CVE-2009-0147", "CVE-2009-0166");
  script_version ("$");
- script_tag(name:"cvss_base", value:"7.5");
- script_tag(name:"risk_factor", value:"High");
+ script_tag(name:"cvss_base", value:"4.3");
+ script_tag(name:"risk_factor", value:"Medium");
  name = "Fedora Core 9 FEDORA-2009-3794 (xpdf)";
  script_name(name);
 
@@ -81,7 +81,7 @@
 
 https://secure1.securityspace.com/smysecure/catid.html?in=FEDORA-2009-3794
 
-Risk factor : High";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/fcore_2009_3820.nasl
===================================================================
--- trunk/openvas-plugins/scripts/fcore_2009_3820.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/fcore_2009_3820.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,8 +30,8 @@
  script_id(63879);
  script_cve_id("CVE-2009-0799", "CVE-2009-0800", "CVE-2009-1179", "CVE-2009-1180", "CVE-2009-1181", "CVE-2009-1182", "CVE-2009-1183", "CVE-2009-0146", "CVE-2009-0147", "CVE-2009-0166");
  script_version ("$");
- script_tag(name:"cvss_base", value:"7.5");
- script_tag(name:"risk_factor", value:"High");
+ script_tag(name:"cvss_base", value:"4.3");
+ script_tag(name:"risk_factor", value:"Medium");
  name = "Fedora Core 10 FEDORA-2009-3820 (xpdf)";
  script_name(name);
 
@@ -80,7 +80,7 @@
 
 https://secure1.securityspace.com/smysecure/catid.html?in=FEDORA-2009-3820
 
-Risk factor : High";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/fcore_2009_3875.nasl
===================================================================
--- trunk/openvas-plugins/scripts/fcore_2009_3875.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/fcore_2009_3875.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,8 +30,8 @@
  script_id(63882);
  script_cve_id("CVE-2009-1302", "CVE-2009-1303", "CVE-2009-1304", "CVE-2009-1305", "CVE-2009-0652", "CVE-2009-1306", "CVE-2009-1307", "CVE-2009-1308", "CVE-2009-1309", "CVE-2009-1310", "CVE-2009-1311", "CVE-2009-1312");
  script_version ("$");
- script_tag(name:"cvss_base", value:"6.8");
- script_tag(name:"risk_factor", value:"High");
+ script_tag(name:"cvss_base", value:"5.0");
+ script_tag(name:"risk_factor", value:"Medium");
  name = "Fedora Core 9 FEDORA-2009-3875 (firefox)";
  script_name(name);
 
@@ -85,7 +85,7 @@
 
 https://secure1.securityspace.com/smysecure/catid.html?in=FEDORA-2009-3875
 
-Risk factor : High";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/fcore_2009_3893.nasl
===================================================================
--- trunk/openvas-plugins/scripts/fcore_2009_3893.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/fcore_2009_3893.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,8 +30,8 @@
  script_id(63883);
  script_cve_id("CVE-2009-1302", "CVE-2009-1303", "CVE-2009-1304", "CVE-2009-1305", "CVE-2009-0652", "CVE-2009-1306", "CVE-2009-1307", "CVE-2009-1308", "CVE-2009-1309", "CVE-2009-1310", "CVE-2009-1311", "CVE-2009-1312");
  script_version ("$");
- script_tag(name:"cvss_base", value:"6.8");
- script_tag(name:"risk_factor", value:"High");
+ script_tag(name:"cvss_base", value:"5.0");
+ script_tag(name:"risk_factor", value:"Medium");
  name = "Fedora Core 10 FEDORA-2009-3893 (epiphany)";
  script_name(name);
 
@@ -85,7 +85,7 @@
 
 https://secure1.securityspace.com/smysecure/catid.html?in=FEDORA-2009-3893
 
-Risk factor : High";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/fcore_2009_3914.nasl
===================================================================
--- trunk/openvas-plugins/scripts/fcore_2009_3914.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/fcore_2009_3914.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,8 +30,8 @@
  script_id(63952);
  script_cve_id("CVE-2009-0793", "CVE-2009-0723", "CVE-2009-0733", "CVE-2009-0581");
  script_version ("$");
- script_tag(name:"cvss_base", value:"9.3");
- script_tag(name:"risk_factor", value:"Critical");
+ script_tag(name:"cvss_base", value:"4.3");
+ script_tag(name:"risk_factor", value:"Medium");
  name = "Fedora Core 9 FEDORA-2009-3914 (lcms)";
  script_name(name);
 
@@ -67,7 +67,7 @@
 
 https://secure1.securityspace.com/smysecure/catid.html?in=FEDORA-2009-3914
 
-Risk factor: Critical";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/fcore_2009_3967.nasl
===================================================================
--- trunk/openvas-plugins/scripts/fcore_2009_3967.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/fcore_2009_3967.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,8 +30,8 @@
  script_id(63953);
  script_cve_id("CVE-2009-0793", "CVE-2009-0723", "CVE-2009-0733", "CVE-2009-0581");
  script_version ("$");
- script_tag(name:"cvss_base", value:"9.3");
- script_tag(name:"risk_factor", value:"Critical");
+ script_tag(name:"cvss_base", value:"4.3");
+ script_tag(name:"risk_factor", value:"Medium");
  name = "Fedora Core 10 FEDORA-2009-3967 (lcms)";
  script_name(name);
 
@@ -67,7 +67,7 @@
 
 https://secure1.securityspace.com/smysecure/catid.html?in=FEDORA-2009-3967
 
-Risk factor: Critical";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/fcore_2009_4848.nasl
===================================================================
--- trunk/openvas-plugins/scripts/fcore_2009_4848.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/fcore_2009_4848.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,8 +30,8 @@
  script_id(64239);
  script_cve_id("CVE-2005-2974", "CVE-2005-3350");
  script_version ("$");
- script_tag(name:"cvss_base", value:"7.5");
- script_tag(name:"risk_factor", value:"High");
+ script_tag(name:"cvss_base", value:"2.6");
+ script_tag(name:"risk_factor", value:"Medium");
  name = "Fedora Core 10 FEDORA-2009-4848 (giflib)";
  script_name(name);
 
@@ -62,7 +62,7 @@
 
 https://secure1.securityspace.com/smysecure/catid.html?in=FEDORA-2009-4848
 
-Risk factor : High";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/fcore_2009_4870.nasl
===================================================================
--- trunk/openvas-plugins/scripts/fcore_2009_4870.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/fcore_2009_4870.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,8 +30,8 @@
  script_id(63985);
  script_cve_id("CVE-2009-1581", "CVE-2008-2379", "CVE-2008-3663", "CVE-2009-1579", "CVE-2009-1580", "CVE-2009-1578");
  script_version ("$");
- script_tag(name:"cvss_base", value:"6.8");
- script_tag(name:"risk_factor", value:"High");
+ script_tag(name:"cvss_base", value:"4.3");
+ script_tag(name:"risk_factor", value:"Medium");
  name = "Fedora Core 9 FEDORA-2009-4870 (squirrelmail)";
  script_name(name);
 
@@ -68,7 +68,7 @@
 
 https://secure1.securityspace.com/smysecure/catid.html?in=FEDORA-2009-4870
 
-Risk factor : High";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/fcore_2009_4880.nasl
===================================================================
--- trunk/openvas-plugins/scripts/fcore_2009_4880.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/fcore_2009_4880.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,8 +30,8 @@
  script_id(63987);
  script_cve_id("CVE-2008-2379", "CVE-2009-1579", "CVE-2009-1580", "CVE-2009-1581", "CVE-2009-1578");
  script_version ("$");
- script_tag(name:"cvss_base", value:"6.8");
- script_tag(name:"risk_factor", value:"High");
+ script_tag(name:"cvss_base", value:"4.3");
+ script_tag(name:"risk_factor", value:"Medium");
  name = "Fedora Core 10 FEDORA-2009-4880 (squirrelmail)";
  script_name(name);
 
@@ -68,7 +68,7 @@
 
 https://secure1.securityspace.com/smysecure/catid.html?in=FEDORA-2009-4880
 
-Risk factor : High";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/fcore_2009_4883.nasl
===================================================================
--- trunk/openvas-plugins/scripts/fcore_2009_4883.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/fcore_2009_4883.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,7 +30,7 @@
  script_id(64097);
  script_cve_id("CVE-2009-0368", "CVE-2008-2235");
  script_version ("$");
- script_tag(name:"cvss_base", value:"4.9");
+ script_tag(name:"cvss_base", value:"2.1");
  script_tag(name:"risk_factor", value:"Medium");
  name = "Fedora Core 9 FEDORA-2009-4883 (opensc)";
  script_name(name);
@@ -62,7 +62,7 @@
 
 https://secure1.securityspace.com/smysecure/catid.html?in=FEDORA-2009-4883
 
-Risk factor: Medium";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/fcore_2009_5118.nasl
===================================================================
--- trunk/openvas-plugins/scripts/fcore_2009_5118.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/fcore_2009_5118.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,8 +30,8 @@
  script_id(63993);
  script_cve_id("CVE-2005-2974", "CVE-2005-3350");
  script_version ("$");
- script_tag(name:"cvss_base", value:"7.5");
- script_tag(name:"risk_factor", value:"High");
+ script_tag(name:"cvss_base", value:"2.6");
+ script_tag(name:"risk_factor", value:"Medium");
  name = "Fedora Core 9 FEDORA-2009-5118 (giflib)";
  script_name(name);
 
@@ -69,7 +69,7 @@
 
 https://secure1.securityspace.com/smysecure/catid.html?in=FEDORA-2009-5118
 
-Risk factor : High";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/fcore_2009_5383.nasl
===================================================================
--- trunk/openvas-plugins/scripts/fcore_2009_5383.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/fcore_2009_5383.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,8 +30,8 @@
  script_id(64077);
  script_cve_id("CVE-2008-3528", "CVE-2008-3525", "CVE-2008-3831", "CVE-2008-2750", "CVE-2009-1439", "CVE-2009-1633");
  script_version ("$");
- script_tag(name:"cvss_base", value:"7.8");
- script_tag(name:"risk_factor", value:"High");
+ script_tag(name:"cvss_base", value:"2.1");
+ script_tag(name:"risk_factor", value:"Medium");
  name = "Fedora Core 9 FEDORA-2009-5383 (kernel)";
  script_name(name);
 
@@ -77,7 +77,7 @@
 
 https://secure1.securityspace.com/smysecure/catid.html?in=FEDORA-2009-5383
 
-Risk factor : High";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/fcore_2009_5412.nasl
===================================================================
--- trunk/openvas-plugins/scripts/fcore_2009_5412.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/fcore_2009_5412.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,8 +30,8 @@
  script_id(64246);
  script_cve_id("CVE-2009-1377", "CVE-2009-1378", "CVE-2009-1379", "CVE-2008-5077");
  script_version ("$");
- script_tag(name:"cvss_base", value:"5.8");
- script_tag(name:"risk_factor", value:"High");
+ script_tag(name:"cvss_base", value:"5.0");
+ script_tag(name:"risk_factor", value:"Medium");
  name = "Fedora Core 10 FEDORA-2009-5412 (openssl)";
  script_name(name);
 
@@ -79,7 +79,7 @@
 
 https://secure1.securityspace.com/smysecure/catid.html?in=FEDORA-2009-5412
 
-Risk factor : High";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/fcore_2009_5423.nasl
===================================================================
--- trunk/openvas-plugins/scripts/fcore_2009_5423.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/fcore_2009_5423.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,8 +30,8 @@
  script_id(64247);
  script_cve_id("CVE-2009-1377", "CVE-2009-1378", "CVE-2009-1379", "CVE-2008-5077", "CVE-2008-0891", "CVE-2008-1672");
  script_version ("$");
- script_tag(name:"cvss_base", value:"5.8");
- script_tag(name:"risk_factor", value:"High");
+ script_tag(name:"cvss_base", value:"5.0");
+ script_tag(name:"risk_factor", value:"Medium");
  name = "Fedora Core 9 FEDORA-2009-5423 (openssl)";
  script_name(name);
 
@@ -74,7 +74,7 @@
 
 https://secure1.securityspace.com/smysecure/catid.html?in=FEDORA-2009-5423
 
-Risk factor : High";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/fcore_2009_5552.nasl
===================================================================
--- trunk/openvas-plugins/scripts/fcore_2009_5552.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/fcore_2009_5552.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,8 +30,8 @@
  script_id(64101);
  script_cve_id("CVE-2009-1373", "CVE-2009-1374", "CVE-2009-1375", "CVE-2009-1376", "CVE-2008-2927");
  script_version ("$");
- script_tag(name:"cvss_base", value:"9.3");
- script_tag(name:"risk_factor", value:"Critical");
+ script_tag(name:"cvss_base", value:"7.1");
+ script_tag(name:"risk_factor", value:"High");
  name = "Fedora Core 9 FEDORA-2009-5552 (pidgin)";
  script_name(name);
 
@@ -69,7 +69,7 @@
 
 https://secure1.securityspace.com/smysecure/catid.html?in=FEDORA-2009-5552
 
-Risk factor: Critical";
+Risk factor : High";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/fcore_2009_5583.nasl
===================================================================
--- trunk/openvas-plugins/scripts/fcore_2009_5583.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/fcore_2009_5583.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,8 +30,8 @@
  script_id(64103);
  script_cve_id("CVE-2009-1373", "CVE-2009-1374", "CVE-2009-1375", "CVE-2009-1376", "CVE-2008-2927");
  script_version ("$");
- script_tag(name:"cvss_base", value:"9.3");
- script_tag(name:"risk_factor", value:"Critical");
+ script_tag(name:"cvss_base", value:"7.1");
+ script_tag(name:"risk_factor", value:"High");
  name = "Fedora Core 11 FEDORA-2009-5583 (pidgin)";
  script_name(name);
 
@@ -71,7 +71,7 @@
 
 https://secure1.securityspace.com/smysecure/catid.html?in=FEDORA-2009-5583
 
-Risk factor: Critical";
+Risk factor : High";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/fcore_2009_5597.nasl
===================================================================
--- trunk/openvas-plugins/scripts/fcore_2009_5597.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/fcore_2009_5597.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,8 +30,8 @@
  script_id(64106);
  script_cve_id("CVE-2009-1373", "CVE-2009-1374", "CVE-2009-1375", "CVE-2009-1376", "CVE-2008-2927");
  script_version ("$");
- script_tag(name:"cvss_base", value:"9.3");
- script_tag(name:"risk_factor", value:"Critical");
+ script_tag(name:"cvss_base", value:"7.1");
+ script_tag(name:"risk_factor", value:"High");
  name = "Fedora Core 10 FEDORA-2009-5597 (pidgin)";
  script_name(name);
 
@@ -69,7 +69,7 @@
 
 https://secure1.securityspace.com/smysecure/catid.html?in=FEDORA-2009-5597
 
-Risk factor: Critical";
+Risk factor : High";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/fcore_2009_5969.nasl
===================================================================
--- trunk/openvas-plugins/scripts/fcore_2009_5969.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/fcore_2009_5969.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,8 +30,8 @@
  script_id(64298);
  script_cve_id("CVE-2009-0023", "CVE-2009-1955", "CVE-2009-1956");
  script_version ("$");
- script_tag(name:"cvss_base", value:"6.4");
- script_tag(name:"risk_factor", value:"High");
+ script_tag(name:"cvss_base", value:"4.3");
+ script_tag(name:"risk_factor", value:"Medium");
  name = "Fedora Core 10 FEDORA-2009-5969 (apr-util)";
  script_name(name);
 
@@ -74,7 +74,7 @@
 
 https://secure1.securityspace.com/smysecure/catid.html?in=FEDORA-2009-5969
 
-Risk factor : High";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/fcore_2009_6014.nasl
===================================================================
--- trunk/openvas-plugins/scripts/fcore_2009_6014.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/fcore_2009_6014.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,8 +30,8 @@
  script_id(64295);
  script_cve_id("CVE-2009-0023", "CVE-2009-1955", "CVE-2009-1956");
  script_version ("$");
- script_tag(name:"cvss_base", value:"6.4");
- script_tag(name:"risk_factor", value:"High");
+ script_tag(name:"cvss_base", value:"4.3");
+ script_tag(name:"risk_factor", value:"Medium");
  name = "Fedora Core 9 FEDORA-2009-6014 (apr-util)";
  script_name(name);
 
@@ -77,7 +77,7 @@
 
 https://secure1.securityspace.com/smysecure/catid.html?in=FEDORA-2009-6014
 
-Risk factor : High";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/fcore_2009_6261.nasl
===================================================================
--- trunk/openvas-plugins/scripts/fcore_2009_6261.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/fcore_2009_6261.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,8 +30,8 @@
  script_id(64297);
  script_cve_id("CVE-2009-0023", "CVE-2009-1955", "CVE-2009-1956");
  script_version ("$");
- script_tag(name:"cvss_base", value:"6.4");
- script_tag(name:"risk_factor", value:"High");
+ script_tag(name:"cvss_base", value:"4.3");
+ script_tag(name:"risk_factor", value:"Medium");
  name = "Fedora Core 11 FEDORA-2009-6261 (apr-util)";
  script_name(name);
 
@@ -74,7 +74,7 @@
 
 https://secure1.securityspace.com/smysecure/catid.html?in=FEDORA-2009-6261
 
-Risk factor : High";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/fcore_2009_6531.nasl
===================================================================
--- trunk/openvas-plugins/scripts/fcore_2009_6531.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/fcore_2009_6531.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,8 +30,8 @@
  script_id(64240);
  script_cve_id("CVE-2009-2042", "CVE-2009-0040");
  script_version ("$");
- script_tag(name:"cvss_base", value:"6.8");
- script_tag(name:"risk_factor", value:"High");
+ script_tag(name:"cvss_base", value:"4.3");
+ script_tag(name:"risk_factor", value:"Medium");
  name = "Fedora Core 10 FEDORA-2009-6531 (libpng)";
  script_name(name);
 
@@ -66,7 +66,7 @@
 
 https://secure1.securityspace.com/smysecure/catid.html?in=FEDORA-2009-6531
 
-Risk factor : High";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/fcore_2009_6603.nasl
===================================================================
--- trunk/openvas-plugins/scripts/fcore_2009_6603.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/fcore_2009_6603.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,8 +30,8 @@
  script_id(64244);
  script_cve_id("CVE-2009-2042", "CVE-2009-0040", "CVE-2008-1382");
  script_version ("$");
- script_tag(name:"cvss_base", value:"7.5");
- script_tag(name:"risk_factor", value:"High");
+ script_tag(name:"cvss_base", value:"4.3");
+ script_tag(name:"risk_factor", value:"Medium");
  name = "Fedora Core 9 FEDORA-2009-6603 (libpng)";
  script_name(name);
 
@@ -72,7 +72,7 @@
 
 https://secure1.securityspace.com/smysecure/catid.html?in=FEDORA-2009-6603
 
-Risk factor : High";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/fcore_2009_6846.nasl
===================================================================
--- trunk/openvas-plugins/scripts/fcore_2009_6846.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/fcore_2009_6846.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,8 +30,8 @@
  script_id(64296);
  script_cve_id("CVE-2008-3528", "CVE-2008-3525", "CVE-2008-3831", "CVE-2008-2750", "CVE-2009-1385", "CVE-2009-1389");
  script_version ("$");
- script_tag(name:"cvss_base", value:"7.8");
- script_tag(name:"risk_factor", value:"High");
+ script_tag(name:"cvss_base", value:"2.1");
+ script_tag(name:"risk_factor", value:"Medium");
  name = "Fedora Core 9 FEDORA-2009-6846 (kernel)";
  script_name(name);
 
@@ -80,7 +80,7 @@
 
 https://secure1.securityspace.com/smysecure/catid.html?in=FEDORA-2009-6846
 
-Risk factor : High";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/fcore_2009_6972.nasl
===================================================================
--- trunk/openvas-plugins/scripts/fcore_2009_6972.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/fcore_2009_6972.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,8 +30,8 @@
  script_id(64401);
  script_cve_id("CVE-2009-0146", "CVE-2009-0147", "CVE-2009-0166", "CVE-2009-0799", "CVE-2009-0800", "CVE-2009-1179", "CVE-2009-1180", "CVE-2009-1181", "CVE-2009-1182", "CVE-2009-1183", "CVE-2009-1187", "CVE-2009-1188");
  script_version ("$");
- script_tag(name:"cvss_base", value:"7.5");
- script_tag(name:"risk_factor", value:"High");
+ script_tag(name:"cvss_base", value:"4.3");
+ script_tag(name:"risk_factor", value:"Medium");
  name = "Fedora Core 11 FEDORA-2009-6972 (poppler)";
  script_name(name);
 
@@ -68,7 +68,7 @@
 
 https://secure1.securityspace.com/smysecure/catid.html?in=FEDORA-2009-6972
 
-Risk factor : High";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/fcore_2009_6973.nasl
===================================================================
--- trunk/openvas-plugins/scripts/fcore_2009_6973.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/fcore_2009_6973.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,8 +30,8 @@
  script_id(64300);
  script_cve_id("CVE-2009-0146", "CVE-2009-0147", "CVE-2009-0166", "CVE-2009-0799", "CVE-2009-0800", "CVE-2009-1179", "CVE-2009-1180", "CVE-2009-1181", "CVE-2009-1182", "CVE-2009-1183", "CVE-2009-1187", "CVE-2009-1188");
  script_version ("$");
- script_tag(name:"cvss_base", value:"7.5");
- script_tag(name:"risk_factor", value:"High");
+ script_tag(name:"cvss_base", value:"4.3");
+ script_tag(name:"risk_factor", value:"Medium");
  name = "Fedora Core 10 FEDORA-2009-6973 (poppler)";
  script_name(name);
 
@@ -69,7 +69,7 @@
 
 https://secure1.securityspace.com/smysecure/catid.html?in=FEDORA-2009-6973
 
-Risk factor : High";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/fcore_2009_7335.nasl
===================================================================
--- trunk/openvas-plugins/scripts/fcore_2009_7335.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/fcore_2009_7335.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,8 +30,8 @@
  script_id(64347);
  script_cve_id("CVE-2009-2285", "CVE-2008-2327");
  script_version ("$");
- script_tag(name:"cvss_base", value:"6.8");
- script_tag(name:"risk_factor", value:"High");
+ script_tag(name:"cvss_base", value:"4.3");
+ script_tag(name:"risk_factor", value:"Medium");
  name = "Fedora Core 9 FEDORA-2009-7335 (libtiff)";
  script_name(name);
 
@@ -69,7 +69,7 @@
 
 https://secure1.securityspace.com/smysecure/catid.html?in=FEDORA-2009-7335
 
-Risk factor : High";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/fcore_2009_7701.nasl
===================================================================
--- trunk/openvas-plugins/scripts/fcore_2009_7701.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/fcore_2009_7701.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,7 +30,7 @@
  script_id(64404);
  script_cve_id("CVE-2009-2334", "CVE-2009-2335", "CVE-2009-2336");
  script_version ("$");
- script_tag(name:"cvss_base", value:"5.0");
+ script_tag(name:"cvss_base", value:"4.9");
  script_tag(name:"risk_factor", value:"Medium");
  name = "Fedora Core 11 FEDORA-2009-7701 (wordpress)";
  script_name(name);
@@ -62,7 +62,7 @@
 
 https://secure1.securityspace.com/smysecure/catid.html?in=FEDORA-2009-7701
 
-Risk factor: Medium";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/fcore_2009_7729.nasl
===================================================================
--- trunk/openvas-plugins/scripts/fcore_2009_7729.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/fcore_2009_7729.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,7 +30,7 @@
  script_id(64407);
  script_cve_id("CVE-2009-2334", "CVE-2009-2335", "CVE-2009-2336");
  script_version ("$");
- script_tag(name:"cvss_base", value:"5.0");
+ script_tag(name:"cvss_base", value:"4.9");
  script_tag(name:"risk_factor", value:"Medium");
  name = "Fedora Core 10 FEDORA-2009-7729 (wordpress)";
  script_name(name);
@@ -59,7 +59,7 @@
 
 https://secure1.securityspace.com/smysecure/catid.html?in=FEDORA-2009-7729
 
-Risk factor: Medium";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/fcore_2009_7750.nasl
===================================================================
--- trunk/openvas-plugins/scripts/fcore_2009_7750.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/fcore_2009_7750.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,8 +30,8 @@
  script_id(64409);
  script_cve_id("CVE-2008-5249", "CVE-2008-5250", "CVE-2008-5252", "CVE-2008-5687", "CVE-2008-5688");
  script_version ("$");
- script_tag(name:"cvss_base", value:"5.8");
- script_tag(name:"risk_factor", value:"High");
+ script_tag(name:"cvss_base", value:"4.3");
+ script_tag(name:"risk_factor", value:"Medium");
  name = "Fedora Core 10 FEDORA-2009-7750 (mediawiki)";
  script_name(name);
 
@@ -77,7 +77,7 @@
 
 https://secure1.securityspace.com/smysecure/catid.html?in=FEDORA-2009-7750
 
-Risk factor : High";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/fcore_2009_8264.nasl
===================================================================
--- trunk/openvas-plugins/scripts/fcore_2009_8264.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/fcore_2009_8264.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,8 +30,8 @@
  script_id(64551);
  script_cve_id("CVE-2009-1895", "CVE-2009-2406", "CVE-2009-2407", "CVE-2009-1897", "CVE-2009-0065", "CVE-2008-5079");
  script_version ("$");
- script_tag(name:"cvss_base", value:"10.0");
- script_tag(name:"risk_factor", value:"Critical");
+ script_tag(name:"cvss_base", value:"7.2");
+ script_tag(name:"risk_factor", value:"High");
  script_name("Fedora Core 10 FEDORA-2009-8264 (kernel)");
 
  desc = "The remote host is missing an update to kernel
@@ -84,7 +84,7 @@
 
 https://secure1.securityspace.com/smysecure/catid.html?in=FEDORA-2009-8264
 
-Risk factor: Critical";
+Risk factor : High";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/fcore_2009_8329.nasl
===================================================================
--- trunk/openvas-plugins/scripts/fcore_2009_8329.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/fcore_2009_8329.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,8 +30,8 @@
  script_id(64613);
  script_cve_id("CVE-2009-0217", "CVE-2009-2475", "CVE-2009-2476", "CVE-2009-2625", "CVE-2009-2670", "CVE-2009-2671", "CVE-2009-2672", "CVE-2009-2673", "CVE-2009-2674", "CVE-2009-2675", "CVE-2009-2689", "CVE-2009-2690", "CVE-2009-1896");
  script_version ("$Revision$");
- script_tag(name:"cvss_base", value:"10.0");
- script_tag(name:"risk_factor", value:"Critical");
+ script_tag(name:"cvss_base", value:"5.0");
+ script_tag(name:"risk_factor", value:"Medium");
  script_name("Fedora Core 11 FEDORA-2009-8329 (java-1.6.0-openjdk)");
 
  desc = "The remote host is missing an update to java-1.6.0-openjdk
@@ -79,7 +79,7 @@
 
 https://secure1.securityspace.com/smysecure/catid.html?in=FEDORA-2009-8329
 
-Risk factor: Critical";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/fcore_2009_8337.nasl
===================================================================
--- trunk/openvas-plugins/scripts/fcore_2009_8337.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/fcore_2009_8337.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,8 +30,8 @@
  script_id(64615);
  script_cve_id("CVE-2009-0217", "CVE-2009-2475", "CVE-2009-2476", "CVE-2009-2625", "CVE-2009-2670", "CVE-2009-2671", "CVE-2009-2672", "CVE-2009-2673", "CVE-2009-2674", "CVE-2009-2675", "CVE-2009-2689", "CVE-2009-2690", "CVE-2009-1896");
  script_version ("$Revision$");
- script_tag(name:"cvss_base", value:"10.0");
- script_tag(name:"risk_factor", value:"Critical");
+ script_tag(name:"cvss_base", value:"5.0");
+ script_tag(name:"risk_factor", value:"Medium");
  script_name("Fedora Core 10 FEDORA-2009-8337 (java-1.6.0-openjdk)");
 
  desc = "The remote host is missing an update to java-1.6.0-openjdk
@@ -82,7 +82,7 @@
 
 https://secure1.securityspace.com/smysecure/catid.html?in=FEDORA-2009-8337
 
-Risk factor: Critical";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/fcore_2009_8491.nasl
===================================================================
--- trunk/openvas-plugins/scripts/fcore_2009_8491.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/fcore_2009_8491.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,8 +30,8 @@
  script_id(64625);
  script_cve_id("CVE-2009-2414", "CVE-2009-2416", "CVE-2008-4225", "CVE-2008-4226");
  script_version ("$Revision$");
- script_tag(name:"cvss_base", value:"10.0");
- script_tag(name:"risk_factor", value:"Critical");
+ script_tag(name:"cvss_base", value:"4.3");
+ script_tag(name:"risk_factor", value:"Medium");
  script_name("Fedora Core 10 FEDORA-2009-8491 (libxml2)");
 
  desc = "The remote host is missing an update to libxml2
@@ -67,7 +67,7 @@
 
 https://secure1.securityspace.com/smysecure/catid.html?in=FEDORA-2009-8491
 
-Risk factor: Critical";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/fcore_2009_8529.nasl
===================================================================
--- trunk/openvas-plugins/scripts/fcore_2009_8529.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/fcore_2009_8529.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,7 +30,7 @@
  script_id(64697);
  script_cve_id("CVE-2009-2334", "CVE-2009-2335", "CVE-2009-2336");
  script_version ("$");
- script_tag(name:"cvss_base", value:"5.0");
+ script_tag(name:"cvss_base", value:"4.9");
  script_tag(name:"risk_factor", value:"Medium");
  script_name("Fedora Core 11 FEDORA-2009-8529 (wordpress-mu)");
 
@@ -66,7 +66,7 @@
 
 https://secure1.securityspace.com/smysecure/catid.html?in=FEDORA-2009-8529
 
-Risk factor: Medium";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/fcore_2009_8538.nasl
===================================================================
--- trunk/openvas-plugins/scripts/fcore_2009_8538.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/fcore_2009_8538.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,7 +30,7 @@
  script_id(64699);
  script_cve_id("CVE-2009-2334", "CVE-2009-1030", "CVE-2009-2335", "CVE-2009-2336");
  script_version ("$");
- script_tag(name:"cvss_base", value:"5.0");
+ script_tag(name:"cvss_base", value:"4.9");
  script_tag(name:"risk_factor", value:"Medium");
  script_name("Fedora Core 10 FEDORA-2009-8538 (wordpress-mu)");
 
@@ -70,7 +70,7 @@
 
 https://secure1.securityspace.com/smysecure/catid.html?in=FEDORA-2009-8538
 
-Risk factor: Medium";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/fcore_2009_8582.nasl
===================================================================
--- trunk/openvas-plugins/scripts/fcore_2009_8582.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/fcore_2009_8582.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,8 +30,8 @@
  script_id(64701);
  script_cve_id("CVE-2004-0110", "CVE-2004-0989", "CVE-2009-2414", "CVE-2009-2416", "CVE-2004-0110", "CVE-2004-0989");
  script_version ("$");
- script_tag(name:"cvss_base", value:"10.0");
- script_tag(name:"risk_factor", value:"Critical");
+ script_tag(name:"cvss_base", value:"7.5");
+ script_tag(name:"risk_factor", value:"High");
  script_name("Fedora Core 11 FEDORA-2009-8582 (libxml)");
 
  desc = "The remote host is missing an update to libxml
@@ -80,7 +80,7 @@
 
 https://secure1.securityspace.com/smysecure/catid.html?in=FEDORA-2009-8582
 
-Risk factor: Critical";
+Risk factor : High";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/fcore_2009_8594.nasl
===================================================================
--- trunk/openvas-plugins/scripts/fcore_2009_8594.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/fcore_2009_8594.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,8 +30,8 @@
  script_id(64702);
  script_cve_id("CVE-2004-0110", "CVE-2004-0989", "CVE-2009-2414", "CVE-2009-2416", "CVE-2004-0110", "CVE-2004-0989");
  script_version ("$");
- script_tag(name:"cvss_base", value:"10.0");
- script_tag(name:"risk_factor", value:"Critical");
+ script_tag(name:"cvss_base", value:"7.5");
+ script_tag(name:"risk_factor", value:"High");
  script_name("Fedora Core 10 FEDORA-2009-8594 (libxml)");
 
  desc = "The remote host is missing an update to libxml
@@ -81,7 +81,7 @@
 
 https://secure1.securityspace.com/smysecure/catid.html?in=FEDORA-2009-8594
 
-Risk factor: Critical";
+Risk factor : High";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/fcore_2009_8647.nasl
===================================================================
--- trunk/openvas-plugins/scripts/fcore_2009_8647.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/fcore_2009_8647.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,8 +30,8 @@
  script_id(64703);
  script_cve_id("CVE-2009-2692", "CVE-2009-2406", "CVE-2009-2407", "CVE-2009-1895", "CVE-2009-1897", "CVE-2009-0065", "CVE-2008-5079");
  script_version ("$");
- script_tag(name:"cvss_base", value:"10.0");
- script_tag(name:"risk_factor", value:"Critical");
+ script_tag(name:"cvss_base", value:"7.2");
+ script_tag(name:"risk_factor", value:"High");
  script_name("Fedora Core 10 FEDORA-2009-8647 (kernel)");
 
  desc = "The remote host is missing an update to kernel
@@ -69,7 +69,7 @@
 
 https://secure1.securityspace.com/smysecure/catid.html?in=FEDORA-2009-8647
 
-Risk factor: Critical";
+Risk factor : High";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/fcore_2009_8812.nasl
===================================================================
--- trunk/openvas-plugins/scripts/fcore_2009_8812.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/fcore_2009_8812.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,8 +30,8 @@
  script_id(64741);
  script_cve_id("CVE-2009-1891", "CVE-2009-1195", "CVE-2009-1890", "CVE-2009-1191");
  script_version ("$");
- script_tag(name:"cvss_base", value:"5.0");
- script_tag(name:"risk_factor", value:"Medium");
+ script_tag(name:"cvss_base", value:"7.1");
+ script_tag(name:"risk_factor", value:"High");
  script_name("Fedora Core 11 FEDORA-2009-8812 (httpd)");
 
  desc = "The remote host is missing an update to httpd
@@ -85,7 +85,7 @@
 
 https://secure1.securityspace.com/smysecure/catid.html?in=FEDORA-2009-8812
 
-Risk factor: Medium";
+Risk factor : High";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/fcore_2009_9044.nasl
===================================================================
--- trunk/openvas-plugins/scripts/fcore_2009_9044.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/fcore_2009_9044.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,8 +30,8 @@
  script_id(64736);
  script_cve_id("CVE-2009-2691", "CVE-2009-2848", "CVE-2009-2849", "CVE-2009-2847", "CVE-2009-2695", "CVE-2009-2767", "CVE-2009-2692", "CVE-2009-1897", "CVE-2009-1895", "CVE-2009-2406", "CVE-2009-2407");
  script_version ("$");
- script_tag(name:"cvss_base", value:"7.2");
- script_tag(name:"risk_factor", value:"High");
+ script_tag(name:"cvss_base", value:"2.1");
+ script_tag(name:"risk_factor", value:"Medium");
  script_name("Fedora Core 11 FEDORA-2009-9044 (kernel)");
 
  desc = "The remote host is missing an update to kernel
@@ -87,7 +87,7 @@
 
 https://secure1.securityspace.com/smysecure/catid.html?in=FEDORA-2009-9044
 
-Risk factor : High";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/fcore_2009_9231.nasl
===================================================================
--- trunk/openvas-plugins/scripts/fcore_2009_9231.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/fcore_2009_9231.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,8 +30,8 @@
  script_id(64811);
  script_cve_id("CVE-2009-2700", "CVE-2009-1725");
  script_version ("$");
- script_tag(name:"cvss_base", value:"9.3");
- script_tag(name:"risk_factor", value:"Critical");
+ script_tag(name:"cvss_base", value:"6.8");
+ script_tag(name:"risk_factor", value:"High");
  script_name("Fedora Core 11 FEDORA-2009-9231 (qt)");
 
  desc = "The remote host is missing an update to qt
@@ -70,7 +70,7 @@
 
 https://secure1.securityspace.com/smysecure/catid.html?in=FEDORA-2009-9231
 
-Risk factor: Critical";
+Risk factor : High";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/fcore_2009_9232.nasl
===================================================================
--- trunk/openvas-plugins/scripts/fcore_2009_9232.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/fcore_2009_9232.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,8 +30,8 @@
  script_id(64812);
  script_cve_id("CVE-2009-2700", "CVE-2009-1725");
  script_version ("$");
- script_tag(name:"cvss_base", value:"9.3");
- script_tag(name:"risk_factor", value:"Critical");
+ script_tag(name:"cvss_base", value:"6.8");
+ script_tag(name:"risk_factor", value:"High");
  script_name("Fedora Core 10 FEDORA-2009-9232 (qt)");
 
  desc = "The remote host is missing an update to qt
@@ -70,7 +70,7 @@
 
 https://secure1.securityspace.com/smysecure/catid.html?in=FEDORA-2009-9232
 
-Risk factor: Critical";
+Risk factor : High";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/fcore_2009_9374.nasl
===================================================================
--- trunk/openvas-plugins/scripts/fcore_2009_9374.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/fcore_2009_9374.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,8 +30,8 @@
  script_id(64967);
  script_cve_id("CVE-2009-0041", "CVE-2009-2726", "CVE-2009-0871", "CVE-2009-2346");
  script_version ("$");
- script_tag(name:"cvss_base", value:"7.8");
- script_tag(name:"risk_factor", value:"High");
+ script_tag(name:"cvss_base", value:"5.0");
+ script_tag(name:"risk_factor", value:"Medium");
  script_name("Fedora Core 10 FEDORA-2009-9374 (asterisk)");
 
  desc = "The remote host is missing an update to asterisk
@@ -65,7 +65,7 @@
 
 https://secure1.securityspace.com/smysecure/catid.html?in=FEDORA-2009-9374
 
-Risk factor : High";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/fcore_2009_9391.nasl
===================================================================
--- trunk/openvas-plugins/scripts/fcore_2009_9391.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/fcore_2009_9391.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,8 +30,8 @@
  script_id(64844);
  script_cve_id("CVE-2009-2702", "CVE-2009-2537", "CVE-2009-1725", "CVE-2009-1690", "CVE-2009-1687", "CVE-2009-1698");
  script_version ("$");
- script_tag(name:"cvss_base", value:"9.3");
- script_tag(name:"risk_factor", value:"Critical");
+ script_tag(name:"cvss_base", value:"7.5");
+ script_tag(name:"risk_factor", value:"High");
  script_name("Fedora Core 11 FEDORA-2009-9391 (kdelibs3)");
 
  desc = "The remote host is missing an update to kdelibs3
@@ -62,7 +62,7 @@
 
 https://secure1.securityspace.com/smysecure/catid.html?in=FEDORA-2009-9391
 
-Risk factor: Critical";
+Risk factor : High";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/fcore_2009_9400.nasl
===================================================================
--- trunk/openvas-plugins/scripts/fcore_2009_9400.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/fcore_2009_9400.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,8 +30,8 @@
  script_id(64845);
  script_cve_id("CVE-2009-2702", "CVE-2009-2537", "CVE-2009-1725", "CVE-2009-1690", "CVE-2009-1687", "CVE-2009-1698");
  script_version ("$");
- script_tag(name:"cvss_base", value:"9.3");
- script_tag(name:"risk_factor", value:"Critical");
+ script_tag(name:"cvss_base", value:"7.5");
+ script_tag(name:"risk_factor", value:"High");
  script_name("Fedora Core 10 FEDORA-2009-9400 (kdelibs3)");
 
  desc = "The remote host is missing an update to kdelibs3
@@ -62,7 +62,7 @@
 
 https://secure1.securityspace.com/smysecure/catid.html?in=FEDORA-2009-9400
 
-Risk factor: Critical";
+Risk factor : High";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/fcore_2009_9405.nasl
===================================================================
--- trunk/openvas-plugins/scripts/fcore_2009_9405.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/fcore_2009_9405.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,8 +30,8 @@
  script_id(64970);
  script_cve_id("CVE-2009-2651", "CVE-2009-2346");
  script_version ("$");
- script_tag(name:"cvss_base", value:"7.8");
- script_tag(name:"risk_factor", value:"High");
+ script_tag(name:"cvss_base", value:"5.0");
+ script_tag(name:"risk_factor", value:"Medium");
  script_name("Fedora Core 11 FEDORA-2009-9405 (asterisk)");
 
  desc = "The remote host is missing an update to asterisk
@@ -62,7 +62,7 @@
 
 https://secure1.securityspace.com/smysecure/catid.html?in=FEDORA-2009-9405
 
-Risk factor : High";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/fcore_2009_9474.nasl
===================================================================
--- trunk/openvas-plugins/scripts/fcore_2009_9474.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/fcore_2009_9474.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,8 +30,8 @@
  script_id(64851);
  script_cve_id("CVE-2009-0922", "CVE-2007-6600");
  script_version ("$");
- script_tag(name:"cvss_base", value:"6.5");
- script_tag(name:"risk_factor", value:"High");
+ script_tag(name:"cvss_base", value:"4.0");
+ script_tag(name:"risk_factor", value:"Medium");
  script_name("Fedora Core 10 FEDORA-2009-9474 (postgresql)");
 
  desc = "The remote host is missing an update to postgresql
@@ -71,7 +71,7 @@
 
 https://secure1.securityspace.com/smysecure/catid.html?in=FEDORA-2009-9474
 
-Risk factor : High";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/fcore_2009_9837.nasl
===================================================================
--- trunk/openvas-plugins/scripts/fcore_2009_9837.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/fcore_2009_9837.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,8 +30,8 @@
  script_id(66186);
  script_cve_id("CVE-2009-2559", "CVE-2009-2560", "CVE-2009-2561", "CVE-2009-2562", "CVE-2009-2563", "CVE-2009-3241", "CVE-2009-3242");
  script_version ("$Revision$");
- script_tag(name:"cvss_base", value:"7.8");
- script_tag(name:"risk_factor", value:"High");
+ script_tag(name:"cvss_base", value:"5.0");
+ script_tag(name:"risk_factor", value:"Medium");
  script_name("Fedora Core 11 FEDORA-2009-9837 (wireshark)");
 
  desc = "The remote host is missing an update to wireshark
@@ -77,7 +77,7 @@
 
 https://secure1.securityspace.com/smysecure/catid.html?in=FEDORA-2009-9837
 
-Risk factor : High";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/fishcart_sql_injection.nasl
===================================================================
--- trunk/openvas-plugins/scripts/fishcart_sql_injection.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/fishcart_sql_injection.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -32,8 +32,8 @@
  script_cve_id("CVE-2005-1486", "CVE-2005-1487");
  script_bugtraq_id(13499);
  script_version("$Revision$");
- script_tag(name:"cvss_base", value:"7.5");
- script_tag(name:"risk_factor", value:"High");
+ script_tag(name:"cvss_base", value:"5.0");
+ script_tag(name:"risk_factor", value:"Medium");
 
  name = "FishCart SQL injections";
 
@@ -51,7 +51,7 @@
 
 In addition, the program suffers from cross site scripting vulnerabilities.
 
-Risk factor: High";
+Risk factor : Medium";
 
  script_description(desc);
  

Modified: trunk/openvas-plugins/scripts/freebsd_ImageMagick6.nasl
===================================================================
--- trunk/openvas-plugins/scripts/freebsd_ImageMagick6.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/freebsd_ImageMagick6.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,8 +30,8 @@
  script_id(58785);
  script_cve_id("CVE-2007-4985", "CVE-2007-4986", "CVE-2007-4987", "CVE-2007-4988");
  script_version ("$");
- script_tag(name:"cvss_base", value:"9.3");
- script_tag(name:"risk_factor", value:"Critical");
+ script_tag(name:"cvss_base", value:"4.3");
+ script_tag(name:"risk_factor", value:"Medium");
  name = "FreeBSD Ports: ImageMagick, ImageMagick-nox11";
  script_name(name);
 
@@ -51,7 +51,7 @@
 http://studio.imagemagick.org/pipermail/magick-announce/2007-September/000037.html
 http://www.vuxml.org/freebsd/f5b29ec0-71f9-11dc-8c6a-00304881ac9a.html
 
-Risk factor: Critical";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/freebsd_apache-tomcat0.nasl
===================================================================
--- trunk/openvas-plugins/scripts/freebsd_apache-tomcat0.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/freebsd_apache-tomcat0.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,7 +30,7 @@
  script_id(58826);
  script_cve_id("CVE-2005-2090", "CVE-2007-0450", "CVE-2007-1358");
  script_version ("$");
- script_tag(name:"cvss_base", value:"5.0");
+ script_tag(name:"cvss_base", value:"4.3");
  script_tag(name:"risk_factor", value:"Medium");
  name = "FreeBSD Ports: apache-tomcat";
  script_name(name);
@@ -58,7 +58,7 @@
 software upgrades.
 
 
-Risk factor: Medium";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/freebsd_apache13.nasl
===================================================================
--- trunk/openvas-plugins/scripts/freebsd_apache13.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/freebsd_apache13.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,7 +30,7 @@
  script_id(61185);
  script_cve_id("CVE-2007-6420", "CVE-2008-2364");
  script_version ("$");
- script_tag(name:"cvss_base", value:"5.0");
+ script_tag(name:"cvss_base", value:"4.3");
  script_tag(name:"risk_factor", value:"Medium");
  name = "FreeBSD Ports: apache";
  script_name(name);
@@ -58,7 +58,7 @@
 http://www.apache.org/dist/httpd/Announcement2.2.html
 http://www.vuxml.org/freebsd/c84dc9ad-41f7-11dd-a4f9-00163e000016.html
 
-Risk factor: Medium";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/freebsd_apache15.nasl
===================================================================
--- trunk/openvas-plugins/scripts/freebsd_apache15.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/freebsd_apache15.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -31,7 +31,7 @@
  script_id(64783);
  script_cve_id("CVE-2009-1891", "CVE-2009-1195", "CVE-2009-1890", "CVE-2009-1191", "CVE-2009-0023", "CVE-2009-1955", "CVE-2009-1956");
  script_version ("$");
- script_tag(name:"cvss_base", value:"6.4");
+ script_tag(name:"cvss_base", value:"7.1");
  script_tag(name:"risk_factor", value:"High");
  script_name("FreeBSD Ports: apache");
 

Modified: trunk/openvas-plugins/scripts/freebsd_apr.nasl
===================================================================
--- trunk/openvas-plugins/scripts/freebsd_apr.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/freebsd_apr.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -32,7 +32,7 @@
  script_cve_id("CVE-2009-1955", "CVE-2009-1956", "CVE-2009-0023");
  script_bugtraq_id(35221);
  script_version ("$");
- script_tag(name:"cvss_base", value:"6.4");
+ script_tag(name:"cvss_base", value:"7.8");
  script_tag(name:"risk_factor", value:"High");
  name = "FreeBSD Ports: apr";
  script_name(name);

Modified: trunk/openvas-plugins/scripts/freebsd_awstats.nasl
===================================================================
--- trunk/openvas-plugins/scripts/freebsd_awstats.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/freebsd_awstats.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -31,8 +31,8 @@
  script_cve_id("CVE-2005-0362", "CVE-2005-0363", "CVE-2005-0435", "CVE-2005-0436", "CVE-2005-0437", "CVE-2005-0438");
  script_bugtraq_id(12543,12545);
  script_version ("$");
- script_tag(name:"cvss_base", value:"7.5");
- script_tag(name:"risk_factor", value:"High");
+ script_tag(name:"cvss_base", value:"4.6");
+ script_tag(name:"risk_factor", value:"Medium");
  name = "FreeBSD Ports: awstats";
  script_name(name);
 
@@ -79,7 +79,7 @@
 http://marc.theaimsgroup.com/?l=bugtraq&m=110840530924124
 http://www.vuxml.org/freebsd/fdad8a87-7f94-11d9-a9e7-0001020eed82.html
 
-Risk factor : High";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/freebsd_bugzilla11.nasl
===================================================================
--- trunk/openvas-plugins/scripts/freebsd_bugzilla11.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/freebsd_bugzilla11.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -29,9 +29,9 @@
 if(description)
 {
  script_id(68000);
- script_tag(name:"cvss_base", value:"6.5");
+ script_tag(name:"cvss_base", value:"5.0");
  script_cve_id("CVE-2010-2756", "CVE-2010-2757", "CVE-2010-2758", "CVE-2010-2759");
- script_tag(name:"risk_factor", value:"High");
+ script_tag(name:"risk_factor", value:"Medium");
  script_version ("$Revision$");
  script_name("FreeBSD Ports: bugzilla");
 
@@ -78,7 +78,7 @@
 https://bugzilla.mozilla.org/show_bug.cgi?id=583690
 http://www.vuxml.org/freebsd/8cbf4d65-af9a-11df-89b8-00151735203a.html
 
-Risk factor : High";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/freebsd_bugzilla12.nasl
===================================================================
--- trunk/openvas-plugins/scripts/freebsd_bugzilla12.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/freebsd_bugzilla12.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -29,10 +29,10 @@
 if(description)
 {
  script_id(68959);
- script_tag(name:"cvss_base", value:"9.3");
+ script_tag(name:"cvss_base", value:"7.5");
  script_cve_id("CVE-2010-4568", "CVE-2010-2761", "CVE-2010-4411", "CVE-2010-4572", "CVE-2010-4567", "CVE-2010-0048", "CVE-2011-0046");
  script_bugtraq_id(25425);
- script_tag(name:"risk_factor", value:"Critical");
+ script_tag(name:"risk_factor", value:"High");
  script_version ("$Revision$");
  script_name("FreeBSD Ports: bugzilla");
 
@@ -107,7 +107,7 @@
 https://bugzilla.mozilla.org/show_bug.cgi?id=621110
 http://www.vuxml.org/freebsd/c8c927e5-2891-11e0-8f26-00151735203a.html
 
-Risk factor : Critical";
+Risk factor : High";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/freebsd_bugzilla2.nasl
===================================================================
--- trunk/openvas-plugins/scripts/freebsd_bugzilla2.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/freebsd_bugzilla2.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,7 +30,7 @@
  script_id(57578);
  script_cve_id("CVE-2006-5453", "CVE-2006-5454", "CVE-2006-5455");
  script_version ("$");
- script_tag(name:"cvss_base", value:"5.0");
+ script_tag(name:"cvss_base", value:"3.5");
  script_tag(name:"risk_factor", value:"Medium");
  name = "FreeBSD Ports: bugzilla, ja-bugzilla";
  script_name(name);
@@ -69,7 +69,7 @@
 http://www.bugzilla.org/security/2.18.5/
 http://www.vuxml.org/freebsd/6d68618a-7199-11db-a2ad-000c6ec775d9.html
 
-Risk factor: Medium";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/freebsd_bzip2.nasl
===================================================================
--- trunk/openvas-plugins/scripts/freebsd_bzip2.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/freebsd_bzip2.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,7 +30,7 @@
  script_id(53972);
  script_cve_id("CVE-2005-0953", "CVE-2005-1260");
  script_version ("$");
- script_tag(name:"cvss_base", value:"5.0");
+ script_tag(name:"cvss_base", value:"3.7");
  script_tag(name:"risk_factor", value:"Medium");
  name = "FreeBSD Ports: bzip2";
  script_name(name);
@@ -56,7 +56,7 @@
 software upgrades.
 
 
-Risk factor: Medium";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/freebsd_cacti.nasl
===================================================================
--- trunk/openvas-plugins/scripts/freebsd_cacti.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/freebsd_cacti.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -31,8 +31,8 @@
  script_bugtraq_id(10960);
  script_cve_id("CVE-2004-1736", "CVE-2004-1737");
  script_version ("$");
- script_tag(name:"cvss_base", value:"7.5");
- script_tag(name:"risk_factor", value:"High");
+ script_tag(name:"cvss_base", value:"5.0");
+ script_tag(name:"risk_factor", value:"Medium");
  name = "FreeBSD Ports: cacti";
  script_name(name);
 
@@ -54,7 +54,7 @@
 http://marc.theaimsgroup.com/?l=full-disclosure&m=109269427427368
 http://www.vuxml.org/freebsd/ca543e06-207a-11d9-814e-0001020eed82.html
 
-Risk factor : High";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/freebsd_clamav12.nasl
===================================================================
--- trunk/openvas-plugins/scripts/freebsd_clamav12.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/freebsd_clamav12.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,8 +30,8 @@
  script_id(58839);
  script_cve_id("CVE-2007-2650", "CVE-2007-3023", "CVE-2007-3024", "CVE-2007-3122", "CVE-2007-3123");
  script_version ("$");
- script_tag(name:"cvss_base", value:"10.0");
- script_tag(name:"risk_factor", value:"Critical");
+ script_tag(name:"cvss_base", value:"5.0");
+ script_tag(name:"risk_factor", value:"Medium");
  name = "FreeBSD Ports: clamav";
  script_name(name);
 
@@ -49,7 +49,7 @@
 http://news.gmane.org/gmane.comp.security.virus.clamav.devel/cutoff=2853
 http://www.vuxml.org/freebsd/903654bd-1927-11dc-b8a0-02e0185f8d72.html
 
-Risk factor: Critical";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/freebsd_clamav4.nasl
===================================================================
--- trunk/openvas-plugins/scripts/freebsd_clamav4.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/freebsd_clamav4.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,8 +30,8 @@
  script_id(55418);
  script_cve_id("CVE-2005-2919", "CVE-2005-2920");
  script_version ("$");
- script_tag(name:"cvss_base", value:"7.5");
- script_tag(name:"risk_factor", value:"High");
+ script_tag(name:"cvss_base", value:"5.0");
+ script_tag(name:"risk_factor", value:"Medium");
  name = "FreeBSD Ports: clamav";
  script_name(name);
 
@@ -59,7 +59,7 @@
 http://www.gentoo.org/security/en/glsa/glsa-200509-13.xml
 http://www.vuxml.org/freebsd/271498a9-2cd4-11da-a263-0001020eed82.html
 
-Risk factor : High";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/freebsd_clamav6.nasl
===================================================================
--- trunk/openvas-plugins/scripts/freebsd_clamav6.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/freebsd_clamav6.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,8 +30,8 @@
  script_id(56515);
  script_cve_id("CVE-2006-1614", "CVE-2006-1615", "CVE-2006-1630");
  script_version ("$");
- script_tag(name:"cvss_base", value:"10.0");
- script_tag(name:"risk_factor", value:"Critical");
+ script_tag(name:"cvss_base", value:"5.1");
+ script_tag(name:"risk_factor", value:"High");
  name = "FreeBSD Ports: clamav";
  script_name(name);
 
@@ -69,7 +69,7 @@
 http://www.us.debian.org/security/2006/dsa-1024
 http://www.vuxml.org/freebsd/6a5174bd-c580-11da-9110-00123ffe8333.html
 
-Risk factor: Critical";
+Risk factor : High";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/freebsd_coppermine4.nasl
===================================================================
--- trunk/openvas-plugins/scripts/freebsd_coppermine4.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/freebsd_coppermine4.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,7 +30,7 @@
  script_id(60453);
  script_cve_id("CVE-2008-0504", "CVE-2008-0505", "CVE-2008-0506");
  script_version ("$");
- script_tag(name:"cvss_base", value:"6.8");
+ script_tag(name:"cvss_base", value:"6.5");
  script_tag(name:"risk_factor", value:"High");
  name = "FreeBSD Ports: coppermine";
  script_name(name);

Modified: trunk/openvas-plugins/scripts/freebsd_cups-base3.nasl
===================================================================
--- trunk/openvas-plugins/scripts/freebsd_cups-base3.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/freebsd_cups-base3.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -31,8 +31,8 @@
  script_cve_id("CVE-2007-4352", "CVE-2007-5392", "CVE-2007-5393");
  script_bugtraq_id(26367);
  script_version ("$");
- script_tag(name:"cvss_base", value:"9.3");
- script_tag(name:"risk_factor", value:"Critical");
+ script_tag(name:"cvss_base", value:"7.6");
+ script_tag(name:"risk_factor", value:"High");
  name = "FreeBSD Ports: cups-base";
  script_name(name);
 
@@ -54,7 +54,7 @@
 software upgrades.
 
 
-Risk factor: Critical";
+Risk factor : High";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/freebsd_cups-base6.nasl
===================================================================
--- trunk/openvas-plugins/scripts/freebsd_cups-base6.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/freebsd_cups-base6.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -31,8 +31,8 @@
  script_id(61805);
  script_cve_id("CVE-2008-3639", "CVE-2008-3640", "CVE-2008-3641");
  script_version ("$");
- script_tag(name:"cvss_base", value:"10.0");
- script_tag(name:"risk_factor", value:"Critical");
+ script_tag(name:"cvss_base", value:"7.5");
+ script_tag(name:"risk_factor", value:"High");
  name = "FreeBSD Ports: cups-base";
  script_name(name);
 
@@ -62,7 +62,7 @@
 software upgrades.
 
 
-Risk factor: Critical";
+Risk factor : High";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/freebsd_cups-base7.nasl
===================================================================
--- trunk/openvas-plugins/scripts/freebsd_cups-base7.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/freebsd_cups-base7.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -31,8 +31,8 @@
  script_id(61957);
  script_cve_id("CVE-2008-1722", "CVE-2008-5184");
  script_version ("$");
- script_tag(name:"cvss_base", value:"10.0");
- script_tag(name:"risk_factor", value:"Critical");
+ script_tag(name:"cvss_base", value:"4.3");
+ script_tag(name:"risk_factor", value:"Medium");
  name = "FreeBSD Ports: cups-base";
  script_name(name);
 
@@ -62,7 +62,7 @@
 http://www.cups.org/str.php?L2974
 http://www.vuxml.org/freebsd/87106b67-be13-11dd-a578-0030843d3802.html
 
-Risk factor: Critical";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/freebsd_cups-lpr.nasl
===================================================================
--- trunk/openvas-plugins/scripts/freebsd_cups-lpr.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/freebsd_cups-lpr.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -31,7 +31,7 @@
  script_cve_id("CVE-2004-1268", "CVE-2004-1269", "CVE-2004-1270");
  script_bugtraq_id(12007,12004);
  script_version ("$");
- script_tag(name:"cvss_base", value:"5.0");
+ script_tag(name:"cvss_base", value:"2.1");
  script_tag(name:"risk_factor", value:"Medium");
  name = "FreeBSD Ports: cups-lpr, fr-cups-lpr";
  script_name(name);
@@ -68,7 +68,7 @@
 http://tigger.uic.edu/~jlongs2/holes/cups2.txt
 http://www.vuxml.org/freebsd/7850a238-680a-11d9-a9e7-0001020eed82.html
 
-Risk factor: Medium";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/freebsd_cvs+ipv60.nasl
===================================================================
--- trunk/openvas-plugins/scripts/freebsd_cvs+ipv60.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/freebsd_cvs+ipv60.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,7 +30,7 @@
  script_id(52469);
  script_cve_id("CVE-2004-0180", "CVE-2004-0405");
  script_version ("$");
- script_tag(name:"cvss_base", value:"5.0");
+ script_tag(name:"cvss_base", value:"2.6");
  script_tag(name:"risk_factor", value:"Medium");
  name = "FreeBSD Ports: cvs+ipv6";
  script_name(name);
@@ -58,7 +58,7 @@
 http://ccvs.cvshome.org/servlets/NewsItemView?newsID=102
 http://www.vuxml.org/freebsd/0792e7a7-8e37-11d8-90d1-0020ed76ef5a.html
 
-Risk factor: Medium";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/freebsd_cyrus-sasl.nasl
===================================================================
--- trunk/openvas-plugins/scripts/freebsd_cyrus-sasl.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/freebsd_cyrus-sasl.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -31,7 +31,7 @@
  script_bugtraq_id(11347);
  script_cve_id("CVE-2004-0884", "CVE-2005-0373");
  script_version ("$");
- script_tag(name:"cvss_base", value:"7.5");
+ script_tag(name:"cvss_base", value:"7.2");
  script_tag(name:"risk_factor", value:"High");
  name = "FreeBSD Ports: cyrus-sasl";
  script_name(name);

Modified: trunk/openvas-plugins/scripts/freebsd_dokuwiki2.nasl
===================================================================
--- trunk/openvas-plugins/scripts/freebsd_dokuwiki2.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/freebsd_dokuwiki2.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,8 +30,8 @@
  script_id(57472);
  script_cve_id("CVE-2006-5098", "CVE-2006-5099");
  script_version ("$");
- script_tag(name:"cvss_base", value:"7.5");
- script_tag(name:"risk_factor", value:"High");
+ script_tag(name:"cvss_base", value:"5.0");
+ script_tag(name:"risk_factor", value:"Medium");
  name = "FreeBSD Ports: dokuwiki";
  script_name(name);
 
@@ -51,7 +51,7 @@
 http://bugs.splitbrain.org/?do=details&id=926
 http://www.vuxml.org/freebsd/450b76ee-5068-11db-a5ae-00508d6a62df.html
 
-Risk factor : High";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/freebsd_drupal40.nasl
===================================================================
--- trunk/openvas-plugins/scripts/freebsd_drupal40.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/freebsd_drupal40.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,8 +30,8 @@
  script_id(58778);
  script_cve_id("CVE-2007-5597", "CVE-2007-5596", "CVE-2007-5595", "CVE-2007-5594", "CVE-2007-5593");
  script_version ("$");
- script_tag(name:"cvss_base", value:"6.8");
- script_tag(name:"risk_factor", value:"High");
+ script_tag(name:"cvss_base", value:"4.3");
+ script_tag(name:"risk_factor", value:"Medium");
  name = "FreeBSD Ports: drupal4";
  script_name(name);
 
@@ -60,7 +60,7 @@
 http://secunia.com/advisories/27290
 http://www.vuxml.org/freebsd/9c00d446-8208-11dc-9283-0016179b2dd5.html
 
-Risk factor : High";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/freebsd_egroupware.nasl
===================================================================
--- trunk/openvas-plugins/scripts/freebsd_egroupware.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/freebsd_egroupware.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,7 +30,7 @@
  script_id(54425);
  script_cve_id("CVE-2005-1202", "CVE-2005-1203");
  script_version ("$");
- script_tag(name:"cvss_base", value:"7.5");
+ script_tag(name:"cvss_base", value:"6.8");
  script_tag(name:"risk_factor", value:"High");
  name = "FreeBSD Ports: egroupware";
  script_name(name);

Modified: trunk/openvas-plugins/scripts/freebsd_enscript-a4.nasl
===================================================================
--- trunk/openvas-plugins/scripts/freebsd_enscript-a4.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/freebsd_enscript-a4.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,8 +30,8 @@
  script_id(52193);
  script_cve_id("CVE-2004-1184", "CVE-2004-1185", "CVE-2004-1186");
  script_version ("$");
- script_tag(name:"cvss_base", value:"7.5");
- script_tag(name:"risk_factor", value:"High");
+ script_tag(name:"cvss_base", value:"4.6");
+ script_tag(name:"risk_factor", value:"Medium");
  name = "FreeBSD Ports: enscript-a4, enscript-letter, enscript-letterdj";
  script_name(name);
 
@@ -63,7 +63,7 @@
 http://www.gentoo.org/security/en/glsa/glsa-200502-03.xml
 http://www.vuxml.org/freebsd/72da8af6-7c75-11d9-8cc5-000854d03344.html
 
-Risk factor : High";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/freebsd_enscript-a40.nasl
===================================================================
--- trunk/openvas-plugins/scripts/freebsd_enscript-a40.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/freebsd_enscript-a40.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -31,8 +31,8 @@
  script_id(61920);
  script_cve_id("CVE-2008-3863", "CVE-2008-4306");
  script_version ("$");
- script_tag(name:"cvss_base", value:"9.3");
- script_tag(name:"risk_factor", value:"Critical");
+ script_tag(name:"cvss_base", value:"7.6");
+ script_tag(name:"risk_factor", value:"High");
  name = "FreeBSD Ports: enscript-a4, enscript-letter, enscript-letterdj";
  script_name(name);
 
@@ -62,7 +62,7 @@
 http://secunia.com/secunia_research/2008-41/
 http://www.vuxml.org/freebsd/a1126054-b57c-11dd-8892-0017319806e7.html
 
-Risk factor: Critical";
+Risk factor : High";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/freebsd_ethereal0.nasl
===================================================================
--- trunk/openvas-plugins/scripts/freebsd_ethereal0.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/freebsd_ethereal0.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -31,8 +31,8 @@
  script_cve_id("CVE-2005-0006", "CVE-2005-0007", "CVE-2005-0008", "CVE-2005-0009", "CVE-2005-0010", "CVE-2005-0084");
  script_bugtraq_id(12326);
  script_version ("$");
- script_tag(name:"cvss_base", value:"7.5");
- script_tag(name:"risk_factor", value:"High");
+ script_tag(name:"cvss_base", value:"5.0");
+ script_tag(name:"risk_factor", value:"Medium");
  name = "FreeBSD Ports: ethereal, ethereal-lite, tethereal, tethereal-lite";
  script_name(name);
 
@@ -80,7 +80,7 @@
 http://www.ethereal.com/appnotes/enpa-sa-00017.html
 http://www.vuxml.org/freebsd/831a6a66-79fa-11d9-a9e7-0001020eed82.html
 
-Risk factor : High";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/freebsd_ethereal3.nasl
===================================================================
--- trunk/openvas-plugins/scripts/freebsd_ethereal3.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/freebsd_ethereal3.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -31,8 +31,8 @@
  script_cve_id("CVE-2004-0504", "CVE-2004-0505", "CVE-2004-0506", "CVE-2004-0507");
  script_bugtraq_id(10347);
  script_version ("$");
- script_tag(name:"cvss_base", value:"10.0");
- script_tag(name:"risk_factor", value:"Critical");
+ script_tag(name:"cvss_base", value:"5.0");
+ script_tag(name:"risk_factor", value:"Medium");
  name = "FreeBSD Ports: ethereal, ethereal-lite, tethereal, tethereal-lite";
  script_name(name);
 
@@ -75,7 +75,7 @@
 http://www.osvdb.org/6134
 http://www.vuxml.org/freebsd/74d06b67-d2cf-11d8-b479-02e0185c0b53.html
 
-Risk factor: Critical";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/freebsd_ethereal5.nasl
===================================================================
--- trunk/openvas-plugins/scripts/freebsd_ethereal5.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/freebsd_ethereal5.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -31,8 +31,8 @@
  script_cve_id("CVE-2005-1281", "CVE-2005-1456", "CVE-2005-1457", "CVE-2005-1458", "CVE-2005-1459", "CVE-2005-1460", "CVE-2005-1461", "CVE-2005-1462", "CVE-2005-1463", "CVE-2005-1464", "CVE-2005-1465", "CVE-2005-1466", "CVE-2005-1467", "CVE-2005-1468", "CVE-2005-1469", "CVE-2005-1470");
  script_bugtraq_id(13391,13504,13567);
  script_version ("$");
- script_tag(name:"cvss_base", value:"7.5");
- script_tag(name:"risk_factor", value:"High");
+ script_tag(name:"cvss_base", value:"5.0");
+ script_tag(name:"risk_factor", value:"Medium");
  name = "FreeBSD Ports: ethereal*, tethereal*";
  script_name(name);
 
@@ -56,7 +56,7 @@
 http://www.ethereal.com/appnotes/enpa-sa-00019.html
 http://www.vuxml.org/freebsd/76adaab0-e4e3-11d9-b875-0001020eed82.html
 
-Risk factor : High";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/freebsd_fcron.nasl
===================================================================
--- trunk/openvas-plugins/scripts/freebsd_fcron.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/freebsd_fcron.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,8 +30,8 @@
  script_id(52218);
  script_cve_id("CVE-2004-1030", "CVE-2004-1031", "CVE-2004-1032", "CVE-2004-1033");
  script_version ("$");
- script_tag(name:"cvss_base", value:"7.2");
- script_tag(name:"risk_factor", value:"High");
+ script_tag(name:"cvss_base", value:"2.1");
+ script_tag(name:"risk_factor", value:"Medium");
  name = "FreeBSD Ports: fcron";
  script_name(name);
 
@@ -74,7 +74,7 @@
 http://www.idefense.com/application/poi/display?id=157&type=vulnerabilities&flashstatus=false
 http://www.vuxml.org/freebsd/e480ccb2-6bc8-11d9-8dbe-000a95bc6fae.html
 
-Risk factor : High";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/freebsd_firefox18.nasl
===================================================================
--- trunk/openvas-plugins/scripts/freebsd_firefox18.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/freebsd_firefox18.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,8 +30,8 @@
  script_id(54365);
  script_cve_id("CVE-2005-1937", "CVE-2005-2260", "CVE-2005-2261", "CVE-2005-2262", "CVE-2005-2263", "CVE-2005-2264", "CVE-2005-2265", "CVE-2005-2266", "CVE-2005-2267", "CVE-2005-2268", "CVE-2005-2269", "CVE-2005-2270");
  script_version ("$");
- script_tag(name:"cvss_base", value:"7.5");
- script_tag(name:"risk_factor", value:"High");
+ script_tag(name:"cvss_base", value:"2.6");
+ script_tag(name:"risk_factor", value:"Medium");
  name = "FreeBSD Ports: firefox";
  script_name(name);
 
@@ -97,7 +97,7 @@
 http://www.mozilla.org/security/announce/mfsa2005-56.html
 http://www.vuxml.org/freebsd/5d72701a-f601-11d9-bcd1-02061b08fc24.html
 
-Risk factor : High";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/freebsd_firefox22.nasl
===================================================================
--- trunk/openvas-plugins/scripts/freebsd_firefox22.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/freebsd_firefox22.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,7 +30,7 @@
  script_id(56576);
  script_cve_id("CVE-2006-0749", "CVE-2006-1045", "CVE-2006-1529", "CVE-2006-1530", "CVE-2006-1531", "CVE-2006-1723", "CVE-2006-1724", "CVE-2006-1725", "CVE-2006-1726", "CVE-2006-1727", "CVE-2006-1728", "CVE-2006-1729", "CVE-2006-1730", "CVE-2006-1731", "CVE-2006-1732", "CVE-2006-1733", "CVE-2006-1734", "CVE-2006-1735", "CVE-2006-1736", "CVE-2006-1737", "CVE-2006-1738", "CVE-2006-1739", "CVE-2006-1740", "CVE-2006-1741", "CVE-2006-1742", "CVE-2006-1790");
  script_version ("$");
- script_tag(name:"cvss_base", value:"10.0");
+ script_tag(name:"cvss_base", value:"9.3");
  script_tag(name:"risk_factor", value:"Critical");
  name = "FreeBSD Ports: firefox";
  script_name(name);
@@ -75,7 +75,7 @@
 http://www.zerodayinitiative.com/advisories/ZDI-06-010.html
 http://www.vuxml.org/freebsd/84630f4a-cd8c-11da-b7b9-000c6ec775d9.html
 
-Risk factor: Critical";
+Risk factor : Critical";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/freebsd_firefox25.nasl
===================================================================
--- trunk/openvas-plugins/scripts/freebsd_firefox25.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/freebsd_firefox25.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,8 +30,8 @@
  script_id(57373);
  script_cve_id("CVE-2006-4253", "CVE-2006-4340", "CVE-2006-4565", "CVE-2006-4566", "CVE-2006-4567", "CVE-2006-4568", "CVE-2006-4569", "CVE-2006-4570", "CVE-2006-4571");
  script_version ("$");
- script_tag(name:"cvss_base", value:"10.0");
- script_tag(name:"risk_factor", value:"Critical");
+ script_tag(name:"cvss_base", value:"7.6");
+ script_tag(name:"risk_factor", value:"High");
  name = "FreeBSD Ports: firefox";
  script_name(name);
 
@@ -57,7 +57,7 @@
 http://www.mozilla.org/security/announce/2006/mfsa2006-64.html
 http://www.vuxml.org/freebsd/e6296105-449b-11db-ba89-000c6ec775d9.html
 
-Risk factor: Critical";
+Risk factor : High";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/freebsd_firefox26.nasl
===================================================================
--- trunk/openvas-plugins/scripts/freebsd_firefox26.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/freebsd_firefox26.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,8 +30,8 @@
  script_id(58054);
  script_cve_id("CVE-2006-6077", "CVE-2007-0008", "CVE-2007-0009", "CVE-2007-0775", "CVE-2007-0776", "CVE-2007-0777", "CVE-2007-0778", "CVE-2007-0779", "CVE-2007-0780", "CVE-2007-0800", "CVE-2007-0981", "CVE-2007-0995", "CVE-2007-1092");
  script_version ("$");
- script_tag(name:"cvss_base", value:"9.3");
- script_tag(name:"risk_factor", value:"Critical");
+ script_tag(name:"cvss_base", value:"5.0");
+ script_tag(name:"risk_factor", value:"Medium");
  name = "FreeBSD Ports: firefox";
  script_name(name);
 
@@ -59,7 +59,7 @@
 http://www.mozilla.org/security/announce/2007/mfsa2007-08.html
 http://www.vuxml.org/freebsd/12bd6ecf-c430-11db-95c5-000c6ec775d9.html
 
-Risk factor: Critical";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/freebsd_firefox29.nasl
===================================================================
--- trunk/openvas-plugins/scripts/freebsd_firefox29.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/freebsd_firefox29.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,8 +30,8 @@
  script_id(58830);
  script_cve_id("CVE-2007-3089", "CVE-2007-3734", "CVE-2007-3735", "CVE-2007-3737", "CVE-2007-3738");
  script_version ("$");
- script_tag(name:"cvss_base", value:"9.3");
- script_tag(name:"risk_factor", value:"Critical");
+ script_tag(name:"cvss_base", value:"4.3");
+ script_tag(name:"risk_factor", value:"Medium");
  name = "FreeBSD Ports: firefox";
  script_name(name);
 
@@ -68,7 +68,7 @@
 http://www.mozilla.org/security/announce/2007/mfsa2007-25.html
 http://www.vuxml.org/freebsd/e190ca65-3636-11dc-a697-000c6ec775d9.html
 
-Risk factor: Critical";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/freebsd_firefox32.nasl
===================================================================
--- trunk/openvas-plugins/scripts/freebsd_firefox32.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/freebsd_firefox32.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -31,8 +31,8 @@
  script_cve_id("CVE-2008-1241", "CVE-2008-1240", "CVE-2007-4879", "CVE-2008-1238", "CVE-2008-1236", "CVE-2008-1237", "CVE-2008-1233", "CVE-2008-1234", "CVE-2008-1235");
  script_bugtraq_id(28448);
  script_version ("$");
- script_tag(name:"cvss_base", value:"9.3");
- script_tag(name:"risk_factor", value:"Critical");
+ script_tag(name:"cvss_base", value:"4.3");
+ script_tag(name:"risk_factor", value:"Medium");
  name = "FreeBSD Ports: firefox";
  script_name(name);
 
@@ -55,7 +55,7 @@
 Update your system with the appropriate patches or
 software upgrades.
 
-Risk factor: Critical";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/freebsd_firefox33.nasl
===================================================================
--- trunk/openvas-plugins/scripts/freebsd_firefox33.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/freebsd_firefox33.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -31,8 +31,8 @@
  script_cve_id("CVE-2008-1237", "CVE-2008-1380");
  script_bugtraq_id(28818);
  script_version ("$");
- script_tag(name:"cvss_base", value:"9.3");
- script_tag(name:"risk_factor", value:"Critical");
+ script_tag(name:"cvss_base", value:"6.8");
+ script_tag(name:"risk_factor", value:"High");
  name = "FreeBSD Ports: firefox";
  script_name(name);
 
@@ -72,7 +72,7 @@
 http://www.mozilla.org/security/announce/2008/mfsa2008-20.html
 http://www.vuxml.org/freebsd/67bd39ba-12b5-11dd-bab7-0016179b2dd5.html
 
-Risk factor: Critical";
+Risk factor : High";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/freebsd_firefox35.nasl
===================================================================
--- trunk/openvas-plugins/scripts/freebsd_firefox35.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/freebsd_firefox35.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -31,7 +31,7 @@
  script_id(61874);
  script_cve_id("CVE-2008-0017", "CVE-2008-4582", "CVE-2008-5012", "CVE-2008-5013", "CVE-2008-5014", "CVE-2008-5015", "CVE-2008-5016", "CVE-2008-5017", "CVE-2008-5018", "CVE-2008-5019", "CVE-2008-5021", "CVE-2008-5022", "CVE-2008-5023", "CVE-2008-5024");
  script_version ("$");
- script_tag(name:"cvss_base", value:"10.0");
+ script_tag(name:"cvss_base", value:"9.3");
  script_tag(name:"risk_factor", value:"Critical");
  name = "FreeBSD Ports: firefox";
  script_name(name);
@@ -65,7 +65,7 @@
 http://www.mozilla.org/security/announce/2008/mfsa2008-58.html
 http://www.vuxml.org/freebsd/f29fea8f-b19f-11dd-a55e-00163e000016.html
 
-Risk factor: Critical";
+Risk factor : Critical";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/freebsd_firefox38.nasl
===================================================================
--- trunk/openvas-plugins/scripts/freebsd_firefox38.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/freebsd_firefox38.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -32,8 +32,8 @@
  script_cve_id("CVE-2009-1303", "CVE-2009-1306", "CVE-2009-1307", "CVE-2009-1308", "CVE-2009-1309", "CVE-2009-1312", "CVE-2009-1311", "CVE-2009-1302", "CVE-2009-1304", "CVE-2009-1305", "CVE-2009-1310");
  script_bugtraq_id(34656);
  script_version ("$");
- script_tag(name:"cvss_base", value:"6.8");
- script_tag(name:"risk_factor", value:"High");
+ script_tag(name:"cvss_base", value:"5.0");
+ script_tag(name:"risk_factor", value:"Medium");
  name = "FreeBSD Ports: firefox";
  script_name(name);
 
@@ -68,7 +68,7 @@
 http://www.mozilla.org/security/announce/2009/mfsa2009-14.html
 http://www.vuxml.org/freebsd/3b18e237-2f15-11de-9672-0030843d3802.html
 
-Risk factor : High";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/freebsd_firefox47.nasl
===================================================================
--- trunk/openvas-plugins/scripts/freebsd_firefox47.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/freebsd_firefox47.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -29,9 +29,9 @@
 if(description)
 {
  script_id(67654);
- script_tag(name:"cvss_base", value:"10.0");
+ script_tag(name:"cvss_base", value:"4.9");
  script_cve_id("CVE-2008-5913", "CVE-2010-0183", "CVE-2010-1121", "CVE-2010-1125", "CVE-2010-1197", "CVE-2010-1199", "CVE-2010-1196", "CVE-2010-1198", "CVE-2010-1200", "CVE-2010-1201", "CVE-2010-1202", "CVE-2010-1203");
- script_tag(name:"risk_factor", value:"Critical");
+ script_tag(name:"risk_factor", value:"Medium");
  script_version ("$Revision$");
  script_name("FreeBSD Ports: firefox");
 
@@ -62,7 +62,7 @@
 http://www.mozilla.org/security/announce/2010/mfsa2010-25.html
 http://www.vuxml.org/freebsd/99858b7c-7ece-11df-a007-000f20797ede.html
 
-Risk factor : Critical";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/freebsd_firefox49.nasl
===================================================================
--- trunk/openvas-plugins/scripts/freebsd_firefox49.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/freebsd_firefox49.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -29,9 +29,9 @@
 if(description)
 {
  script_id(67871);
- script_tag(name:"cvss_base", value:"9.3");
+ script_tag(name:"cvss_base", value:"4.3");
  script_cve_id("CVE-2010-0654", "CVE-2010-1205", "CVE-2010-1206", "CVE-2010-1207", "CVE-2010-1208", "CVE-2010-1209", "CVE-2010-1210", "CVE-2010-1211", "CVE-2010-1212", "CVE-2010-1213", "CVE-2010-1214", "CVE-2010-1215", "CVE-2010-2751", "CVE-2010-2752", "CVE-2010-2753", "CVE-2010-2754");
- script_tag(name:"risk_factor", value:"Critical");
+ script_tag(name:"risk_factor", value:"Medium");
  script_version ("$Revision$");
  script_name("FreeBSD Ports: firefox");
 
@@ -65,7 +65,7 @@
 http://www.mozilla.org/security/announce/2010/mfsa2010-47.html
 http://www.vuxml.org/freebsd/8c2ea875-9499-11df-8e32-000f20797ede.html
 
-Risk factor : Critical";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/freebsd_firefox50.nasl
===================================================================
--- trunk/openvas-plugins/scripts/freebsd_firefox50.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/freebsd_firefox50.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -29,9 +29,9 @@
 if(description)
 {
  script_id(67994);
- script_tag(name:"cvss_base", value:"9.3");
+ script_tag(name:"cvss_base", value:"6.8");
  script_cve_id("CVE-2010-2762", "CVE-2010-2763", "CVE-2010-2764", "CVE-2010-2765", "CVE-2010-2766", "CVE-2010-2767", "CVE-2010-2768", "CVE-2010-2769", "CVE-2010-2770", "CVE-2010-2760", "CVE-2010-3131", "CVE-2010-3166", "CVE-2010-3167", "CVE-2010-3168", "CVE-2010-3169");
- script_tag(name:"risk_factor", value:"Critical");
+ script_tag(name:"risk_factor", value:"High");
  script_version ("$Revision$");
  script_name("FreeBSD Ports: firefox");
 
@@ -66,7 +66,7 @@
 http://www.mozilla.org/security/announce/2010/mfsa2010-63.html
 http://www.vuxml.org/freebsd/4a21ce2c-bb13-11df-8e32-000f20797ede.html
 
-Risk factor : Critical";
+Risk factor : High";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/freebsd_firefox52.nasl
===================================================================
--- trunk/openvas-plugins/scripts/freebsd_firefox52.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/freebsd_firefox52.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -29,9 +29,9 @@
 if(description)
 {
  script_id(68512);
- script_tag(name:"cvss_base", value:"9.3");
+ script_tag(name:"cvss_base", value:"4.3");
  script_cve_id("CVE-2010-3170", "CVE-2010-3173", "CVE-2010-3174", "CVE-2010-3175", "CVE-2010-3176", "CVE-2010-3177", "CVE-2010-3178", "CVE-2010-3179", "CVE-2010-3180", "CVE-2010-3181", "CVE-2010-3182", "CVE-2010-3183");
- script_tag(name:"risk_factor", value:"Critical");
+ script_tag(name:"risk_factor", value:"Medium");
  script_version ("$Revision$");
  script_name("FreeBSD Ports: firefox");
 
@@ -64,7 +64,7 @@
 http://www.mozilla.org/security/announce/2010/mfsa2010-72.html
 http://www.vuxml.org/freebsd/c4f067b9-dc4a-11df-8e32-000f20797ede.html
 
-Risk factor : Critical";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/freebsd_firefox54.nasl
===================================================================
--- trunk/openvas-plugins/scripts/freebsd_firefox54.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/freebsd_firefox54.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -29,7 +29,7 @@
 if(description)
 {
  script_id(69147);
- script_tag(name:"cvss_base", value:"10.0");
+ script_tag(name:"cvss_base", value:"9.3");
  script_cve_id("CVE-2010-1585", "CVE-2011-0051", "CVE-2011-0053", "CVE-2011-0054", "CVE-2011-0055", "CVE-2011-0056", "CVE-2011-0057", "CVE-2011-0058", "CVE-2011-0059", "CVE-2011-0061", "CVE-2011-0062");
  script_tag(name:"risk_factor", value:"Critical");
  script_version ("$Revision$");

Modified: trunk/openvas-plugins/scripts/freebsd_firefox8.nasl
===================================================================
--- trunk/openvas-plugins/scripts/freebsd_firefox8.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/freebsd_firefox8.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,8 +30,8 @@
  script_id(52210);
  script_cve_id("CVE-2004-1156", "CVE-2004-1157", "CVE-2004-1158", "CVE-2004-1160");
  script_version ("$");
- script_tag(name:"cvss_base", value:"7.5");
- script_tag(name:"risk_factor", value:"High");
+ script_tag(name:"cvss_base", value:"4.3");
+ script_tag(name:"risk_factor", value:"Medium");
  name = "FreeBSD Ports: firefox";
  script_name(name);
 
@@ -119,7 +119,7 @@
 http://secunia.com/advisories/13402/
 http://www.vuxml.org/freebsd/b0911985-6e2a-11d9-9557-000a95bc6fae.html
 
-Risk factor : High";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/freebsd_flyspray1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/freebsd_flyspray1.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/freebsd_flyspray1.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -31,7 +31,7 @@
  script_id(61798);
  script_cve_id("CVE-2007-6461", "CVE-2008-1165", "CVE-2008-1166");
  script_version ("$");
- script_tag(name:"cvss_base", value:"5.0");
+ script_tag(name:"cvss_base", value:"4.3");
  script_tag(name:"risk_factor", value:"Medium");
  name = "FreeBSD Ports: flyspray";
  script_name(name);
@@ -71,7 +71,7 @@
 http://secunia.com/advisories/29215
 http://www.vuxml.org/freebsd/9d3020e4-a2c4-11dd-a9f9-0030843d3802.html
 
-Risk factor: Medium";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/freebsd_freetype2.nasl
===================================================================
--- trunk/openvas-plugins/scripts/freebsd_freetype2.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/freebsd_freetype2.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -31,8 +31,8 @@
  script_cve_id("CVE-2006-0747", "CVE-2006-1861", "CVE-2006-3467");
  script_bugtraq_id(18034);
  script_version ("$");
- script_tag(name:"cvss_base", value:"7.5");
- script_tag(name:"risk_factor", value:"High");
+ script_tag(name:"cvss_base", value:"5.0");
+ script_tag(name:"risk_factor", value:"Medium");
  name = "FreeBSD Ports: freetype2";
  script_name(name);
 
@@ -48,7 +48,7 @@
 http://securitytracker.com/alerts/2006/Jul/1016522.html
 http://www.vuxml.org/freebsd/b975763f-5210-11db-8f1a-000a48049292.html
 
-Risk factor : High";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/freebsd_fsplib.nasl
===================================================================
--- trunk/openvas-plugins/scripts/freebsd_fsplib.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/freebsd_fsplib.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,8 +30,8 @@
  script_id(58813);
  script_cve_id("CVE-2007-3961", "CVE-2007-3962");
  script_version ("$");
- script_tag(name:"cvss_base", value:"7.5");
- script_tag(name:"risk_factor", value:"High");
+ script_tag(name:"cvss_base", value:"5.0");
+ script_tag(name:"risk_factor", value:"Medium");
  name = "FreeBSD Ports: fsplib";
  script_name(name);
 
@@ -49,7 +49,7 @@
 http://secunia.com/advisories/26184/
 http://www.vuxml.org/freebsd/4a338d17-412d-11dc-bdb0-0016179b2dd5.html
 
-Risk factor : High";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/freebsd_gd0.nasl
===================================================================
--- trunk/openvas-plugins/scripts/freebsd_gd0.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/freebsd_gd0.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,7 +30,7 @@
  script_id(58836);
  script_cve_id("CVE-2007-3472", "CVE-2007-3473", "CVE-2007-3474", "CVE-2007-3475", "CVE-2007-3476", "CVE-2007-3477", "CVE-2007-3478");
  script_version ("$");
- script_tag(name:"cvss_base", value:"5.0");
+ script_tag(name:"cvss_base", value:"4.3");
  script_tag(name:"risk_factor", value:"Medium");
  name = "FreeBSD Ports: gd";
  script_name(name);
@@ -58,7 +58,7 @@
 http://bugs.php.net/bug.php?id=40578
 http://www.vuxml.org/freebsd/6e099997-25d8-11dc-878b-000c29c5647f.html
 
-Risk factor: Medium";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/freebsd_gd1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/freebsd_gd1.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/freebsd_gd1.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -32,8 +32,8 @@
  script_cve_id("CVE-2009-3546");
  script_bugtraq_id(36712);
  script_version ("$Revision$");
- script_tag(name:"cvss_base", value:"7.5");
- script_tag(name:"risk_factor", value:"High");
+ script_tag(name:"cvss_base", value:"9.3");
+ script_tag(name:"risk_factor", value:"Critical");
  script_name("FreeBSD Ports: gd");
 
  desc = "The remote host is missing an update to the system
@@ -60,7 +60,7 @@
 http://secunia.com/advisories/37080
 http://www.vuxml.org/freebsd/4e8344a3-ca52-11de-8ee8-00215c6a37bb.html
 
-Risk factor : High";
+Risk factor : Critical";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/freebsd_gforge0.nasl
===================================================================
--- trunk/openvas-plugins/scripts/freebsd_gforge0.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/freebsd_gforge0.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -31,7 +31,7 @@
  script_cve_id("CVE-2005-2430", "CVE-2005-2431");
  script_bugtraq_id(14405);
  script_version ("$");
- script_tag(name:"cvss_base", value:"5.0");
+ script_tag(name:"cvss_base", value:"4.3");
  script_tag(name:"risk_factor", value:"Medium");
  name = "FreeBSD Ports: gforge";
  script_name(name);
@@ -63,7 +63,7 @@
 http://marc.theaimsgroup.com/?l=bugtraq&m=112259845904350
 http://www.vuxml.org/freebsd/d7cd5015-08c9-11da-bc08-0001020eed82.html
 
-Risk factor: Medium";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/freebsd_gftp0.nasl
===================================================================
--- trunk/openvas-plugins/scripts/freebsd_gftp0.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/freebsd_gftp0.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,8 +30,8 @@
  script_id(58772);
  script_cve_id("CVE-2007-3961", "CVE-2007-3962");
  script_version ("$");
- script_tag(name:"cvss_base", value:"7.5");
- script_tag(name:"risk_factor", value:"High");
+ script_tag(name:"cvss_base", value:"5.0");
+ script_tag(name:"risk_factor", value:"Medium");
  name = "FreeBSD Ports: gftp";
  script_name(name);
 
@@ -49,7 +49,7 @@
 http://www.gentoo.org/security/en/glsa/glsa-200711-01.xml
 http://www.vuxml.org/freebsd/f8b0f83c-8bb3-11dc-bffa-0016179b2dd5.html
 
-Risk factor : High";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/freebsd_gnutls4.nasl
===================================================================
--- trunk/openvas-plugins/scripts/freebsd_gnutls4.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/freebsd_gnutls4.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -32,8 +32,8 @@
  script_cve_id("CVE-2009-1415", "CVE-2009-1416", "CVE-2009-1417");
  script_bugtraq_id(34783);
  script_version ("$");
- script_tag(name:"cvss_base", value:"7.5");
- script_tag(name:"risk_factor", value:"High");
+ script_tag(name:"cvss_base", value:"4.3");
+ script_tag(name:"risk_factor", value:"Medium");
  script_name("FreeBSD Ports: gnutls");
 
  desc = "The remote host is missing an update to the system
@@ -73,7 +73,7 @@
 http://article.gmane.org/gmane.comp.encryption.gpg.gnutls.devel/3517
 http://www.vuxml.org/freebsd/b31a1088-460f-11de-a11a-0022156e8794.html
 
-Risk factor : High";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/freebsd_gzip.nasl
===================================================================
--- trunk/openvas-plugins/scripts/freebsd_gzip.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/freebsd_gzip.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,7 +30,7 @@
  script_id(53074);
  script_cve_id("CVE-2005-0988", "CVE-2005-1228");
  script_version ("$");
- script_tag(name:"cvss_base", value:"5.0");
+ script_tag(name:"cvss_base", value:"3.7");
  script_tag(name:"risk_factor", value:"Medium");
  name = "FreeBSD Ports: gzip";
  script_name(name);
@@ -59,7 +59,7 @@
 http://marc.theaimsgroup.com/?l=bugtraq&m=111402732406477
 http://www.vuxml.org/freebsd/63bd4bad-dffe-11d9-b875-0001020eed82.html
 
-Risk factor: Medium";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/freebsd_gzip0.nasl
===================================================================
--- trunk/openvas-plugins/scripts/freebsd_gzip0.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/freebsd_gzip0.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,8 +30,8 @@
  script_id(57726);
  script_cve_id("CVE-2006-4334", "CVE-2006-4335", "CVE-2006-4336", "CVE-2006-4337", "CVE-2006-4338");
  script_version ("$");
- script_tag(name:"cvss_base", value:"7.5");
- script_tag(name:"risk_factor", value:"High");
+ script_tag(name:"cvss_base", value:"5.0");
+ script_tag(name:"risk_factor", value:"Medium");
  name = "FreeBSD Ports: gzip";
  script_name(name);
 
@@ -73,7 +73,7 @@
 software upgrades.
 
 
-Risk factor : High";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/freebsd_heimdal1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/freebsd_heimdal1.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/freebsd_heimdal1.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,7 +30,7 @@
  script_id(56450);
  script_cve_id("CVE-2005-0469", "CVE-2005-2040", "CVE-2006-0582", "CVE-2006-0677");
  script_version ("$");
- script_tag(name:"cvss_base", value:"7.8");
+ script_tag(name:"cvss_base", value:"7.5");
  script_tag(name:"risk_factor", value:"High");
  name = "FreeBSD Ports: heimdal";
  script_name(name);

Modified: trunk/openvas-plugins/scripts/freebsd_ipsec-tools.nasl
===================================================================
--- trunk/openvas-plugins/scripts/freebsd_ipsec-tools.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/freebsd_ipsec-tools.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -32,8 +32,8 @@
  script_cve_id("CVE-2008-3651", "CVE-2008-3652");
  script_bugtraq_id(30657);
  script_version ("$");
- script_tag(name:"cvss_base", value:"7.8");
- script_tag(name:"risk_factor", value:"High");
+ script_tag(name:"cvss_base", value:"4.0");
+ script_tag(name:"risk_factor", value:"Medium");
  name = "FreeBSD Ports: ipsec-tools";
  script_name(name);
 
@@ -60,7 +60,7 @@
 http://marc.info/?l=ipsec-tools-devel&m=121688914101709&w=2
 http://www.vuxml.org/freebsd/abcacb5a-e7f1-11dd-afcd-00e0815b8da8.html
 
-Risk factor : High";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/freebsd_isakmpd.nasl
===================================================================
--- trunk/openvas-plugins/scripts/freebsd_isakmpd.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/freebsd_isakmpd.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,8 +30,8 @@
  script_id(52399);
  script_cve_id("CVE-2004-0218", "CVE-2004-0219", "CVE-2004-0220", "CVE-2004-0221", "CVE-2004-0222");
  script_version ("$");
- script_tag(name:"cvss_base", value:"10.0");
- script_tag(name:"risk_factor", value:"Critical");
+ script_tag(name:"cvss_base", value:"5.0");
+ script_tag(name:"risk_factor", value:"Medium");
  name = "FreeBSD Ports: isakmpd";
  script_name(name);
 
@@ -78,7 +78,7 @@
 http://www.openbsd.org/errata34.html
 http://www.vuxml.org/freebsd/b7cb488c-8349-11d8-a41f-0020ed76ef5a.html
 
-Risk factor: Critical";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/freebsd_jetty.nasl
===================================================================
--- trunk/openvas-plugins/scripts/freebsd_jetty.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/freebsd_jetty.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,8 +30,8 @@
  script_id(59976);
  script_cve_id("CVE-2007-5613", "CVE-2007-5614", "CVE-2007-5615");
  script_version ("$");
- script_tag(name:"cvss_base", value:"7.5");
- script_tag(name:"risk_factor", value:"High");
+ script_tag(name:"cvss_base", value:"4.3");
+ script_tag(name:"risk_factor", value:"Medium");
  name = "FreeBSD Ports: jetty";
  script_name(name);
 
@@ -62,7 +62,7 @@
 http://svn.codehaus.org/jetty/jetty/trunk/VERSION.txt
 http://www.vuxml.org/freebsd/6ae7cef2-a6ae-11dc-95e6-000c29c5647f.html
 
-Risk factor : High";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/freebsd_joomla1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/freebsd_joomla1.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/freebsd_joomla1.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -31,8 +31,8 @@
  script_cve_id("CVE-2006-6832", "CVE-2006-6833", "CVE-2006-6834");
  script_bugtraq_id(21810);
  script_version ("$");
- script_tag(name:"cvss_base", value:"7.5");
- script_tag(name:"risk_factor", value:"High");
+ script_tag(name:"cvss_base", value:"4.3");
+ script_tag(name:"risk_factor", value:"Medium");
  name = "FreeBSD Ports: joomla";
  script_name(name);
 
@@ -48,7 +48,7 @@
 http://secunia.com/advisories/23563/
 http://www.vuxml.org/freebsd/7bb127c1-a5aa-11db-9ddc-0011098b2f36.html
 
-Risk factor : High";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/freebsd_junkbuster.nasl
===================================================================
--- trunk/openvas-plugins/scripts/freebsd_junkbuster.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/freebsd_junkbuster.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -31,8 +31,8 @@
  script_cve_id("CVE-2005-1108", "CVE-2005-1109");
  script_bugtraq_id(13146,13147);
  script_version ("$");
- script_tag(name:"cvss_base", value:"7.5");
- script_tag(name:"risk_factor", value:"High");
+ script_tag(name:"cvss_base", value:"5.0");
+ script_tag(name:"risk_factor", value:"Medium");
  name = "FreeBSD Ports: junkbuster";
  script_name(name);
 
@@ -61,7 +61,7 @@
 http://www.gentoo.org/security/en/glsa/glsa-200504-11.xml
 http://www.vuxml.org/freebsd/97edf5ab-b319-11d9-837d-000e0c2e438a.html
 
-Risk factor : High";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/freebsd_kdebase3.nasl
===================================================================
--- trunk/openvas-plugins/scripts/freebsd_kdebase3.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/freebsd_kdebase3.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,8 +30,8 @@
  script_id(58799);
  script_cve_id("CVE-2007-3820", "CVE-2007-4224", "CVE-2007-4225");
  script_version ("$");
- script_tag(name:"cvss_base", value:"6.8");
- script_tag(name:"risk_factor", value:"High");
+ script_tag(name:"cvss_base", value:"2.6");
+ script_tag(name:"risk_factor", value:"Medium");
  name = "FreeBSD Ports: kdebase3";
  script_name(name);
 
@@ -51,7 +51,7 @@
 http://www.kde.org/info/security/advisory-20070914-1.txt
 http://www.vuxml.org/freebsd/14ad2a28-66d2-11dc-b25f-02e0185f8d72.html
 
-Risk factor : High";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/freebsd_ktorrent.nasl
===================================================================
--- trunk/openvas-plugins/scripts/freebsd_ktorrent.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/freebsd_ktorrent.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,7 +30,7 @@
  script_id(58115);
  script_cve_id("CVE-2007-1384", "CVE-2007-1385");
  script_version ("$");
- script_tag(name:"cvss_base", value:"7.5");
+ script_tag(name:"cvss_base", value:"6.4");
  script_tag(name:"risk_factor", value:"High");
  name = "FreeBSD Ports: ktorrent";
  script_name(name);

Modified: trunk/openvas-plugins/scripts/freebsd_lha.nasl
===================================================================
--- trunk/openvas-plugins/scripts/freebsd_lha.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/freebsd_lha.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -31,8 +31,8 @@
  script_cve_id("CVE-2004-0694", "CVE-2004-0745", "CVE-2004-0769", "CVE-2004-0771");
  script_bugtraq_id(10354);
  script_version ("$");
- script_tag(name:"cvss_base", value:"10.0");
- script_tag(name:"risk_factor", value:"Critical");
+ script_tag(name:"cvss_base", value:"6.8");
+ script_tag(name:"risk_factor", value:"High");
  name = "FreeBSD Ports: lha";
  script_name(name);
 
@@ -76,7 +76,7 @@
 http://marc.theaimsgroup.com/?l=bugtraq&m=108668791510153
 http://www.vuxml.org/freebsd/273cc1a3-0d6b-11d9-8a8a-000c41e2cdad.html
 
-Risk factor: Critical";
+Risk factor : High";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/freebsd_libvorbis0.nasl
===================================================================
--- trunk/openvas-plugins/scripts/freebsd_libvorbis0.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/freebsd_libvorbis0.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,8 +30,8 @@
  script_id(61057);
  script_cve_id("CVE-2008-1419", "CVE-2008-1420", "CVE-2008-1423");
  script_version ("$");
- script_tag(name:"cvss_base", value:"9.3");
- script_tag(name:"risk_factor", value:"Critical");
+ script_tag(name:"cvss_base", value:"4.3");
+ script_tag(name:"risk_factor", value:"Medium");
  name = "FreeBSD Ports: libvorbis";
  script_name(name);
 
@@ -66,7 +66,7 @@
 https://rhn.redhat.com/errata/RHSA-2008-0270.html
 http://www.vuxml.org/freebsd/f5a76faf-244c-11dd-b143-0211d880e350.html
 
-Risk factor: Critical";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/freebsd_libvorbis1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/freebsd_libvorbis1.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/freebsd_libvorbis1.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -31,8 +31,8 @@
  script_id(66340);
  script_cve_id("CVE-2008-1420", "CVE-2009-3379");
  script_version ("$Revision$");
- script_tag(name:"cvss_base", value:"10.0");
- script_tag(name:"risk_factor", value:"Critical");
+ script_tag(name:"cvss_base", value:"6.8");
+ script_tag(name:"risk_factor", value:"High");
  script_name("FreeBSD Ports: libvorbis");
 
  desc = "The remote host is missing an update to the system
@@ -57,7 +57,7 @@
 software upgrades.
 
 
-Risk factor: Critical";
+Risk factor : High";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/freebsd_libxine12.nasl
===================================================================
--- trunk/openvas-plugins/scripts/freebsd_libxine12.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/freebsd_libxine12.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -31,8 +31,8 @@
  script_id(64000);
  script_cve_id("CVE-2009-0698", "CVE-2008-5234", "CVE-2008-5240");
  script_version ("$");
- script_tag(name:"cvss_base", value:"9.3");
- script_tag(name:"risk_factor", value:"Critical");
+ script_tag(name:"cvss_base", value:"7.5");
+ script_tag(name:"risk_factor", value:"High");
  name = "FreeBSD Ports: libxine";
  script_name(name);
 
@@ -73,7 +73,7 @@
 http://sourceforge.net/project/shownotes.php?release_id=660071
 http://www.vuxml.org/freebsd/51d1d428-42f0-11de-ad22-000e35248ad7.html
 
-Risk factor: Critical";
+Risk factor : High";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/freebsd_libxine5.nasl
===================================================================
--- trunk/openvas-plugins/scripts/freebsd_libxine5.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/freebsd_libxine5.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -31,7 +31,7 @@
  script_cve_id("CVE-2006-2200", "CVE-2006-6172");
  script_bugtraq_id(18608,21435);
  script_version ("$");
- script_tag(name:"cvss_base", value:"7.5");
+ script_tag(name:"cvss_base", value:"5.1");
  script_tag(name:"risk_factor", value:"High");
  name = "FreeBSD Ports: libxine";
  script_name(name);

Modified: trunk/openvas-plugins/scripts/freebsd_libxml20.nasl
===================================================================
--- trunk/openvas-plugins/scripts/freebsd_libxml20.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/freebsd_libxml20.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -31,8 +31,8 @@
  script_id(61803);
  script_cve_id("CVE-2008-3281", "CVE-2008-3529");
  script_version ("$");
- script_tag(name:"cvss_base", value:"10.0");
- script_tag(name:"risk_factor", value:"Critical");
+ script_tag(name:"cvss_base", value:"4.3");
+ script_tag(name:"risk_factor", value:"Medium");
  name = "FreeBSD Ports: libxml2";
  script_name(name);
 
@@ -58,7 +58,7 @@
 software upgrades.
 
 
-Risk factor: Critical";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/freebsd_libxml21.nasl
===================================================================
--- trunk/openvas-plugins/scripts/freebsd_libxml21.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/freebsd_libxml21.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -31,8 +31,8 @@
  script_id(61917);
  script_cve_id("CVE-2008-4225", "CVE-2008-4226");
  script_version ("$");
- script_tag(name:"cvss_base", value:"10.0");
- script_tag(name:"risk_factor", value:"Critical");
+ script_tag(name:"cvss_base", value:"7.8");
+ script_tag(name:"risk_factor", value:"High");
  name = "FreeBSD Ports: libxml2";
  script_name(name);
 
@@ -50,7 +50,7 @@
 http://secunia.com/Advisories/32773/
 http://www.vuxml.org/freebsd/f1e0164e-b67b-11dd-a55e-00163e000016.html
 
-Risk factor: Critical";
+Risk factor : High";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/freebsd_linux-flashplugin0.nasl
===================================================================
--- trunk/openvas-plugins/scripts/freebsd_linux-flashplugin0.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/freebsd_linux-flashplugin0.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,7 +30,7 @@
  script_id(57354);
  script_cve_id("CVE-2006-3311", "CVE-2006-3587", "CVE-2006-3588", "CVE-2006-4640");
  script_version ("$");
- script_tag(name:"cvss_base", value:"6.8");
+ script_tag(name:"cvss_base", value:"5.1");
  script_tag(name:"risk_factor", value:"High");
  name = "FreeBSD Ports: linux-flashplugin";
  script_name(name);

Modified: trunk/openvas-plugins/scripts/freebsd_linux-flashplugin1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/freebsd_linux-flashplugin1.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/freebsd_linux-flashplugin1.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,8 +30,8 @@
  script_id(58831);
  script_cve_id("CVE-2007-2022", "CVE-2007-3456", "CVE-2007-3457");
  script_version ("$");
- script_tag(name:"cvss_base", value:"9.3");
- script_tag(name:"risk_factor", value:"Critical");
+ script_tag(name:"cvss_base", value:"6.8");
+ script_tag(name:"risk_factor", value:"High");
  name = "FreeBSD Ports: linux-flashplugin";
  script_name(name);
 
@@ -47,7 +47,7 @@
 software upgrades.
 
 
-Risk factor: Critical";
+Risk factor : High";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/freebsd_linux-flashplugin2.nasl
===================================================================
--- trunk/openvas-plugins/scripts/freebsd_linux-flashplugin2.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/freebsd_linux-flashplugin2.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,8 +30,8 @@
  script_id(60088);
  script_cve_id("CVE-2007-6242", "CVE-2007-4768", "CVE-2007-5275", "CVE-2007-6243", "CVE-2007-6244", "CVE-2007-6245", "CVE-2007-4324", "CVE-2007-6246", "CVE-2007-5476");
  script_version ("$");
- script_tag(name:"cvss_base", value:"10.0");
- script_tag(name:"risk_factor", value:"Critical");
+ script_tag(name:"cvss_base", value:"6.8");
+ script_tag(name:"risk_factor", value:"High");
  name = "FreeBSD Ports: linux-flashplugin";
  script_name(name);
 
@@ -50,7 +50,7 @@
 http://secunia.com/advisories/28161/
 http://www.vuxml.org/freebsd/562cf6c4-b9f1-11dc-a302-000102cc8983.html
 
-Risk factor: Critical";
+Risk factor : High";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/freebsd_linux-flashplugin4.nasl
===================================================================
--- trunk/openvas-plugins/scripts/freebsd_linux-flashplugin4.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/freebsd_linux-flashplugin4.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -31,7 +31,7 @@
  script_id(61802);
  script_cve_id("CVE-2007-6243", "CVE-2008-3873", "CVE-2007-4324", "CVE-2008-4401", "CVE-2008-4503");
  script_version ("$");
- script_tag(name:"cvss_base", value:"10.0");
+ script_tag(name:"cvss_base", value:"9.3");
  script_tag(name:"risk_factor", value:"Critical");
  name = "FreeBSD Ports: linux-flashplugin";
  script_name(name);
@@ -87,7 +87,7 @@
 http://www.adobe.com/support/security/bulletins/apsb08-18.html
 http://www.vuxml.org/freebsd/78f456fd-9c87-11dd-a55e-00163e000016.html
 
-Risk factor: Critical";
+Risk factor : Critical";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/freebsd_linux-flashplugin8.nasl
===================================================================
--- trunk/openvas-plugins/scripts/freebsd_linux-flashplugin8.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/freebsd_linux-flashplugin8.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -29,9 +29,9 @@
 if(description)
 {
  script_id(67656);
- script_tag(name:"cvss_base", value:"9.3");
+ script_tag(name:"cvss_base", value:"4.3");
  script_cve_id("CVE-2008-4546", "CVE-2009-3793", "CVE-2010-1297", "CVE-2010-2160", "CVE-2010-2161", "CVE-2010-2162", "CVE-2010-2163", "CVE-2010-2164", "CVE-2010-2165", "CVE-2010-2166");
- script_tag(name:"risk_factor", value:"Critical");
+ script_tag(name:"risk_factor", value:"Medium");
  script_version ("$Revision$");
  script_name("FreeBSD Ports: linux-flashplugin");
 
@@ -53,7 +53,7 @@
 http://www.adobe.com/support/security/bulletins/apsb10-14.html
 http://www.vuxml.org/freebsd/144e524a-77eb-11df-ae06-001b2134ef46.html
 
-Risk factor : Critical";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/freebsd_linux_base.nasl
===================================================================
--- trunk/openvas-plugins/scripts/freebsd_linux_base.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/freebsd_linux_base.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,8 +30,8 @@
  script_id(52995);
  script_cve_id("CVE-2002-0029", "CVE-2004-0083", "CVE-2004-0084", "CVE-2004-0106", "CVE-2004-0687", "CVE-2004-0688", "CVE-2004-0692", "CVE-2004-0914");
  script_version ("$");
- script_tag(name:"cvss_base", value:"10.0");
- script_tag(name:"risk_factor", value:"Critical");
+ script_tag(name:"cvss_base", value:"7.5");
+ script_tag(name:"risk_factor", value:"High");
  name = "FreeBSD Ports: linux_base";
  script_name(name);
 
@@ -54,7 +54,7 @@
 http://rhn.redhat.com/errata/RHSA-2004-612.html
 http://www.vuxml.org/freebsd/bf2e7483-d3fa-440d-8c6e-8f1f2f018818.html
 
-Risk factor: Critical";
+Risk factor : High";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/freebsd_mailman7.nasl
===================================================================
--- trunk/openvas-plugins/scripts/freebsd_mailman7.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/freebsd_mailman7.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,8 +30,8 @@
  script_id(57323);
  script_cve_id("CVE-2006-2941", "CVE-2006-3636");
  script_version ("$");
- script_tag(name:"cvss_base", value:"6.8");
- script_tag(name:"risk_factor", value:"High");
+ script_tag(name:"cvss_base", value:"5.0");
+ script_tag(name:"risk_factor", value:"Medium");
  name = "FreeBSD Ports: mailman, ja-mailman, mailman-with-htdig";
  script_name(name);
 
@@ -51,7 +51,7 @@
 http://sourceforge.net/project/shownotes.php?group_id=103&release_id=444295
 http://www.vuxml.org/freebsd/fffa9257-3c17-11db-86ab-00123ffe8333.html
 
-Risk factor : High";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/freebsd_mantis4.nasl
===================================================================
--- trunk/openvas-plugins/scripts/freebsd_mantis4.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/freebsd_mantis4.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -31,7 +31,7 @@
  script_id(62858);
  script_cve_id("CVE-2008-2276", "CVE-2008-3331", "CVE-2008-3332", "CVE-2008-3333");
  script_version ("$");
- script_tag(name:"cvss_base", value:"7.5");
+ script_tag(name:"cvss_base", value:"6.8");
  script_tag(name:"risk_factor", value:"High");
  name = "FreeBSD Ports: mantis";
  script_name(name);

Modified: trunk/openvas-plugins/scripts/freebsd_mediawiki2.nasl
===================================================================
--- trunk/openvas-plugins/scripts/freebsd_mediawiki2.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/freebsd_mediawiki2.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -31,8 +31,8 @@
  script_id(63045);
  script_cve_id("CVE-2008-5249", "CVE-2008-5250", "CVE-2008-5252");
  script_version ("$");
- script_tag(name:"cvss_base", value:"5.8");
- script_tag(name:"risk_factor", value:"High");
+ script_tag(name:"cvss_base", value:"4.3");
+ script_tag(name:"risk_factor", value:"Medium");
  name = "FreeBSD Ports: mediawiki";
  script_name(name);
 
@@ -49,7 +49,7 @@
 http://lists.wikimedia.org/pipermail/mediawiki-announce/2008-December/000080.html
 http://www.vuxml.org/freebsd/61b07d71-ce0e-11dd-a721-0030843d3802.html
 
-Risk factor : High";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/freebsd_moinmoin1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/freebsd_moinmoin1.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/freebsd_moinmoin1.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -31,8 +31,8 @@
  script_cve_id("CVE-2007-0857", "CVE-2007-0901", "CVE-2007-0902", "CVE-2007-2423", "CVE-2007-2673", "CVE-2008-0780", "CVE-2008-0781", "CVE-2008-0782");
  script_bugtraq_id(27404);
  script_version ("$");
- script_tag(name:"cvss_base", value:"7.5");
- script_tag(name:"risk_factor", value:"High");
+ script_tag(name:"cvss_base", value:"4.3");
+ script_tag(name:"risk_factor", value:"Medium");
  name = "FreeBSD Ports: moinmoin";
  script_name(name);
 
@@ -51,7 +51,7 @@
 http://secunia.com/advisories/29010/
 http://www.vuxml.org/freebsd/f113bbeb-e3ac-11dc-bb89-000bcdc1757a.html
 
-Risk factor : High";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/freebsd_mysql-server10.nasl
===================================================================
--- trunk/openvas-plugins/scripts/freebsd_mysql-server10.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/freebsd_mysql-server10.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,8 +30,8 @@
  script_id(56850);
  script_cve_id("CVE-2006-1516", "CVE-2006-1517", "CVE-2006-1518");
  script_version ("$");
- script_tag(name:"cvss_base", value:"6.5");
- script_tag(name:"risk_factor", value:"High");
+ script_tag(name:"cvss_base", value:"5.0");
+ script_tag(name:"risk_factor", value:"Medium");
  name = "FreeBSD Ports: mysql-server";
  script_name(name);
 
@@ -70,7 +70,7 @@
 http://www.vuxml.org/freebsd/a8d8713e-dc83-11da-a22b-000c6ec775d9.html
 http://www.vuxml.org/freebsd/4913886c-e875-11da-b9f4-00123ffe8333.html
 
-Risk factor : High";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/freebsd_mysql-server17.nasl
===================================================================
--- trunk/openvas-plugins/scripts/freebsd_mysql-server17.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/freebsd_mysql-server17.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -32,8 +32,8 @@
  script_cve_id("CVE-2007-5969");
  script_bugtraq_id(26765);
  script_version ("$");
- script_tag(name:"cvss_base", value:"3.6");
- script_tag(name:"risk_factor", value:"Medium");
+ script_tag(name:"cvss_base", value:"7.1");
+ script_tag(name:"risk_factor", value:"High");
  name = "FreeBSD Ports: mysql-server";
  script_name(name);
 
@@ -58,7 +58,7 @@
 http://bugs.mysql.com/bug.php?id=32111
 http://www.vuxml.org/freebsd/8c451386-dff3-11dd-a765-0030843d3802.html
 
-Risk factor: Medium";
+Risk factor : High";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/freebsd_openfire1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/freebsd_openfire1.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/freebsd_openfire1.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -32,7 +32,7 @@
  script_cve_id("CVE-2009-0496");
  script_bugtraq_id(32935,32937,32938,32939,32940,32943,32944,32945);
  script_version ("$");
- script_tag(name:"cvss_base", value:"5.0");
+ script_tag(name:"cvss_base", value:"4.3");
  script_tag(name:"risk_factor", value:"Medium");
  name = "FreeBSD Ports: openfire";
  script_name(name);
@@ -49,7 +49,7 @@
 http://www.coresecurity.com/content/openfire-multiple-vulnerabilities
 http://www.vuxml.org/freebsd/c3aba586-ea77-11dd-9d1e-000bcdc1757a.html
 
-Risk factor: Medium";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/freebsd_openoffice.org.nasl
===================================================================
--- trunk/openvas-plugins/scripts/freebsd_openoffice.org.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/freebsd_openoffice.org.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -31,8 +31,8 @@
  script_id(67053);
  script_cve_id("CVE-2006-4339", "CVE-2009-0217", "CVE-2009-2493", "CVE-2009-2949", "CVE-2009-2950", "CVE-2009-3301", "CVE-2009-3302");
  script_version ("$Revision$");
- script_tag(name:"cvss_base", value:"9.3");
- script_tag(name:"risk_factor", value:"Critical");
+ script_tag(name:"cvss_base", value:"4.3");
+ script_tag(name:"risk_factor", value:"Medium");
  script_name("FreeBSD Ports: openoffice.org");
 
  desc = "The remote host is missing an update to the system
@@ -56,7 +56,7 @@
 http://www.openoffice.org/security/cves/CVE-2009-3301-3302.html
 http://www.vuxml.org/freebsd/c97d7a37-2233-11df-96dd-001b2134ef46.html
 
-Risk factor: Critical";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/freebsd_opensaml2.nasl
===================================================================
--- trunk/openvas-plugins/scripts/freebsd_opensaml2.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/freebsd_opensaml2.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -31,7 +31,8 @@
  script_id(70064);
  script_cve_id("CVE-2011-1411");
  script_tag(name:"risk_factor", value:"High");
- script_version ("$Revision$");
+ script_tag(name:"cvss_base", value:"5.8");
+ script_version("$Revision$");
  script_name("FreeBSD Ports: opensaml2");
 
  desc = "The remote host is missing an update to the system

Modified: trunk/openvas-plugins/scripts/freebsd_openssh.nasl
===================================================================
--- trunk/openvas-plugins/scripts/freebsd_openssh.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/freebsd_openssh.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -31,8 +31,8 @@
  script_cve_id("CVE-2006-4924", "CVE-2006-5051");
  script_bugtraq_id(20216);
  script_version ("$");
- script_tag(name:"cvss_base", value:"9.3");
- script_tag(name:"risk_factor", value:"Critical");
+ script_tag(name:"cvss_base", value:"7.8");
+ script_tag(name:"risk_factor", value:"High");
  name = "FreeBSD Ports: openssh";
  script_name(name);
 
@@ -49,7 +49,7 @@
 http://www.openssh.com/txt/release-4.4
 http://www.vuxml.org/freebsd/32db37a5-50c3-11db-acf3-000c6ec775d9.html
 
-Risk factor: Critical";
+Risk factor : High";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/freebsd_openssl2.nasl
===================================================================
--- trunk/openvas-plugins/scripts/freebsd_openssl2.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/freebsd_openssl2.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,8 +30,8 @@
  script_id(58053);
  script_cve_id("CVE-2006-2937", "CVE-2006-2938", "CVE-2006-2940", "CVE-2006-3738", "CVE-2006-4343");
  script_version ("$");
- script_tag(name:"cvss_base", value:"10.0");
- script_tag(name:"risk_factor", value:"Critical");
+ script_tag(name:"cvss_base", value:"7.8");
+ script_tag(name:"risk_factor", value:"High");
  name = "FreeBSD Ports: openssl";
  script_name(name);
 
@@ -73,7 +73,7 @@
 software upgrades.
 
 
-Risk factor: Critical";
+Risk factor : High";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/freebsd_opera23.nasl
===================================================================
--- trunk/openvas-plugins/scripts/freebsd_opera23.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/freebsd_opera23.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -31,7 +31,8 @@
  script_id(68952);
  script_cve_id("CVE-2011-0450", "CVE-2011-0681", "CVE-2011-0682", "CVE-2011-0683", "CVE-2011-0684", "CVE-2011-0685", "CVE-2011-0686", "CVE-2011-0687");
  script_tag(name:"risk_factor", value:"High");
- script_version ("$Revision$");
+ script_tag(name:"cvss_base", value:"7.6");
+ script_version("$Revision$");
  script_name("FreeBSD Ports: opera, opera-devel, linux-opera");
 
  desc = "The remote host is missing an update to the system

Modified: trunk/openvas-plugins/scripts/freebsd_opera5.nasl
===================================================================
--- trunk/openvas-plugins/scripts/freebsd_opera5.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/freebsd_opera5.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,8 +30,8 @@
  script_id(58777);
  script_cve_id("CVE-2007-5540", "CVE-2007-5541");
  script_version ("$");
- script_tag(name:"cvss_base", value:"9.3");
- script_tag(name:"risk_factor", value:"Critical");
+ script_tag(name:"cvss_base", value:"7.5");
+ script_tag(name:"risk_factor", value:"High");
  name = "FreeBSD Ports: opera, opera-devel, linux-opera";
  script_name(name);
 
@@ -54,7 +54,7 @@
 http://secunia.com/advisories/27277/
 http://www.vuxml.org/freebsd/44224e08-8306-11dc-9283-0016179b2dd5.html
 
-Risk factor: Critical";
+Risk factor : High";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/freebsd_pcre0.nasl
===================================================================
--- trunk/openvas-plugins/scripts/freebsd_pcre0.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/freebsd_pcre0.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,7 +30,7 @@
  script_id(58770);
  script_cve_id("CVE-2007-1659", "CVE-2007-1660", "CVE-2007-1661", "CVE-2007-1662", "CVE-2007-4766", "CVE-2007-4767", "CVE-2007-4768");
  script_version ("$");
- script_tag(name:"cvss_base", value:"7.5");
+ script_tag(name:"cvss_base", value:"6.8");
  script_tag(name:"risk_factor", value:"High");
  name = "FreeBSD Ports: pcre, pcre-utf8";
  script_name(name);

Modified: trunk/openvas-plugins/scripts/freebsd_php40.nasl
===================================================================
--- trunk/openvas-plugins/scripts/freebsd_php40.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/freebsd_php40.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,8 +30,8 @@
  script_id(57375);
  script_cve_id("CVE-2006-4481", "CVE-2006-4482", "CVE-2006-4483", "CVE-2006-4484", "CVE-2006-4485", "CVE-2006-4486");
  script_version ("$");
- script_tag(name:"cvss_base", value:"10.0");
- script_tag(name:"risk_factor", value:"Critical");
+ script_tag(name:"cvss_base", value:"7.2");
+ script_tag(name:"risk_factor", value:"High");
  name = "FreeBSD Ports: php4, php5";
  script_name(name);
 
@@ -50,7 +50,7 @@
 http://www.php.net/release_5_1_5.php
 http://www.vuxml.org/freebsd/ea09c5df-4362-11db-81e1-000e0c2e438a.html
 
-Risk factor: Critical";
+Risk factor : High";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/freebsd_php5-imap.nasl
===================================================================
--- trunk/openvas-plugins/scripts/freebsd_php5-imap.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/freebsd_php5-imap.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,8 +30,8 @@
  script_id(58010);
  script_cve_id("CVE-2007-0905", "CVE-2007-0906", "CVE-2007-0907", "CVE-2007-0908", "CVE-2007-0909", "CVE-2007-0910", "CVE-2007-0988");
  script_version ("$");
- script_tag(name:"cvss_base", value:"10.0");
- script_tag(name:"risk_factor", value:"Critical");
+ script_tag(name:"cvss_base", value:"7.5");
+ script_tag(name:"risk_factor", value:"High");
  name = "php -- multiple vulnerabilities";
  script_name(name);
 
@@ -54,7 +54,7 @@
 http://www.php.net/releases/5_2_1.php
 http://www.vuxml.org/freebsd/7fcf1727-be71-11db-b2ec-000c6ec775d9.html
 
-Risk factor: Critical";
+Risk factor : High";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/freebsd_php51.nasl
===================================================================
--- trunk/openvas-plugins/scripts/freebsd_php51.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/freebsd_php51.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,7 +30,7 @@
  script_id(58803);
  script_cve_id("CVE-2007-2872", "CVE-2007-3378", "CVE-2007-3806", "CVE-2007-3996", "CVE-2007-3997", "CVE-2007-3998", "CVE-2007-4652", "CVE-2007-4657", "CVE-2007-4658", "CVE-2007-4659", "CVE-2007-4660", "CVE-2007-4661", "CVE-2007-4662", "CVE-2007-4663", "CVE-2007-4670");
  script_version ("$");
- script_tag(name:"cvss_base", value:"7.5");
+ script_tag(name:"cvss_base", value:"6.8");
  script_tag(name:"risk_factor", value:"High");
  name = "FreeBSD Ports: php5";
  script_name(name);

Modified: trunk/openvas-plugins/scripts/freebsd_php56.nasl
===================================================================
--- trunk/openvas-plugins/scripts/freebsd_php56.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/freebsd_php56.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -31,8 +31,8 @@
  script_id(66610);
  script_cve_id("CVE-2009-3557", "CVE-2009-3558", "CVE-2009-4017", "CVE-2009-4142", "CVE-2009-4143");
  script_version ("$Revision$");
- script_tag(name:"cvss_base", value:"7.5");
- script_tag(name:"risk_factor", value:"High");
+ script_tag(name:"cvss_base", value:"5.0");
+ script_tag(name:"risk_factor", value:"Medium");
  script_name("FreeBSD Ports: php5");
 
  desc = "The remote host is missing an update to the system
@@ -80,7 +80,7 @@
 http://www.php.net/releases/5_2_12.php
 http://www.vuxml.org/freebsd/39a25a63-eb5c-11de-b650-00215c6a37bb.html
 
-Risk factor : High";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/freebsd_php57.nasl
===================================================================
--- trunk/openvas-plugins/scripts/freebsd_php57.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/freebsd_php57.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -29,9 +29,9 @@
 if(description)
 {
  script_id(68689);
- script_tag(name:"cvss_base", value:"6.8");
+ script_tag(name:"cvss_base", value:"5.0");
  script_cve_id("CVE-2006-7243", "CVE-2010-2950", "CVE-2010-3436", "CVE-2010-3709", "CVE-2010-4150");
- script_tag(name:"risk_factor", value:"High");
+ script_tag(name:"risk_factor", value:"Medium");
  script_version ("$Revision$");
  script_name("FreeBSD Ports: php5");
 
@@ -74,7 +74,7 @@
 software upgrades.
 
 
-Risk factor : High";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/freebsd_phpMyAdmin20.nasl
===================================================================
--- trunk/openvas-plugins/scripts/freebsd_phpMyAdmin20.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/freebsd_phpMyAdmin20.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -31,8 +31,8 @@
  script_id(66064);
  script_cve_id("CVE-2009-3696", "CVE-2009-3697");
  script_version ("$Revision$");
- script_tag(name:"cvss_base", value:"7.5");
- script_tag(name:"risk_factor", value:"High");
+ script_tag(name:"cvss_base", value:"4.3");
+ script_tag(name:"risk_factor", value:"Medium");
  script_name("FreeBSD Ports: phpMyAdmin");
 
  desc = "The remote host is missing an update to the system
@@ -49,7 +49,7 @@
 http://www.phpmyadmin.net/home_page/security/PMASA-2009-6.php
 http://www.vuxml.org/freebsd/4769914e-b844-11de-b159-0030843d3802.html
 
-Risk factor : High";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/freebsd_phpMyAdmin24.nasl
===================================================================
--- trunk/openvas-plugins/scripts/freebsd_phpMyAdmin24.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/freebsd_phpMyAdmin24.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -29,9 +29,9 @@
 if(description)
 {
  script_id(70063);
- script_tag(name:"cvss_base", value:"6.8");
+ script_tag(name:"cvss_base", value:"2.6");
  script_cve_id("CVE-2011-2642", "CVE-2011-2643");
- script_tag(name:"risk_factor", value:"High");
+ script_tag(name:"risk_factor", value:"Medium");
  script_version ("$Revision$");
  script_name("FreeBSD Ports: phpMyAdmin");
 
@@ -62,7 +62,7 @@
 http://www.phpmyadmin.net/home_page/security/PMASA-2011-12.php
 http://www.vuxml.org/freebsd/d79fc873-b5f9-11e0-89b4-001ec9578670.html
 
-Risk factor : High";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/freebsd_phpbb8.nasl
===================================================================
--- trunk/openvas-plugins/scripts/freebsd_phpbb8.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/freebsd_phpbb8.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -31,8 +31,8 @@
  script_cve_id("CVE-2005-0258", "CVE-2005-0259");
  script_bugtraq_id(12618,12621,12623);
  script_version ("$");
- script_tag(name:"cvss_base", value:"6.4");
- script_tag(name:"risk_factor", value:"High");
+ script_tag(name:"cvss_base", value:"5.0");
+ script_tag(name:"risk_factor", value:"Medium");
  name = "FreeBSD Ports: phpbb";
  script_name(name);
 
@@ -63,7 +63,7 @@
 http://www.idefense.com/application/poi/display?id=204&type=vulnerabilities
 http://www.vuxml.org/freebsd/326c517a-d029-11d9-9aed-000e0c2e438a.html
 
-Risk factor : High";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/freebsd_phpbb9.nasl
===================================================================
--- trunk/openvas-plugins/scripts/freebsd_phpbb9.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/freebsd_phpbb9.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -31,8 +31,8 @@
  script_cve_id("CVE-2005-3310", "CVE-2005-3415", "CVE-2005-3416", "CVE-2005-3417", "CVE-2005-3418", "CVE-2005-3419", "CVE-2005-3420", "CVE-2005-3536", "CVE-2005-3537");
  script_bugtraq_id(15170,15243);
  script_version ("$");
- script_tag(name:"cvss_base", value:"7.5");
- script_tag(name:"risk_factor", value:"High");
+ script_tag(name:"cvss_base", value:"3.5");
+ script_tag(name:"risk_factor", value:"Medium");
  name = "FreeBSD Ports: phpbb, zh-phpbb-tw";
  script_name(name);
 
@@ -51,7 +51,7 @@
 http://marc.theaimsgroup.com/?l=bugtraq&m=113017003617987
 http://www.vuxml.org/freebsd/28c9243a-72ed-11da-8c1d-000e0c2e438a.html
 
-Risk factor : High";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/freebsd_phpmyadmin1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/freebsd_phpmyadmin1.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/freebsd_phpmyadmin1.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -31,8 +31,8 @@
  script_cve_id("CVE-2005-0543", "CVE-2005-0567");
  script_bugtraq_id(12644,12645);
  script_version ("$");
- script_tag(name:"cvss_base", value:"7.5");
- script_tag(name:"risk_factor", value:"High");
+ script_tag(name:"cvss_base", value:"4.3");
+ script_tag(name:"risk_factor", value:"Medium");
  name = "FreeBSD Ports: phpmyadmin, phpMyAdmin";
  script_name(name);
 
@@ -67,7 +67,7 @@
 http://marc.theaimsgroup.com/?l=bugtraq&m=110929725801154
 http://www.vuxml.org/freebsd/882ef43b-901f-11d9-a22c-0001020eed82.html
 
-Risk factor : High";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/freebsd_phpmyadmin11.nasl
===================================================================
--- trunk/openvas-plugins/scripts/freebsd_phpmyadmin11.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/freebsd_phpmyadmin11.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -29,7 +29,7 @@
 if(description)
 {
  script_id(69995);
- script_tag(name:"cvss_base", value:"7.5");
+ script_tag(name:"cvss_base", value:"6.4");
  script_cve_id("CVE-2011-2505", "CVE-2011-2506", "CVE-2011-2507", "CVE-2011-2508");
  script_tag(name:"risk_factor", value:"High");
  script_version ("$Revision$");

Modified: trunk/openvas-plugins/scripts/freebsd_phpnuke.nasl
===================================================================
--- trunk/openvas-plugins/scripts/freebsd_phpnuke.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/freebsd_phpnuke.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,8 +30,8 @@
  script_id(52438);
  script_cve_id("CVE-2003-0279", "CVE-2003-0318", "CVE-2004-0266", "CVE-2004-0269");
  script_version ("$");
- script_tag(name:"cvss_base", value:"6.4");
- script_tag(name:"risk_factor", value:"High");
+ script_tag(name:"cvss_base", value:"2.6");
+ script_tag(name:"risk_factor", value:"Medium");
  name = "FreeBSD Ports: phpnuke";
  script_name(name);
 
@@ -70,7 +70,7 @@
 http://secunia.com/advisories/11920
 http://www.vuxml.org/freebsd/33ab4a47-bfc1-11d8-b00e-000347a4fa7d.html
 
-Risk factor : High";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/freebsd_pidgin.nasl
===================================================================
--- trunk/openvas-plugins/scripts/freebsd_pidgin.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/freebsd_pidgin.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -32,8 +32,8 @@
  script_cve_id("CVE-2009-1373", "CVE-2009-1374", "CVE-2009-1375", "CVE-2009-1376");
  script_bugtraq_id(35067);
  script_version ("$");
- script_tag(name:"cvss_base", value:"9.3");
- script_tag(name:"risk_factor", value:"Critical");
+ script_tag(name:"cvss_base", value:"7.1");
+ script_tag(name:"risk_factor", value:"High");
  name = "FreeBSD Ports: pidgin, libpurple, finch";
  script_name(name);
 
@@ -80,7 +80,7 @@
 http://www.pidgin.im/news/security/?id=32
 http://www.vuxml.org/freebsd/b1ca65e6-5aaf-11de-bc9b-0030843d3802.html
 
-Risk factor: Critical";
+Risk factor : High";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/freebsd_png0.nasl
===================================================================
--- trunk/openvas-plugins/scripts/freebsd_png0.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/freebsd_png0.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,7 +30,7 @@
  script_id(58784);
  script_cve_id("CVE-2007-5267", "CVE-2007-5266", "CVE-2007-5268", "CVE-2007-5269");
  script_version ("$");
- script_tag(name:"cvss_base", value:"5.0");
+ script_tag(name:"cvss_base", value:"4.3");
  script_tag(name:"risk_factor", value:"Medium");
  name = "FreeBSD Ports: png";
  script_name(name);
@@ -50,7 +50,7 @@
 http://secunia.com/advisories/27130/
 http://www.vuxml.org/freebsd/172acf78-780c-11dc-b3f4-0016179b2dd5.html
 
-Risk factor: Medium";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/freebsd_postfix-policyd-weight.nasl
===================================================================
--- trunk/openvas-plugins/scripts/freebsd_postfix-policyd-weight.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/freebsd_postfix-policyd-weight.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -31,7 +31,7 @@
  script_cve_id("CVE-2008-1569");
  script_bugtraq_id(28480);
  script_version ("$");
- script_tag(name:"cvss_base", value:"4.6");
+ script_tag(name:"cvss_base", value:"3.3");
  script_tag(name:"risk_factor", value:"Medium");
  name = "FreeBSD Ports: postfix-policyd-weight";
  script_name(name);
@@ -49,7 +49,7 @@
 http://article.gmane.org/gmane.mail.postfix.policyd-weight/823
 http://www.vuxml.org/freebsd/072a53e0-0397-11dd-bd06-0017319806e7.html
 
-Risk factor: Medium";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/freebsd_postgresql-client.nasl
===================================================================
--- trunk/openvas-plugins/scripts/freebsd_postgresql-client.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/freebsd_postgresql-client.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -31,7 +31,7 @@
  script_id(66611);
  script_cve_id("CVE-2009-4034", "CVE-2009-4136");
  script_version ("$Revision$");
- script_tag(name:"cvss_base", value:"6.5");
+ script_tag(name:"cvss_base", value:"5.8");
  script_tag(name:"risk_factor", value:"High");
  script_name("FreeBSD Ports: postgresql-client, postgresql-server");
 

Modified: trunk/openvas-plugins/scripts/freebsd_postgresql3.nasl
===================================================================
--- trunk/openvas-plugins/scripts/freebsd_postgresql3.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/freebsd_postgresql3.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,7 +30,7 @@
  script_id(57256);
  script_cve_id("CVE-2005-0244", "CVE-2005-0245", "CVE-2005-0246");
  script_version ("$");
- script_tag(name:"cvss_base", value:"7.5");
+ script_tag(name:"cvss_base", value:"6.5");
  script_tag(name:"risk_factor", value:"High");
  name = "FreeBSD Ports: postgresql, postgresql-server, ja-postgresql";
  script_name(name);

Modified: trunk/openvas-plugins/scripts/freebsd_postgresql4.nasl
===================================================================
--- trunk/openvas-plugins/scripts/freebsd_postgresql4.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/freebsd_postgresql4.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -31,7 +31,7 @@
  script_cve_id("CVE-2007-6600", "CVE-2007-4772", "CVE-2007-6067", "CVE-2007-4769", "CVE-2007-6601");
  script_bugtraq_id(27163);
  script_version ("$");
- script_tag(name:"cvss_base", value:"7.2");
+ script_tag(name:"cvss_base", value:"6.5");
  script_tag(name:"risk_factor", value:"High");
  name = "FreeBSD Ports: postgresql, postgresql-server";
  script_name(name);

Modified: trunk/openvas-plugins/scripts/freebsd_postnuke1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/freebsd_postnuke1.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/freebsd_postnuke1.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,8 +30,8 @@
  script_id(54492);
  script_cve_id("CVE-2005-1621", "CVE-2005-1695", "CVE-2005-1696", "CVE-2005-1698", "CVE-2005-1777", "CVE-2005-1778", "CVE-2005-1921");
  script_version ("$");
- script_tag(name:"cvss_base", value:"7.5");
- script_tag(name:"risk_factor", value:"High");
+ script_tag(name:"cvss_base", value:"5.0");
+ script_tag(name:"risk_factor", value:"Medium");
  name = "FreeBSD Ports: postnuke";
  script_name(name);
 
@@ -98,7 +98,7 @@
 http://marc.theaimsgroup.com/?l=bugtraq&m=111721364707520
 http://www.vuxml.org/freebsd/0274a9f1-0759-11da-bc08-0001020eed82.html
 
-Risk factor : High";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/freebsd_powerdns-recursor0.nasl
===================================================================
--- trunk/openvas-plugins/scripts/freebsd_powerdns-recursor0.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/freebsd_powerdns-recursor0.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -32,8 +32,8 @@
  script_cve_id("CVE-2009-4010", "CVE-2009-4009");
  script_bugtraq_id(37650,37653);
  script_version ("$Revision$");
- script_tag(name:"cvss_base", value:"10.0");
- script_tag(name:"risk_factor", value:"Critical");
+ script_tag(name:"cvss_base", value:"7.5");
+ script_tag(name:"risk_factor", value:"High");
  script_name("FreeBSD Ports: powerdns-recursor");
 
  desc = "The remote host is missing an update to the system
@@ -55,7 +55,7 @@
 software upgrades.
 
 
-Risk factor: Critical";
+Risk factor : High";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/freebsd_quake2forge.nasl
===================================================================
--- trunk/openvas-plugins/scripts/freebsd_quake2forge.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/freebsd_quake2forge.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -31,8 +31,8 @@
  script_cve_id("CVE-2004-2598", "CVE-2004-2597", "CVE-2004-2596", "CVE-2004-2595", "CVE-2004-2594", "CVE-2004-2593", "CVE-2004-2592");
  script_bugtraq_id(11551);
  script_version ("$");
- script_tag(name:"cvss_base", value:"7.5");
- script_tag(name:"risk_factor", value:"High");
+ script_tag(name:"cvss_base", value:"5.0");
+ script_tag(name:"risk_factor", value:"Medium");
  name = "FreeBSD Ports: quake2forge";
  script_name(name);
 
@@ -56,7 +56,7 @@
 http://marc.theaimsgroup.com/?l=bugtraq&m=109892527321706
 http://www.vuxml.org/freebsd/2c25e762-6bb9-11d9-93db-000a95bc6fae.html
 
-Risk factor : High";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/freebsd_rt.nasl
===================================================================
--- trunk/openvas-plugins/scripts/freebsd_rt.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/freebsd_rt.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -32,7 +32,7 @@
  script_cve_id("CVE-2009-3585");
  script_bugtraq_id(37162);
  script_version ("$Revision$");
- script_tag(name:"cvss_base", value:"7.5");
+ script_tag(name:"cvss_base", value:"5.8");
  script_tag(name:"risk_factor", value:"High");
  script_name("FreeBSD Ports: rt");
 

Modified: trunk/openvas-plugins/scripts/freebsd_samba12.nasl
===================================================================
--- trunk/openvas-plugins/scripts/freebsd_samba12.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/freebsd_samba12.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,8 +30,8 @@
  script_id(58855);
  script_cve_id("CVE-2007-2444", "CVE-2007-2446", "CVE-2007-2447");
  script_version ("$");
- script_tag(name:"cvss_base", value:"10.0");
- script_tag(name:"risk_factor", value:"Critical");
+ script_tag(name:"cvss_base", value:"7.2");
+ script_tag(name:"risk_factor", value:"High");
  name = "FreeBSD Ports: samba, ja-samba";
  script_name(name);
 
@@ -53,7 +53,7 @@
 http://de5.samba.org/samba/security/CVE-2007-2447.html
 http://www.vuxml.org/freebsd/3546a833-03ea-11dc-a51d-0019b95d4f14.html
 
-Risk factor: Critical";
+Risk factor : High";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/freebsd_sdl_image.nasl
===================================================================
--- trunk/openvas-plugins/scripts/freebsd_sdl_image.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/freebsd_sdl_image.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,8 +30,8 @@
  script_id(60950);
  script_cve_id("CVE-2007-6697", "CVE-2008-0544");
  script_version ("$");
- script_tag(name:"cvss_base", value:"10.0");
- script_tag(name:"risk_factor", value:"Critical");
+ script_tag(name:"cvss_base", value:"7.5");
+ script_tag(name:"risk_factor", value:"High");
  name = "FreeBSD Ports: sdl_image";
  script_name(name);
 
@@ -61,7 +61,7 @@
 http://secunia.com/advisories/28640
 http://www.vuxml.org/freebsd/b1bcab7d-1880-11dd-a914-0016179b2dd5.html
 
-Risk factor: Critical";
+Risk factor : High";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/freebsd_seamonkey.nasl
===================================================================
--- trunk/openvas-plugins/scripts/freebsd_seamonkey.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/freebsd_seamonkey.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -31,8 +31,8 @@
  script_id(67138);
  script_cve_id("CVE-2010-0161", "CVE-2010-0163", "CVE-2009-3075", "CVE-2009-3072", "CVE-2009-2463", "CVE-2009-3385", "CVE-2009-3983", "CVE-2009-3376", "CVE-2009-0689", "CVE-2009-3077");
  script_version ("$Revision$");
- script_tag(name:"cvss_base", value:"10.0");
- script_tag(name:"risk_factor", value:"Critical");
+ script_tag(name:"cvss_base", value:"4.3");
+ script_tag(name:"risk_factor", value:"Medium");
  script_name("FreeBSD Ports: seamonkey, linux-seamonkey");
 
  desc = "The remote host is missing an update to the system
@@ -59,7 +59,7 @@
 http://www.mozilla.org/security/announce/2009/mfsa2009-49.html
 http://www.vuxml.org/freebsd/56cfe192-329f-11df-abb2-000f20797ede.html
 
-Risk factor: Critical";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/freebsd_seamonkey0.nasl
===================================================================
--- trunk/openvas-plugins/scripts/freebsd_seamonkey0.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/freebsd_seamonkey0.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -31,8 +31,8 @@
  script_id(67218);
  script_cve_id("CVE-2010-0181", "CVE-2009-3555", "CVE-2010-0179", "CVE-2010-0178", "CVE-2010-0177", "CVE-2010-0176", "CVE-2010-0175", "CVE-2010-0174", "CVE-2010-0173");
  script_version ("$Revision$");
- script_tag(name:"cvss_base", value:"10.0");
- script_tag(name:"risk_factor", value:"Critical");
+ script_tag(name:"cvss_base", value:"4.3");
+ script_tag(name:"risk_factor", value:"Medium");
  script_name("FreeBSD Ports: seamonkey");
 
  desc = "The remote host is missing an update to the system
@@ -60,7 +60,7 @@
 http://www.mozilla.org/security/announce/2010/mfsa2010-16.html
 http://www.vuxml.org/freebsd/9ccfee39-3c3b-11df-9edc-000f20797ede.html
 
-Risk factor: Critical";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/freebsd_shtool.nasl
===================================================================
--- trunk/openvas-plugins/scripts/freebsd_shtool.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/freebsd_shtool.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -31,8 +31,8 @@
  script_cve_id("CVE-2005-1759", "CVE-2005-1751");
  script_bugtraq_id(13767);
  script_version ("$");
- script_tag(name:"cvss_base", value:"3.7");
- script_tag(name:"risk_factor", value:"Medium");
+ script_tag(name:"cvss_base", value:"1.2");
+ script_tag(name:"risk_factor", value:"Low");
  name = "FreeBSD Ports: shtool";
  script_name(name);
 
@@ -48,7 +48,7 @@
 http://www.zataz.net/adviso/shtool-05252005.txt
 http://www.vuxml.org/freebsd/6596bb80-d026-11d9-9aed-000e0c2e438a.html
 
-Risk factor: Medium";
+Risk factor : Low";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/freebsd_skype.nasl
===================================================================
--- trunk/openvas-plugins/scripts/freebsd_skype.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/freebsd_skype.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,7 +30,7 @@
  script_id(55778);
  script_cve_id("CVE-2005-3265", "CVE-2005-3267");
  script_version ("$");
- script_tag(name:"cvss_base", value:"10.0");
+ script_tag(name:"cvss_base", value:"9.3");
  script_tag(name:"risk_factor", value:"Critical");
  name = "FreeBSD Ports: skype";
  script_name(name);
@@ -49,7 +49,7 @@
 http://skype.com/security/skype-sb-2005-03.html
 http://www.vuxml.org/freebsd/70fc13d9-4ab4-11da-932d-00055d790c25.html
 
-Risk factor: Critical";
+Risk factor : Critical";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/freebsd_squirrelmail.nasl
===================================================================
--- trunk/openvas-plugins/scripts/freebsd_squirrelmail.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/freebsd_squirrelmail.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,7 +30,7 @@
  script_id(52996);
  script_cve_id("CVE-2004-1036", "CVE-2005-0075", "CVE-2005-0103", "CVE-2005-0104");
  script_version ("$");
- script_tag(name:"cvss_base", value:"7.5");
+ script_tag(name:"cvss_base", value:"6.8");
  script_tag(name:"risk_factor", value:"High");
  name = "FreeBSD Ports: squirrelmail, ja-squirrelmail";
  script_name(name);

Modified: trunk/openvas-plugins/scripts/freebsd_thunderbird0.nasl
===================================================================
--- trunk/openvas-plugins/scripts/freebsd_thunderbird0.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/freebsd_thunderbird0.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,8 +30,8 @@
  script_id(52364);
  script_cve_id("CVE-2004-0905", "CVE-2004-0908", "CVE-2004-0909");
  script_version ("$");
- script_tag(name:"cvss_base", value:"5.1");
- script_tag(name:"risk_factor", value:"High");
+ script_tag(name:"cvss_base", value:"4.6");
+ script_tag(name:"risk_factor", value:"Medium");
  name = "FreeBSD Ports: thunderbird";
  script_name(name);
 
@@ -100,7 +100,7 @@
 http://bugzilla.mozilla.org/show_bug.cgi?id=253942
 http://www.vuxml.org/freebsd/b2e6d1d6-1339-11d9-bc4a-000c41e2cdad.html
 
-Risk factor : High";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/freebsd_tikiwik.nasl
===================================================================
--- trunk/openvas-plugins/scripts/freebsd_tikiwik.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/freebsd_tikiwik.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,8 +30,8 @@
  script_id(58767);
  script_cve_id("CVE-2007-4554", "CVE-2007-5683", "CVE-2007-5684");
  script_version ("$");
- script_tag(name:"cvss_base", value:"7.5");
- script_tag(name:"risk_factor", value:"High");
+ script_tag(name:"cvss_base", value:"4.3");
+ script_tag(name:"risk_factor", value:"Medium");
  name = "FreeBSD Ports: tikiwik";
  script_name(name);
 
@@ -50,7 +50,7 @@
 http://tikiwiki.cvs.sourceforge.net/tikiwiki/tiki/changelog.txt?view=markup&pathrev=REL-1-9-8-2
 http://www.vuxml.org/freebsd/20a4eb11-8ea3-11dc-a396-0016179b2dd5.html
 
-Risk factor : High";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/freebsd_tikiwiki.nasl
===================================================================
--- trunk/openvas-plugins/scripts/freebsd_tikiwiki.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/freebsd_tikiwiki.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -31,8 +31,8 @@
  script_cve_id("CVE-2006-4299", "CVE-2006-4602");
  script_bugtraq_id(19654,19819);
  script_version ("$");
- script_tag(name:"cvss_base", value:"7.5");
- script_tag(name:"risk_factor", value:"High");
+ script_tag(name:"cvss_base", value:"4.3");
+ script_tag(name:"risk_factor", value:"Medium");
  name = "FreeBSD Ports: tikiwiki";
  script_name(name);
 
@@ -49,7 +49,7 @@
 http://secunia.com/advisories/21733/
 http://www.vuxml.org/freebsd/e4c62abd-5065-11db-a5ae-00508d6a62df.html
 
-Risk factor : High";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/freebsd_tomcat.nasl
===================================================================
--- trunk/openvas-plugins/scripts/freebsd_tomcat.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/freebsd_tomcat.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -31,7 +31,7 @@
  script_id(67355);
  script_cve_id("CVE-2010-1157");
  script_version ("$Revision$");
- script_tag(name:"cvss_base", value:"5.0");
+ script_tag(name:"cvss_base", value:"2.6");
  script_tag(name:"risk_factor", value:"Medium");
  script_name("FreeBSD Ports: tomcat");
 
@@ -54,7 +54,7 @@
 http://seclists.org/bugtraq/2010/Apr/200
 http://www.vuxml.org/freebsd/3383e706-4fc3-11df-83fb-0015587e2cc1.html
 
-Risk factor: Medium";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/freebsd_tor5.nasl
===================================================================
--- trunk/openvas-plugins/scripts/freebsd_tor5.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/freebsd_tor5.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -29,10 +29,10 @@
 if(description)
 {
  script_id(68817);
- script_tag(name:"cvss_base", value:"10.0");
+ script_tag(name:"cvss_base", value:"6.8");
  script_cve_id("CVE-2011-0427");
  script_bugtraq_id(45832);
- script_tag(name:"risk_factor", value:"Critical");
+ script_tag(name:"risk_factor", value:"High");
  script_version ("$Revision$");
  script_name("FreeBSD Ports: tor");
 
@@ -58,7 +58,7 @@
 http://archives.seul.org/or/announce/Jan-2011/msg00000.html
 http://www.vuxml.org/freebsd/38bdf10e-2293-11e0-bfa4-001676740879.html
 
-Risk factor : Critical";
+Risk factor : High";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/freebsd_tptest.nasl
===================================================================
--- trunk/openvas-plugins/scripts/freebsd_tptest.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/freebsd_tptest.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -32,8 +32,8 @@
  script_cve_id("CVE-2009-0650");
  script_bugtraq_id(33785);
  script_version ("$Revision$");
- script_tag(name:"cvss_base", value:"5.0");
- script_tag(name:"risk_factor", value:"Medium");
+ script_tag(name:"cvss_base", value:"10.0");
+ script_tag(name:"risk_factor", value:"Critical");
  script_name("FreeBSD Ports: tptest");
 
  desc = "The remote host is missing an update to the system
@@ -46,7 +46,7 @@
 software upgrades.
 
 
-Risk factor: Medium";
+Risk factor : Critical";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/freebsd_twiki2.nasl
===================================================================
--- trunk/openvas-plugins/scripts/freebsd_twiki2.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/freebsd_twiki2.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -32,8 +32,8 @@
  script_cve_id("CVE-2008-5304", "CVE-2008-5305");
  script_bugtraq_id(32668,32669);
  script_version ("$");
- script_tag(name:"cvss_base", value:"10.0");
- script_tag(name:"risk_factor", value:"Critical");
+ script_tag(name:"cvss_base", value:"4.3");
+ script_tag(name:"risk_factor", value:"Medium");
  name = "FreeBSD Ports: twiki";
  script_name(name);
 
@@ -63,7 +63,7 @@
 http://xforce.iss.net/xforce/xfdb/45293
 http://www.vuxml.org/freebsd/f98dea27-d687-11dd-abd1-0050568452ac.html
 
-Risk factor: Critical";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/freebsd_typo31.nasl
===================================================================
--- trunk/openvas-plugins/scripts/freebsd_typo31.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/freebsd_typo31.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -31,8 +31,8 @@
  script_id(63361);
  script_cve_id("CVE-2009-0255", "CVE-2009-0256", "CVE-2009-0257", "CVE-2009-0258");
  script_version ("$");
- script_tag(name:"cvss_base", value:"10.0");
- script_tag(name:"risk_factor", value:"Critical");
+ script_tag(name:"cvss_base", value:"5.0");
+ script_tag(name:"risk_factor", value:"Medium");
  name = "FreeBSD Ports: typo3";
  script_name(name);
 
@@ -77,7 +77,7 @@
 http://typo3.org/teams/security/security-bulletins/typo3-sa-2009-001/
 http://www.vuxml.org/freebsd/653606e9-f6ac-11dd-94d9-0030843d3802.html
 
-Risk factor: Critical";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/freebsd_typo32.nasl
===================================================================
--- trunk/openvas-plugins/scripts/freebsd_typo32.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/freebsd_typo32.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -32,8 +32,8 @@
  script_cve_id("CVE-2009-3628", "CVE-2009-3629", "CVE-2009-3630", "CVE-2009-3631", "CVE-2009-3632", "CVE-2009-3633", "CVE-2009-3634", "CVE-2009-3635", "CVE-2009-3636");
  script_bugtraq_id(36801);
  script_version ("$Revision$");
- script_tag(name:"cvss_base", value:"8.5");
- script_tag(name:"risk_factor", value:"Critical");
+ script_tag(name:"cvss_base", value:"4.0");
+ script_tag(name:"risk_factor", value:"Medium");
  script_name("FreeBSD Ports: typo3");
 
  desc = "The remote host is missing an update to the system
@@ -106,7 +106,7 @@
 http://secunia.com/advisories/37122/
 http://www.vuxml.org/freebsd/6693bad2-ca50-11de-8ee8-00215c6a37bb.html
 
-Risk factor: Critical";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/freebsd_vim0.nasl
===================================================================
--- trunk/openvas-plugins/scripts/freebsd_vim0.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/freebsd_vim0.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -31,7 +31,7 @@
  script_cve_id("CVE-2005-2368");
  script_bugtraq_id(14374);
  script_version ("$");
- script_tag(name:"cvss_base", value:"10.0");
+ script_tag(name:"cvss_base", value:"9.3");
  script_tag(name:"risk_factor", value:"Critical");
  name = "FreeBSD Ports: vim, vim-lite, vim+ruby";
  script_name(name);
@@ -57,7 +57,7 @@
 http://www.guninski.com/where_do_you_want_billg_to_go_today_5.html
 http://www.vuxml.org/freebsd/81f127a8-0038-11da-86bc-000e0c2e438a.html
 
-Risk factor: Critical";
+Risk factor : Critical";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/freebsd_webkit-gtk2.nasl
===================================================================
--- trunk/openvas-plugins/scripts/freebsd_webkit-gtk2.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/freebsd_webkit-gtk2.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -29,7 +29,7 @@
 if(description)
 {
  script_id(67711);
- script_tag(name:"cvss_base", value:"9.3");
+ script_tag(name:"cvss_base", value:"10.0");
  script_cve_id("CVE-2010-1386", "CVE-2010-1392", "CVE-2010-1405", "CVE-2010-1407", "CVE-2010-1416", "CVE-2010-1417", "CVE-2010-1418", "CVE-2010-1421", "CVE-2010-1422", "CVE-2010-1501", "CVE-2010-1664", "CVE-2010-1665", "CVE-2010-1758", "CVE-2010-1759", "CVE-2010-1760", "CVE-2010-1761", "CVE-2010-1762", "CVE-2010-1767", "CVE-2010-1770", "CVE-2010-1771", "CVE-2010-1772", "CVE-2010-1773", "CVE-2010-1774");
  script_tag(name:"risk_factor", value:"Critical");
  script_version ("$Revision$");

Modified: trunk/openvas-plugins/scripts/freebsd_webkit-gtk21.nasl
===================================================================
--- trunk/openvas-plugins/scripts/freebsd_webkit-gtk21.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/freebsd_webkit-gtk21.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -29,7 +29,7 @@
 if(description)
 {
  script_id(68513);
- script_tag(name:"cvss_base", value:"10.0");
+ script_tag(name:"cvss_base", value:"9.3");
  script_cve_id("CVE-2010-1780", "CVE-2010-1807", "CVE-2010-1812", "CVE-2010-1814", "CVE-2010-1815", "CVE-2010-3113", "CVE-2010-3114", "CVE-2010-3115", "CVE-2010-3116", "CVE-2010-3257", "CVE-2010-3259");
  script_tag(name:"risk_factor", value:"Critical");
  script_version ("$Revision$");

Modified: trunk/openvas-plugins/scripts/freebsd_websvn.nasl
===================================================================
--- trunk/openvas-plugins/scripts/freebsd_websvn.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/freebsd_websvn.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -31,8 +31,8 @@
  script_id(63358);
  script_cve_id("CVE-2008-5918", "CVE-2008-5919", "CVE-2009-0240");
  script_version ("$");
- script_tag(name:"cvss_base", value:"6.8");
- script_tag(name:"risk_factor", value:"High");
+ script_tag(name:"cvss_base", value:"4.3");
+ script_tag(name:"risk_factor", value:"Medium");
  name = "FreeBSD Ports: websvn";
  script_name(name);
 
@@ -67,7 +67,7 @@
 http://www.gulftech.org/?node=research&article_id=00132-10202008
 http://www.vuxml.org/freebsd/71597e3e-f6b8-11dd-94d9-0030843d3802.html
 
-Risk factor : High";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/freebsd_wireshark0.nasl
===================================================================
--- trunk/openvas-plugins/scripts/freebsd_wireshark0.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/freebsd_wireshark0.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,8 +30,8 @@
  script_id(60052);
  script_cve_id("CVE-2007-6438", "CVE-2007-6439", "CVE-2007-6441", "CVE-2007-6450", "CVE-2007-6451");
  script_version ("$");
- script_tag(name:"cvss_base", value:"5.7");
- script_tag(name:"risk_factor", value:"High");
+ script_tag(name:"cvss_base", value:"5.0");
+ script_tag(name:"risk_factor", value:"Medium");
  name = "wireshark -- multiple vulnerabilities";
  script_name(name);
 
@@ -83,7 +83,7 @@
 http://www.wireshark.org/security/wnpa-sec-2007-03.html
 http://www.vuxml.org/freebsd/8a835235-ae84-11dc-a5f9-001a4d49522b.html
 
-Risk factor : High";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/freebsd_wordpress0.nasl
===================================================================
--- trunk/openvas-plugins/scripts/freebsd_wordpress0.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/freebsd_wordpress0.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,8 +30,8 @@
  script_id(54000);
  script_cve_id("CVE-2005-2107", "CVE-2005-2108", "CVE-2005-2109", "CVE-2005-2110");
  script_version ("$");
- script_tag(name:"cvss_base", value:"7.5");
- script_tag(name:"risk_factor", value:"High");
+ script_tag(name:"cvss_base", value:"4.3");
+ script_tag(name:"risk_factor", value:"Medium");
  name = "FreeBSD Ports: wordpress";
  script_name(name);
 
@@ -69,7 +69,7 @@
 http://marc.theaimsgroup.com/?l=bugtraq&m=112006967221438
 http://www.vuxml.org/freebsd/dca0a345-ed81-11d9-8310-0001020eed82.html
 
-Risk factor : High";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/freebsd_xfce4-panel.nasl
===================================================================
--- trunk/openvas-plugins/scripts/freebsd_xfce4-panel.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/freebsd_xfce4-panel.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,8 +30,8 @@
  script_id(60227);
  script_cve_id("CVE-2007-6531", "CVE-2007-6532");
  script_version ("$");
- script_tag(name:"cvss_base", value:"10.0");
- script_tag(name:"risk_factor", value:"Critical");
+ script_tag(name:"cvss_base", value:"5.0");
+ script_tag(name:"risk_factor", value:"Medium");
  name = "FreeBSD Ports: xfce4-panel, libxfce4gui";
  script_name(name);
 
@@ -64,7 +64,7 @@
 http://www.gentoo.org/security/en/glsa/glsa-200801-06.xml
 http://www.vuxml.org/freebsd/024edd06-c933-11dc-810c-0016179b2dd5.html
 
-Risk factor: Critical";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/freebsd_xorg-server1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/freebsd_xorg-server1.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/freebsd_xorg-server1.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,7 +30,7 @@
  script_id(61190);
  script_cve_id("CVE-2008-1377", "CVE-2008-1379", "CVE-2008-2360", "CVE-2008-2361", "CVE-2008-2362");
  script_version ("$");
- script_tag(name:"cvss_base", value:"10.0");
+ script_tag(name:"cvss_base", value:"9.0");
  script_tag(name:"risk_factor", value:"Critical");
  name = "FreeBSD Ports: xorg-server";
  script_name(name);
@@ -86,7 +86,7 @@
 http://secunia.com/advisories/30627/
 http://www.vuxml.org/freebsd/800e8bd5-3acb-11dd-8842-001302a18722.html
 
-Risk factor: Critical";
+Risk factor : Critical";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/freebsd_xpdf3.nasl
===================================================================
--- trunk/openvas-plugins/scripts/freebsd_xpdf3.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/freebsd_xpdf3.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -31,8 +31,8 @@
  script_id(63861);
  script_cve_id("CVE-2009-0146", "CVE-2009-0147", "CVE-2009-0166", "CVE-2009-0799", "CVE-2009-0800", "CVE-2009-1179", "CVE-2009-1180", "CVE-2009-1181", "CVE-2009-1182", "CVE-2009-1183");
  script_version ("$");
- script_tag(name:"cvss_base", value:"7.5");
- script_tag(name:"risk_factor", value:"High");
+ script_tag(name:"cvss_base", value:"4.3");
+ script_tag(name:"risk_factor", value:"Medium");
  name = "FreeBSD Ports: xpdf";
  script_name(name);
 
@@ -49,7 +49,7 @@
 http://www.vupen.com/english/advisories/2009/1065
 http://www.vuxml.org/freebsd/a21037d5-2c38-11de-ab3b-0017a4cccfc6.html
 
-Risk factor : High";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/freebsdsa_bind10.nasl
===================================================================
--- trunk/openvas-plugins/scripts/freebsdsa_bind10.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/freebsdsa_bind10.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,9 +30,10 @@
 {
  script_id(69771);
  script_cve_id("CVE-2011-1910");
- script_version ("$Revision$");
+ script_tag(name:"cvss_base", value:"5.0");
+ script_version("$Revision$");
  script_name("FreeBSD Security Advisory (FreeBSD-SA-11:02.bind.asc)");
- script_tag(name:"risk_factor", value:"High");
+ script_tag(name:"risk_factor", value:"Medium");
 
  desc = "The remote host is missing an update to the system
 as announced in the referenced advisory FreeBSD-SA-11:02.bind.asc
@@ -52,7 +53,7 @@
 or security branch dated after the correction date
 
 https://secure1.securityspace.com/smysecure/catid.html?in=FreeBSD-SA-11:02.bind.asc
-Risk factor : High";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/freebsdsa_bind8.nasl
===================================================================
--- trunk/openvas-plugins/scripts/freebsdsa_bind8.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/freebsdsa_bind8.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -31,7 +31,7 @@
  script_id(66661);
  script_cve_id("CVE-2009-4022");
  script_version ("$Revision$");
- script_tag(name:"cvss_base", value:"4.0");
+ script_tag(name:"cvss_base", value:"2.6");
  script_tag(name:"risk_factor", value:"Medium");
  script_name("FreeBSD Security Advisory (FreeBSD-SA-10:01.bind.asc)");
 
@@ -53,7 +53,7 @@
 or security branch dated after the correction date
 
 https://secure1.securityspace.com/smysecure/catid.html?in=FreeBSD-SA-10:01.bind.asc
-Risk factor: Medium";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/freebsdsa_ssl.nasl
===================================================================
--- trunk/openvas-plugins/scripts/freebsdsa_ssl.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/freebsdsa_ssl.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -31,7 +31,7 @@
  script_id(66353);
  script_cve_id("CVE-2009-3555");
  script_version ("$Revision$");
- script_tag(name:"cvss_base", value:"6.4");
+ script_tag(name:"cvss_base", value:"5.8");
  script_tag(name:"risk_factor", value:"High");
  script_name("FreeBSD Security Advisory (FreeBSD-SA-09:15.ssl.asc)");
 

Modified: trunk/openvas-plugins/scripts/freesshd_key_exchange_overflow.nasl
===================================================================
--- trunk/openvas-plugins/scripts/freesshd_key_exchange_overflow.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/freesshd_key_exchange_overflow.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -25,8 +25,8 @@
 if (description) {
  script_id(200012);
  script_version("$Revision: 1.0 $");
- script_tag(name:"cvss_base", value:"10.0");
- script_tag(name:"risk_factor", value:"Critical");
+ script_tag(name:"cvss_base", value:"7.5");
+ script_tag(name:"risk_factor", value:"High");
 
  script_cve_id("CVE-2006-2407");
  script_bugtraq_id(17958);

Modified: trunk/openvas-plugins/scripts/gb_CESA-2011_0841_systemtap_centos5_i386.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_CESA-2011_0841_systemtap_centos5_i386.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/gb_CESA-2011_0841_systemtap_centos5_i386.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -26,8 +26,9 @@
 if(description)
 {
   script_id(880519);
-  script_version("$Revision$: 1.0");
-  script_tag(name:"risk_factor", value:"High");
+  script_tag(name:"cvss_base", value:"1.2");
+ script_version("$Revision$: 1.0");
+  script_tag(name:"risk_factor", value:"Low");
   script_xref(name: "CESA", value: "2011:0841");
   script_cve_id("CVE-2011-1769");
   script_name("CentOS Update for systemtap CESA-2011:0841 centos5 i386");

Modified: trunk/openvas-plugins/scripts/gb_CESA-2011_1155_xorg-x11_centos4_i386.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_CESA-2011_1155_xorg-x11_centos4_i386.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/gb_CESA-2011_1155_xorg-x11_centos4_i386.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -26,8 +26,9 @@
 if(description)
 {
   script_id(880955);
-  script_version("$Revision$: 1.0");
-  script_tag(name:"risk_factor", value:"High");
+  script_tag(name:"cvss_base", value:"9.3");
+ script_version("$Revision$: 1.0");
+  script_tag(name:"risk_factor", value:"Critical");
   script_xref(name: "CESA", value: "2011:1155");
   script_cve_id("CVE-2011-2895");
   script_name("CentOS Update for xorg-x11 CESA-2011:1155 centos4 i386");

Modified: trunk/openvas-plugins/scripts/gb_CESA-2011_1161_freetype_centos4_i386.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_CESA-2011_1161_freetype_centos4_i386.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/gb_CESA-2011_1161_freetype_centos4_i386.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -26,8 +26,9 @@
 if(description)
 {
   script_id(880965);
-  script_version("$Revision$: 1.0");
-  script_tag(name:"risk_factor", value:"High");
+  script_tag(name:"cvss_base", value:"9.3");
+ script_version("$Revision$: 1.0");
+  script_tag(name:"risk_factor", value:"Critical");
   script_xref(name: "CESA", value: "2011:1161");
   script_cve_id("CVE-2011-2895");
   script_name("CentOS Update for freetype CESA-2011:1161 centos4 i386");

Modified: trunk/openvas-plugins/scripts/gb_CESA-2011_1164_firefox_centos4_i386.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_CESA-2011_1164_firefox_centos4_i386.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/gb_CESA-2011_1164_firefox_centos4_i386.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -26,8 +26,9 @@
 if(description)
 {
   script_id(880962);
-  script_version("$Revision$: 1.0");
-  script_tag(name:"risk_factor", value:"High");
+  script_tag(name:"cvss_base", value:"10.0");
+ script_version("$Revision$: 1.0");
+  script_tag(name:"risk_factor", value:"Critical");
   script_xref(name: "CESA", value: "2011:1164");
   script_cve_id("CVE-2011-0084", "CVE-2011-2378", "CVE-2011-2981", "CVE-2011-2982", "CVE-2011-2983", "CVE-2011-2984");
   script_name("CentOS Update for firefox CESA-2011:1164 centos4 i386");

Modified: trunk/openvas-plugins/scripts/gb_CESA-2011_1165_thunderbird_centos4_i386.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_CESA-2011_1165_thunderbird_centos4_i386.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/gb_CESA-2011_1165_thunderbird_centos4_i386.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -26,8 +26,9 @@
 if(description)
 {
   script_id(880966);
-  script_version("$Revision$: 1.0");
-  script_tag(name:"risk_factor", value:"High");
+  script_tag(name:"cvss_base", value:"10.0");
+ script_version("$Revision$: 1.0");
+  script_tag(name:"risk_factor", value:"Critical");
   script_xref(name: "CESA", value: "2011:1165");
   script_cve_id("CVE-2011-2982", "CVE-2011-2983");
   script_name("CentOS Update for thunderbird CESA-2011:1165 centos4 i386");

Modified: trunk/openvas-plugins/scripts/gb_CESA-2011_1167_seamonkey_centos4_i386.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_CESA-2011_1167_seamonkey_centos4_i386.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/gb_CESA-2011_1167_seamonkey_centos4_i386.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -26,8 +26,9 @@
 if(description)
 {
   script_id(880963);
-  script_version("$Revision$: 1.0");
-  script_tag(name:"risk_factor", value:"High");
+  script_tag(name:"cvss_base", value:"10.0");
+ script_version("$Revision$: 1.0");
+  script_tag(name:"risk_factor", value:"Critical");
   script_xref(name: "CESA", value: "2011:1167");
   script_cve_id("CVE-2011-2982", "CVE-2011-2983");
   script_name("CentOS Update for seamonkey CESA-2011:1167 centos4 i386");

Modified: trunk/openvas-plugins/scripts/gb_CESA-2011_1196_system-config-printer_centos4_i386.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_CESA-2011_1196_system-config-printer_centos4_i386.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/gb_CESA-2011_1196_system-config-printer_centos4_i386.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -26,7 +26,8 @@
 if(description)
 {
   script_id(880968);
-  script_version("$Revision$: 1.0");
+  script_tag(name:"cvss_base", value:"5.1");
+ script_version("$Revision$: 1.0");
   script_tag(name:"risk_factor", value:"High");
   script_xref(name: "CESA", value: "2011:1196");
   script_cve_id("CVE-2011-2899");

Modified: trunk/openvas-plugins/scripts/gb_RHSA-2011_0841-01_systemtap.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_RHSA-2011_0841-01_systemtap.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/gb_RHSA-2011_0841-01_systemtap.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -26,8 +26,9 @@
 if(description)
 {
   script_id(870436);
-  script_version("$Revision$: 1.0");
-  script_tag(name:"risk_factor", value:"High");
+  script_tag(name:"cvss_base", value:"1.2");
+ script_version("$Revision$: 1.0");
+  script_tag(name:"risk_factor", value:"Low");
   script_xref(name: "RHSA", value: "2011:0841-01");
   script_cve_id("CVE-2011-1769");
   script_name("RedHat Update for systemtap RHSA-2011:0841-01");

Modified: trunk/openvas-plugins/scripts/gb_RHSA-2011_1154-01_libXfont.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_RHSA-2011_1154-01_libXfont.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/gb_RHSA-2011_1154-01_libXfont.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -26,8 +26,9 @@
 if(description)
 {
   script_id(870465);
-  script_version("$Revision$: 1.0");
-  script_tag(name:"risk_factor", value:"High");
+  script_tag(name:"cvss_base", value:"9.3");
+ script_version("$Revision$: 1.0");
+  script_tag(name:"risk_factor", value:"Critical");
   script_xref(name: "RHSA", value: "2011:1154-01");
   script_cve_id("CVE-2011-2895");
   script_name("RedHat Update for libXfont RHSA-2011:1154-01");

Modified: trunk/openvas-plugins/scripts/gb_RHSA-2011_1155-01_xorg-x11.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_RHSA-2011_1155-01_xorg-x11.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/gb_RHSA-2011_1155-01_xorg-x11.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -26,8 +26,9 @@
 if(description)
 {
   script_id(870463);
-  script_version("$Revision$: 1.0");
-  script_tag(name:"risk_factor", value:"High");
+  script_tag(name:"cvss_base", value:"9.3");
+ script_version("$Revision$: 1.0");
+  script_tag(name:"risk_factor", value:"Critical");
   script_xref(name: "RHSA", value: "2011:1155-01");
   script_cve_id("CVE-2011-2895");
   script_name("RedHat Update for xorg-x11 RHSA-2011:1155-01");

Modified: trunk/openvas-plugins/scripts/gb_RHSA-2011_1161-01_freetype.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_RHSA-2011_1161-01_freetype.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/gb_RHSA-2011_1161-01_freetype.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -26,8 +26,9 @@
 if(description)
 {
   script_id(870467);
-  script_version("$Revision$: 1.0");
-  script_tag(name:"risk_factor", value:"High");
+  script_tag(name:"cvss_base", value:"9.3");
+ script_version("$Revision$: 1.0");
+  script_tag(name:"risk_factor", value:"Critical");
   script_xref(name: "RHSA", value: "2011:1161-01");
   script_cve_id("CVE-2011-2895");
   script_name("RedHat Update for freetype RHSA-2011:1161-01");

Modified: trunk/openvas-plugins/scripts/gb_RHSA-2011_1164-01_firefox.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_RHSA-2011_1164-01_firefox.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/gb_RHSA-2011_1164-01_firefox.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -26,8 +26,9 @@
 if(description)
 {
   script_id(870472);
-  script_version("$Revision$: 1.0");
-  script_tag(name:"risk_factor", value:"High");
+  script_tag(name:"cvss_base", value:"10.0");
+ script_version("$Revision$: 1.0");
+  script_tag(name:"risk_factor", value:"Critical");
   script_xref(name: "RHSA", value: "2011:1164-01");
   script_cve_id("CVE-2011-0084", "CVE-2011-2378", "CVE-2011-2981", "CVE-2011-2982", "CVE-2011-2983", "CVE-2011-2984");
   script_name("RedHat Update for firefox RHSA-2011:1164-01");

Modified: trunk/openvas-plugins/scripts/gb_RHSA-2011_1165-01_thunderbird.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_RHSA-2011_1165-01_thunderbird.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/gb_RHSA-2011_1165-01_thunderbird.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -26,8 +26,9 @@
 if(description)
 {
   script_id(870469);
-  script_version("$Revision$: 1.0");
-  script_tag(name:"risk_factor", value:"High");
+  script_tag(name:"cvss_base", value:"10.0");
+ script_version("$Revision$: 1.0");
+  script_tag(name:"risk_factor", value:"Critical");
   script_xref(name: "RHSA", value: "2011:1165-01");
   script_cve_id("CVE-2011-2982", "CVE-2011-2983");
   script_name("RedHat Update for thunderbird RHSA-2011:1165-01");

Modified: trunk/openvas-plugins/scripts/gb_RHSA-2011_1167-01_seamonkey.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_RHSA-2011_1167-01_seamonkey.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/gb_RHSA-2011_1167-01_seamonkey.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -26,8 +26,9 @@
 if(description)
 {
   script_id(870468);
-  script_version("$Revision$: 1.0");
-  script_tag(name:"risk_factor", value:"High");
+  script_tag(name:"cvss_base", value:"10.0");
+ script_version("$Revision$: 1.0");
+  script_tag(name:"risk_factor", value:"Critical");
   script_xref(name: "RHSA", value: "2011:1167-01");
   script_cve_id("CVE-2011-2982", "CVE-2011-2983");
   script_name("RedHat Update for seamonkey RHSA-2011:1167-01");

Modified: trunk/openvas-plugins/scripts/gb_RHSA-2011_1196-01_system-config-printer.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_RHSA-2011_1196-01_system-config-printer.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/gb_RHSA-2011_1196-01_system-config-printer.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -26,7 +26,8 @@
 if(description)
 {
   script_id(870473);
-  script_version("$Revision$: 1.0");
+  script_tag(name:"cvss_base", value:"5.1");
+ script_version("$Revision$: 1.0");
   script_tag(name:"risk_factor", value:"High");
   script_xref(name: "RHSA", value: "2011:1196-01");
   script_cve_id("CVE-2011-2899");

Modified: trunk/openvas-plugins/scripts/gb_fedora_2011_10782_gimp_fc14.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_fedora_2011_10782_gimp_fc14.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/gb_fedora_2011_10782_gimp_fc14.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -27,8 +27,8 @@
 {
   script_id(863455);
   script_version("$Revision$: 1.0");
-  script_tag(name:"cvss_base", value:"9.3");
-  script_tag(name:"risk_factor", value:"Critical");
+  script_tag(name:"cvss_base", value:"5.1");
+  script_tag(name:"risk_factor", value:"High");
   script_xref(name: "FEDORA", value: "2011-10782");
   script_cve_id("CVE-2011-2896", "CVE-2010-4541", "CVE-2010-4542", "CVE-2010-4540", "CVE-2010-4543", "CVE-2011-1782");
   script_name("Fedora Update for gimp FEDORA-2011-10782");

Modified: trunk/openvas-plugins/scripts/gb_fedora_2011_10788_gimp_fc15.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_fedora_2011_10788_gimp_fc15.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/gb_fedora_2011_10788_gimp_fc15.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -27,8 +27,8 @@
 {
   script_id(863446);
   script_version("$Revision$: 1.0");
-  script_tag(name:"cvss_base", value:"9.3");
-  script_tag(name:"risk_factor", value:"Critical");
+  script_tag(name:"cvss_base", value:"5.1");
+  script_tag(name:"risk_factor", value:"High");
   script_xref(name: "FEDORA", value: "2011-10788");
   script_cve_id("CVE-2011-2896", "CVE-2010-4541", "CVE-2010-4542", "CVE-2010-4540", "CVE-2010-4543", "CVE-2011-1782");
   script_name("Fedora Update for gimp FEDORA-2011-10788");

Modified: trunk/openvas-plugins/scripts/gb_fedora_2011_7289_systemtap_fc13.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_fedora_2011_7289_systemtap_fc13.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/gb_fedora_2011_7289_systemtap_fc13.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -27,8 +27,8 @@
 {
   script_id(863106);
   script_version("$Revision$: 1.0");
-  script_tag(name:"cvss_base", value:"7.2");
-  script_tag(name:"risk_factor", value:"High");
+  script_tag(name:"cvss_base", value:"1.2");
+  script_tag(name:"risk_factor", value:"Low");
   script_xref(name: "FEDORA", value: "2011-7289");
   script_cve_id("CVE-2011-1781", "CVE-2011-1769", "CVE-2010-4170", "CVE-2010-4171");
   script_name("Fedora Update for systemtap FEDORA-2011-7289");

Modified: trunk/openvas-plugins/scripts/gb_fedora_2011_7302_systemtap_fc14.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_fedora_2011_7302_systemtap_fc14.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/gb_fedora_2011_7302_systemtap_fc14.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -27,8 +27,8 @@
 {
   script_id(863107);
   script_version("$Revision$: 1.0");
-  script_tag(name:"cvss_base", value:"7.2");
-  script_tag(name:"risk_factor", value:"High");
+  script_tag(name:"cvss_base", value:"1.2");
+  script_tag(name:"risk_factor", value:"Low");
   script_xref(name: "FEDORA", value: "2011-7302");
   script_cve_id("CVE-2011-1781", "CVE-2011-1769", "CVE-2010-4170", "CVE-2010-4171");
   script_name("Fedora Update for systemtap FEDORA-2011-7302");

Modified: trunk/openvas-plugins/scripts/gb_fedora_2011_7820_libxml_fc15.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_fedora_2011_7820_libxml_fc15.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/gb_fedora_2011_7820_libxml_fc15.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -26,8 +26,9 @@
 if(description)
 {
   script_id(863322);
-  script_version("$Revision$: 1.0");
-  script_tag(name:"risk_factor", value:"High");
+  script_tag(name:"cvss_base", value:"9.3");
+ script_version("$Revision$: 1.0");
+  script_tag(name:"risk_factor", value:"Critical");
   script_xref(name: "FEDORA", value: "2011-7820");
   script_cve_id("CVE-2011-1944");
   script_name("Fedora Update for libxml FEDORA-2011-7820");

Modified: trunk/openvas-plugins/scripts/gb_fedora_2011_7856_libxml_fc14.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_fedora_2011_7856_libxml_fc14.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/gb_fedora_2011_7856_libxml_fc14.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -26,8 +26,9 @@
 if(description)
 {
   script_id(863324);
-  script_version("$Revision$: 1.0");
-  script_tag(name:"risk_factor", value:"High");
+  script_tag(name:"cvss_base", value:"9.3");
+ script_version("$Revision$: 1.0");
+  script_tag(name:"risk_factor", value:"Critical");
   script_xref(name: "FEDORA", value: "2011-7856");
   script_cve_id("CVE-2011-1944");
   script_name("Fedora Update for libxml FEDORA-2011-7856");

Modified: trunk/openvas-plugins/scripts/gb_fedora_2011_9130_kernel_fc15.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_fedora_2011_9130_kernel_fc15.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/gb_fedora_2011_9130_kernel_fc15.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -26,8 +26,9 @@
 if(description)
 {
   script_id(863356);
-  script_version("$Revision$: 1.0");
-  script_tag(name:"risk_factor", value:"High");
+  script_tag(name:"cvss_base", value:"8.3");
+ script_version("$Revision$: 1.0");
+  script_tag(name:"risk_factor", value:"Critical");
   script_xref(name: "FEDORA", value: "2011-9130");
   script_cve_id("CVE-2011-2497", "CVE-2011-2517", "CVE-2011-2183");
   script_name("Fedora Update for kernel FEDORA-2011-9130");

Modified: trunk/openvas-plugins/scripts/gb_fedora_2011_9763_libsoup_fc15.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_fedora_2011_9763_libsoup_fc15.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/gb_fedora_2011_9763_libsoup_fc15.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -26,8 +26,9 @@
 if(description)
 {
   script_id(863395);
-  script_version("$Revision$: 1.0");
-  script_tag(name:"risk_factor", value:"High");
+  script_tag(name:"cvss_base", value:"5.0");
+ script_version("$Revision$: 1.0");
+  script_tag(name:"risk_factor", value:"Medium");
   script_xref(name: "FEDORA", value: "2011-9763");
   script_cve_id("CVE-2011-2524");
   script_name("Fedora Update for libsoup FEDORA-2011-9763");

Modified: trunk/openvas-plugins/scripts/gb_hp_performance_insight_49096.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_hp_performance_insight_49096.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/gb_hp_performance_insight_49096.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -29,7 +29,8 @@
  script_id(103200);
  script_bugtraq_id(49096);
  script_cve_id("CVE-2011-2406", "CVE-2011-2407", "CVE-2011-2410");
- script_version ("1.0-$Revision$");
+ script_tag(name:"cvss_base", value:"3.5");
+ script_version("1.0-$Revision$");
 
  script_name("HP OpenView Performance Insight Security Bypass and HTML Injection Vulnerabilities");
 

Modified: trunk/openvas-plugins/scripts/gb_mandriva_MDVSA_2011_127.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_mandriva_MDVSA_2011_127.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/gb_mandriva_MDVSA_2011_127.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -26,8 +26,9 @@
 if(description)
 {
   script_id(831444);
-  script_version("$Revision$: 1.0");
-  script_tag(name:"risk_factor", value:"High");
+  script_tag(name:"cvss_base", value:"10.0");
+ script_version("$Revision$: 1.0");
+  script_tag(name:"risk_factor", value:"Critical");
   script_xref(name: "MDVSA", value: "2011:127");
   script_cve_id("CVE-2011-2982", "CVE-2011-0084", "CVE-2011-2981", "CVE-2011-2378", "CVE-2011-2984", "CVE-2011-2980", "CVE-2011-2983");
   script_name("Mandriva Update for mozilla MDVSA-2011:127 (mozilla)");

Modified: trunk/openvas-plugins/scripts/gb_orion_npm_45257.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_orion_npm_45257.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/gb_orion_npm_45257.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -29,7 +29,8 @@
  script_id(100941);
  script_cve_id("CVE-2010-4828");
  script_bugtraq_id(45257);
- script_version ("1.0-$Revision$");
+ script_tag(name:"cvss_base", value:"4.3");
+ script_version("1.0-$Revision$");
 
  script_name("SolarWinds Orion Network Performance Monitor (NPM) Multiple Cross Site Scripting Vulnerabilities");
 

Modified: trunk/openvas-plugins/scripts/gb_otrs_49251.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_otrs_49251.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/gb_otrs_49251.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -29,7 +29,8 @@
  script_id(103216);
  script_bugtraq_id(49251);
  script_cve_id("CVE-2011-2746");
- script_version ("1.0-$Revision$");
+ script_tag(name:"cvss_base", value:"4.0");
+ script_version("1.0-$Revision$");
 
  script_name("OTRS 'AdminPackageManager.pm' Local File Disclosure Vulnerability");
 

Modified: trunk/openvas-plugins/scripts/gb_phpmyadmin_49306.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_phpmyadmin_49306.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/gb_phpmyadmin_49306.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -29,7 +29,8 @@
  script_id(103232);
  script_bugtraq_id(49306);
  script_cve_id("CVE-2011-3181");
- script_version ("1.0-$Revision$");
+ script_tag(name:"cvss_base", value:"4.3");
+ script_version("1.0-$Revision$");
 
  script_name("phpMyAdmin Tracking Feature Multiple Cross Site Scripting Vulnerabilities");
 

Modified: trunk/openvas-plugins/scripts/gb_ubuntu_USN_1153_1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_ubuntu_USN_1153_1.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/gb_ubuntu_USN_1153_1.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -26,8 +26,9 @@
 if(description)
 {
   script_id(840679);
-  script_version("$Revision$: 1.0");
-  script_tag(name:"risk_factor", value:"High");
+  script_tag(name:"cvss_base", value:"9.3");
+ script_version("$Revision$: 1.0");
+  script_tag(name:"risk_factor", value:"Critical");
   script_xref(name: "USN", value: "1153-1");
   script_cve_id("CVE-2011-1944");
   script_name("Ubuntu Update for libxml2 USN-1153-1");

Modified: trunk/openvas-plugins/scripts/gb_ubuntu_USN_1181_1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_ubuntu_USN_1181_1.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/gb_ubuntu_USN_1181_1.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -26,8 +26,9 @@
 if(description)
 {
   script_id(840715);
-  script_version("$Revision$: 1.0");
-  script_tag(name:"risk_factor", value:"High");
+  script_tag(name:"cvss_base", value:"5.0");
+ script_version("$Revision$: 1.0");
+  script_tag(name:"risk_factor", value:"Medium");
   script_xref(name: "USN", value: "1181-1");
   script_cve_id("CVE-2011-2524");
   script_name("Ubuntu Update for libsoup2.4 USN-1181-1");

Modified: trunk/openvas-plugins/scripts/gb_ubuntu_USN_1191_1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_ubuntu_USN_1191_1.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/gb_ubuntu_USN_1191_1.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -26,8 +26,9 @@
 if(description)
 {
   script_id(840721);
-  script_version("$Revision$: 1.0");
-  script_tag(name:"risk_factor", value:"High");
+  script_tag(name:"cvss_base", value:"9.3");
+ script_version("$Revision$: 1.0");
+  script_tag(name:"risk_factor", value:"Critical");
   script_xref(name: "USN", value: "1191-1");
   script_cve_id("CVE-2011-2895");
   script_name("Ubuntu Update for libxfont USN-1191-1");

Modified: trunk/openvas-plugins/scripts/gb_ubuntu_USN_1192_1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_ubuntu_USN_1192_1.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/gb_ubuntu_USN_1192_1.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -26,8 +26,9 @@
 if(description)
 {
   script_id(840724);
-  script_version("$Revision$: 1.0");
-  script_tag(name:"risk_factor", value:"High");
+  script_tag(name:"cvss_base", value:"10.0");
+ script_version("$Revision$: 1.0");
+  script_tag(name:"risk_factor", value:"Critical");
   script_xref(name: "USN", value: "1192-1");
   script_cve_id("CVE-2011-2989", "CVE-2011-2991", "CVE-2011-2985", "CVE-2011-2993", "CVE-2011-2988", "CVE-2011-2987", "CVE-2011-0084", "CVE-2011-2990", "CVE-2011-2992");
   script_name("Ubuntu Update for firefox USN-1192-1");

Modified: trunk/openvas-plugins/scripts/gb_ubuntu_USN_1192_2.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_ubuntu_USN_1192_2.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/gb_ubuntu_USN_1192_2.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -26,8 +26,9 @@
 if(description)
 {
   script_id(840723);
-  script_version("$Revision$: 1.0");
-  script_tag(name:"risk_factor", value:"High");
+  script_tag(name:"cvss_base", value:"10.0");
+ script_version("$Revision$: 1.0");
+  script_tag(name:"risk_factor", value:"Critical");
   script_xref(name: "USN", value: "1192-2");
   script_cve_id("CVE-2011-2989", "CVE-2011-2991", "CVE-2011-2985", "CVE-2011-2993", "CVE-2011-2988", "CVE-2011-2987", "CVE-2011-0084", "CVE-2011-2990");
   script_name("Ubuntu Update for mozvoikko USN-1192-2");

Modified: trunk/openvas-plugins/scripts/gcards_dir_transversal.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gcards_dir_transversal.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/gcards_dir_transversal.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -60,7 +60,7 @@
 if (description) {
 script_id(80065);;
 script_version("$Revision: 1.6 $");
-script_tag(name:"cvss_base", value:"7.5");
+script_tag(name:"cvss_base", value:"6.4");
 script_tag(name:"risk_factor", value:"High");
 
 script_cve_id("CVE-2006-1346", "CVE-2006-1347", "CVE-2006-1348");

Modified: trunk/openvas-plugins/scripts/goaheadwebserver_source_disclosure.nasl
===================================================================
--- trunk/openvas-plugins/scripts/goaheadwebserver_source_disclosure.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/goaheadwebserver_source_disclosure.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -25,7 +25,7 @@
 if (description) {
  script_id(2000099); 
  script_version("$Revision: 1.0 $");
- script_tag(name:"cvss_base", value:"4.0");
+ script_tag(name:"cvss_base", value:"5.0");
  script_tag(name:"risk_factor", value:"Medium");
 
  script_cve_id("CVE-2002-1603");

Modified: trunk/openvas-plugins/scripts/guppy_directory_traversal.nasl
===================================================================
--- trunk/openvas-plugins/scripts/guppy_directory_traversal.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/guppy_directory_traversal.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -27,8 +27,8 @@
   script_cve_id("CVE-2005-2853");
   script_bugtraq_id(14752, 14984);
   script_version("$Revision$");
- script_tag(name:"cvss_base", value:"2.0");
- script_tag(name:"risk_factor", value:"Low");
+ script_tag(name:"cvss_base", value:"4.3");
+ script_tag(name:"risk_factor", value:"Medium");
 
   name = "GuppY pg Parameter Vulnerability";
   script_name(name);

Modified: trunk/openvas-plugins/scripts/guppy_request_header_flaws.nasl
===================================================================
--- trunk/openvas-plugins/scripts/guppy_request_header_flaws.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/guppy_request_header_flaws.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -56,8 +56,8 @@
 if (description) {
   script_id(19943);
   script_version("$Revision$");
- script_tag(name:"cvss_base", value:"6.0");
- script_tag(name:"risk_factor", value:"High");
+ script_tag(name:"cvss_base", value:"4.3");
+ script_tag(name:"risk_factor", value:"Medium");
   script_cve_id("CVE-2005-2853");
   script_bugtraq_id(14753);
 

Modified: trunk/openvas-plugins/scripts/hcl_file_include.nasl
===================================================================
--- trunk/openvas-plugins/scripts/hcl_file_include.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/hcl_file_include.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -57,7 +57,7 @@
   script_cve_id("CVE-2005-3639");
   script_bugtraq_id(15404);
   script_version("$Revision$");
-  script_tag(name:"cvss_base", value:"6.0");
+  script_tag(name:"cvss_base", value:"7.5");
   script_tag(name:"risk_factor", value:"High");
   
   script_name("Help Center Live module.php local file include flaw");

Modified: trunk/openvas-plugins/scripts/http_w98_devname_dos.nasl
===================================================================
--- trunk/openvas-plugins/scripts/http_w98_devname_dos.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/http_w98_devname_dos.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -48,8 +48,8 @@
  script_cve_id("CVE-2001-0386", "CVE-2001-0493", "CVE-2001-0391", "CVE-2001-0558", "CVE-2002-0200", "CVE-2000-0168", "CVE-2003-0016", "CVE-2001-0602");
 
  script_version("$Revision$");
- script_tag(name:"cvss_base", value:"7.5");
- script_tag(name:"risk_factor", value:"High");
+ script_tag(name:"cvss_base", value:"5.0");
+ script_tag(name:"risk_factor", value:"Medium");
  script_name("HTTP Windows 98 MS/DOS device names DOS");
  
  desc = "
@@ -64,7 +64,7 @@
 Solution : upgrade your system or use a 
 HTTP server that filters those names out.
 
-Risk factor : High";
+Risk factor : Medium";
 
 
  script_description(desc);
@@ -158,6 +158,6 @@
 Solution : upgrade your system or use a 
 HTTP server that filters those names out.
 
-Risk factor : High";
+Risk factor : Medium";
   security_hole(port: port, data: m);
 }

Modified: trunk/openvas-plugins/scripts/icq_installed.nasl
===================================================================
--- trunk/openvas-plugins/scripts/icq_installed.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/icq_installed.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -31,8 +31,8 @@
  script_cve_id("CVE-1999-1418", "CVE-1999-1440", "CVE-2000-0046", "CVE-2000-0564", "CVE-2000-0552", "CVE-2001-0367", "CVE-2002-0028", "CVE-2001-1305");
  
  script_version("$Revision$");
- script_tag(name:"cvss_base", value:"7.5");
- script_tag(name:"risk_factor", value:"High");
+ script_tag(name:"cvss_base", value:"5.0");
+ script_tag(name:"risk_factor", value:"Medium");
 
  name = "ICQ is installed";
 
@@ -43,7 +43,7 @@
 which may not be suitable for a business environment. 
 
 Solution : Uninstall this software
-Risk factor : Low";
+Risk factor : Medium";
 
 
 

Modified: trunk/openvas-plugins/scripts/idealbb_multiple_flaws.nasl
===================================================================
--- trunk/openvas-plugins/scripts/idealbb_multiple_flaws.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/idealbb_multiple_flaws.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -33,8 +33,8 @@
   script_xref(name:"OSVDB", value:"10761");
   script_xref(name:"OSVDB", value:"10762");
   script_version("$Revision$");
-  script_tag(name:"cvss_base", value:"7.5");
-  script_tag(name:"risk_factor", value:"High");
+  script_tag(name:"cvss_base", value:"4.3");
+  script_tag(name:"risk_factor", value:"Medium");
   script_name("IdealBB multiple flaws");
  
  desc = "
@@ -46,7 +46,7 @@
 vulnerabilities. 
 
 Solution: Upgrade to the latest version of this software.
-Risk factor : High";
+Risk factor : Medium";
 
   script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/iis_decode_bug.nasl
===================================================================
--- trunk/openvas-plugins/scripts/iis_decode_bug.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/iis_decode_bug.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -32,7 +32,7 @@
  script_xref(name:"IAVA", value:"2001-a-0006");
  script_bugtraq_id(2708, 3193);
  script_version ("$Revision$");
- script_tag(name:"cvss_base", value:"7.5");
+ script_tag(name:"cvss_base", value:"7.2");
  script_tag(name:"risk_factor", value:"High");
  script_cve_id("CVE-2001-0507", "CVE-2001-0333");
 

Modified: trunk/openvas-plugins/scripts/iis_ida_isapi.nasl
===================================================================
--- trunk/openvas-plugins/scripts/iis_ida_isapi.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/iis_ida_isapi.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -32,8 +32,8 @@
  script_bugtraq_id(2880);
  script_cve_id("CVE-2001-0500");
  script_version ("$Revision$");
- script_tag(name:"cvss_base", value:"0.0");
- script_tag(name:"risk_factor", value:"None");
+ script_tag(name:"cvss_base", value:"10.0");
+ script_tag(name:"risk_factor", value:"Critical");
  name = "IIS .IDA ISAPI filter applied";
  script_name(name);
  

Modified: trunk/openvas-plugins/scripts/iis_nat.nasl
===================================================================
--- trunk/openvas-plugins/scripts/iis_nat.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/iis_nat.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -52,8 +52,8 @@
  script_bugtraq_id(1499);
  script_cve_id("CVE-2000-0649");
  script_version ("$Revision$");
- script_tag(name:"cvss_base", value:"0.0");
- script_tag(name:"risk_factor", value:"None");
+ script_tag(name:"cvss_base", value:"2.6");
+ script_tag(name:"risk_factor", value:"Medium");
  name = "Private IP address leaked in HTTP headers";
  script_name(name);
 

Modified: trunk/openvas-plugins/scripts/includer_rcmdexec.nasl
===================================================================
--- trunk/openvas-plugins/scripts/includer_rcmdexec.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/includer_rcmdexec.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -57,7 +57,7 @@
   script_cve_id("CVE-2005-0689");
   script_xref(name:"OSVDB", value:"14624");
   script_version ("$Revision$");
-  script_tag(name:"cvss_base", value:"7.0");
+  script_tag(name:"cvss_base", value:"7.5");
   script_tag(name:"risk_factor", value:"High");
 
   name = "The Includer remote command execution flaw";

Modified: trunk/openvas-plugins/scripts/ipswitch_whatsup_info_disclosure.nasl
===================================================================
--- trunk/openvas-plugins/scripts/ipswitch_whatsup_info_disclosure.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/ipswitch_whatsup_info_disclosure.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -26,7 +26,7 @@
 {
  script_id(80068);;
  script_version("$Revision: 1.9 $");
- script_tag(name:"cvss_base", value:"5.0");
+ script_tag(name:"cvss_base", value:"4.3");
  script_tag(name:"risk_factor", value:"Medium");
 
  script_cve_id("CVE-2006-2351", "CVE-2006-2352", "CVE-2006-2353", "CVE-2006-2354", "CVE-2006-2355", "CVE-2006-2356", "CVE-2006-2357");

Modified: trunk/openvas-plugins/scripts/kayako_sql_injection.nasl
===================================================================
--- trunk/openvas-plugins/scripts/kayako_sql_injection.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/kayako_sql_injection.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -28,7 +28,7 @@
  script_cve_id("CVE-2004-1412", "CVE-2004-1413");
  script_bugtraq_id(12037);
  script_version("$Revision$");
- script_tag(name:"cvss_base", value:"5.0");
+ script_tag(name:"cvss_base", value:"4.3");
  script_tag(name:"risk_factor", value:"Medium");
  
  name = "Kayako eSupport SQL Injection and Cross-Site-Scripting";
@@ -40,7 +40,7 @@
 to a SQL injection vulnerability as well as a cross site scripting.
 
 Solution : Upgrade to the newest version of this software
-Risk factor : High";
+Risk factor : Medium";
 
  script_description(desc);
  

Modified: trunk/openvas-plugins/scripts/kazaa_installed.nasl
===================================================================
--- trunk/openvas-plugins/scripts/kazaa_installed.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/kazaa_installed.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -29,8 +29,8 @@
  script_cve_id("CVE-2002-0314", "CVE-2002-0315");  
  
  script_version("$Revision$");
- script_tag(name:"cvss_base", value:"7.5");
- script_tag(name:"risk_factor", value:"High");
+ script_tag(name:"cvss_base", value:"5.0");
+ script_tag(name:"risk_factor", value:"Medium");
 
  name = "Kazaa is installed";
 
@@ -41,7 +41,7 @@
 be suitable for a business environment. 
 
 Solution : Uninstall this software
-Risk factor : Low";
+Risk factor : Medium";
 
 
 

Modified: trunk/openvas-plugins/scripts/kerberos_CB-A08-0044.nasl
===================================================================
--- trunk/openvas-plugins/scripts/kerberos_CB-A08-0044.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/kerberos_CB-A08-0044.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -33,7 +33,7 @@
  script_version ("$Revision$: 1.3");
  script_cve_id("CVE-2008-0948", "CVE-2008-0947", "CVE-2008-0063", "CVE-2008-0062");
  script_bugtraq_id(28302,28303);
- script_tag(name:"cvss_base", value:"10.0");
+ script_tag(name:"cvss_base", value:"9.3");
  script_tag(name:"risk_factor", value:"Critical");
  
  name = "Kerberos < 1.6.4 vulnerability";

Modified: trunk/openvas-plugins/scripts/kerio_webmail_multiple_flaws.nasl
===================================================================
--- trunk/openvas-plugins/scripts/kerio_webmail_multiple_flaws.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/kerio_webmail_multiple_flaws.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -35,7 +35,7 @@
 {
  script_id(80069);;
  script_version ("$Revision: 1.12 $");
- script_tag(name:"cvss_base", value:"7.5");
+ script_tag(name:"cvss_base", value:"6.8");
  script_tag(name:"risk_factor", value:"High");
 
  script_cve_id("CVE-2002-1434", "CVE-2003-0487", "CVE-2003-0488");

Modified: trunk/openvas-plugins/scripts/kiwi_cattools_dir_traversal.nasl
===================================================================
--- trunk/openvas-plugins/scripts/kiwi_cattools_dir_traversal.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/kiwi_cattools_dir_traversal.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -50,8 +50,8 @@
 if (description) {
  script_id(200001);
  script_version("$Revision: 1.0 $");
- script_tag(name:"cvss_base", value:"6.8");
- script_tag(name:"risk_factor", value:"High");
+ script_tag(name:"cvss_base", value:"10.0");
+ script_tag(name:"risk_factor", value:"Critical");
 
  script_cve_id("CVE-2007-0888");
  script_bugtraq_id(22490);

Modified: trunk/openvas-plugins/scripts/ldap_null_bind.nasl
===================================================================
--- trunk/openvas-plugins/scripts/ldap_null_bind.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/ldap_null_bind.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -28,8 +28,8 @@
   script_bugtraq_id(503);
   script_cve_id("CVE-1999-0385");
   script_version ("$Revision$");
-  script_tag(name:"cvss_base", value:"2.0");
-  script_tag(name:"risk_factor", value:"Low");
+  script_tag(name:"cvss_base", value:"10.0");
+  script_tag(name:"risk_factor", value:"Critical");
   script_name("LDAP allows anonymous binds");
   desc = "
 Synopsis :

Modified: trunk/openvas-plugins/scripts/ldu_801.nasl
===================================================================
--- trunk/openvas-plugins/scripts/ldu_801.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/ldu_801.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -28,8 +28,8 @@
  script_cve_id("CVE-2005-2788", "CVE-2005-2884");
  script_bugtraq_id(14685, 14746, 14820);
  script_version ("$Revision$");
- script_tag(name:"cvss_base", value:"4.0");
- script_tag(name:"risk_factor", value:"Medium");
+ script_tag(name:"cvss_base", value:"7.5");
+ script_tag(name:"risk_factor", value:"High");
 
  name = "Land Down Under <= 801 Multiple Vulnerabilities";
  script_name(name);

Modified: trunk/openvas-plugins/scripts/ldu_sql_injection.nasl
===================================================================
--- trunk/openvas-plugins/scripts/ldu_sql_injection.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/ldu_sql_injection.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -69,7 +69,7 @@
  script_bugtraq_id(14618, 14619, 14677);
  script_xref(name:"OSVDB", value:"19298");
  script_version ("$Revision$");
- script_tag(name:"cvss_base", value:"4.0");
+ script_tag(name:"cvss_base", value:"4.3");
  script_tag(name:"risk_factor", value:"Medium");
 
  name = "Land Down Under <= 800 Multiple Vulnerabilities";

Modified: trunk/openvas-plugins/scripts/limbo_multiple_flaws.nasl
===================================================================
--- trunk/openvas-plugins/scripts/limbo_multiple_flaws.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/limbo_multiple_flaws.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -68,7 +68,7 @@
 {
  script_id(20824);
  script_version ("$Revision$");
- script_tag(name:"cvss_base", value:"7.0");
+ script_tag(name:"cvss_base", value:"6.8");
  script_tag(name:"risk_factor", value:"High");
 
  script_cve_id("CVE-2005-4317", "CVE-2005-4318", "CVE-2005-4319", "CVE-2005-4320");

Modified: trunk/openvas-plugins/scripts/linksys_multiple_vulns.nasl
===================================================================
--- trunk/openvas-plugins/scripts/linksys_multiple_vulns.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/linksys_multiple_vulns.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -33,8 +33,8 @@
  script_xref(name:"OSVDB", value:"19389");
  script_xref(name:"OSVDB", value:"19390");
  script_version("$Revision$");
- script_tag(name:"cvss_base", value:"10.0");
- script_tag(name:"risk_factor", value:"Critical");
+ script_tag(name:"cvss_base", value:"7.5");
+ script_tag(name:"risk_factor", value:"High");
  
  name = "Linksys multiple remote vulnerabilities";
  script_name(name);

Modified: trunk/openvas-plugins/scripts/lotus_domino_ldap_dos.nasl
===================================================================
--- trunk/openvas-plugins/scripts/lotus_domino_ldap_dos.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/lotus_domino_ldap_dos.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -40,8 +40,8 @@
  script_cve_id("CVE-2005-2712");
  script_bugtraq_id(16523);
  script_version ("$Revision$");
- script_tag(name:"cvss_base", value:"4.0");
- script_tag(name:"risk_factor", value:"Medium");
+ script_tag(name:"cvss_base", value:"7.8");
+ script_tag(name:"risk_factor", value:"High");
 
  name = "Lotus Domino LDAP Server Denial of Service Vulnerability";
  script_name(name);

Modified: trunk/openvas-plugins/scripts/lotus_domino_xss.nasl
===================================================================
--- trunk/openvas-plugins/scripts/lotus_domino_xss.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/lotus_domino_xss.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -28,7 +28,7 @@
   script_cve_id("CVE-2005-3015");
   script_bugtraq_id(14845, 14846);
   script_version("$Revision$");
-  script_tag(name:"cvss_base", value:"3.0");
+  script_tag(name:"cvss_base", value:"4.3");
   script_tag(name:"risk_factor", value:"Medium");
   
   script_name("Lotus Domino Src and BaseTarget XSS");

Modified: trunk/openvas-plugins/scripts/mailenable_imap_rename_dos.nasl
===================================================================
--- trunk/openvas-plugins/scripts/mailenable_imap_rename_dos.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/mailenable_imap_rename_dos.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -57,8 +57,8 @@
 if (description) {
   script_id(20245);
   script_version("$Revision$");
-  script_tag(name:"cvss_base", value:"2.0");
-  script_tag(name:"risk_factor", value:"Low");
+  script_tag(name:"cvss_base", value:"4.0");
+  script_tag(name:"risk_factor", value:"Medium");
 
   script_cve_id("CVE-2005-3813");
   script_bugtraq_id(15556);

Modified: trunk/openvas-plugins/scripts/mailgust_sql_injection.nasl
===================================================================
--- trunk/openvas-plugins/scripts/mailgust_sql_injection.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/mailgust_sql_injection.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -25,8 +25,8 @@
 if (description) {
 script_id(19947);
 script_version("$Revision$");
-script_tag(name:"cvss_base", value:"3.0");
-script_tag(name:"risk_factor", value:"Medium");
+script_tag(name:"cvss_base", value:"7.5");
+script_tag(name:"risk_factor", value:"High");
 
 script_cve_id("CVE-2005-3063");
 script_bugtraq_id(14933);

Modified: trunk/openvas-plugins/scripts/mailman_privatepy_directory_traversal.nasl
===================================================================
--- trunk/openvas-plugins/scripts/mailman_privatepy_directory_traversal.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/mailman_privatepy_directory_traversal.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -25,8 +25,8 @@
 if (description) {
   script_id(16339);
   script_version("$Revision$");
-  script_tag(name:"cvss_base", value:"2.0");
-  script_tag(name:"risk_factor", value:"Low");
+  script_tag(name:"cvss_base", value:"5.0");
+  script_tag(name:"risk_factor", value:"Medium");
 
   script_cve_id("CVE-2005-0202");
   script_bugtraq_id(12504);

Modified: trunk/openvas-plugins/scripts/mailreader.nasl
===================================================================
--- trunk/openvas-plugins/scripts/mailreader.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/mailreader.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -37,8 +37,8 @@
   script_cve_id("CVE-2002-1581", "CVE-2002-1582");
   script_bugtraq_id(5393, 6055, 6058);
   script_version("$Revision$");
-  script_tag(name:"cvss_base", value:"10.0");
-  script_tag(name:"risk_factor", value:"Critical");
+  script_tag(name:"cvss_base", value:"5.0");
+  script_tag(name:"risk_factor", value:"Medium");
 
   name = "mailreader.com directory traversal and arbitrary command execution";
   script_name(name);
@@ -49,7 +49,7 @@
 
 Solution: upgrade to v2.3.32 or later
 
-Risk factor : High";
+Risk factor : Medium";
 
   script_description(desc);
 
@@ -112,7 +112,7 @@
 
 Solution: upgrade to v2.3.32 or later
 
-Risk factor : High";
+Risk factor : Medium";
       security_hole(port: port, data: m);
       version = 0;
     }
@@ -128,7 +128,7 @@
 
 Solution: upgrade to v2.3.32 or later
 
-Risk factor : Low";
+Risk factor : Medium";
       security_warning(port: port, data: m);
       version = 0;
     }

Modified: trunk/openvas-plugins/scripts/mantis_file_incl_sql_inject.nasl
===================================================================
--- trunk/openvas-plugins/scripts/mantis_file_incl_sql_inject.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/mantis_file_incl_sql_inject.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,7 +30,7 @@
   script_cve_id("CVE-2005-3335");
   script_bugtraq_id(15210, 15212);
   script_version("$Revision$");
-  script_tag(name:"cvss_base", value:"6.0");
+  script_tag(name:"cvss_base", value:"7.5");
   script_tag(name:"risk_factor", value:"High");
   
   script_name("Mantis File Inclusion and SQL Injection Flaws");

Modified: trunk/openvas-plugins/scripts/mantis_multiple_vulns4.nasl
===================================================================
--- trunk/openvas-plugins/scripts/mantis_multiple_vulns4.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/mantis_multiple_vulns4.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -60,8 +60,8 @@
  script_bugtraq_id(14604);
  script_cve_id("CVE-2005-2556","CVE-2005-2557", "CVE-2005-3090", "CVE-2005-3091"); 
  script_version ("$Revision$");
- script_tag(name:"cvss_base", value:"2.0");
- script_tag(name:"risk_factor", value:"Low");
+ script_tag(name:"cvss_base", value:"7.5");
+ script_tag(name:"risk_factor", value:"High");
 
  name = "Mantis Multiple Flaws (4)";
  

Modified: trunk/openvas-plugins/scripts/mdksa_2009_003.nasl
===================================================================
--- trunk/openvas-plugins/scripts/mdksa_2009_003.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/mdksa_2009_003.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,8 +30,8 @@
  script_id(63136);
  script_cve_id("CVE-2007-4965", "CVE-2008-1679", "CVE-2008-4864", "CVE-2008-2315", "CVE-2008-5031");
  script_version ("$");
- script_tag(name:"cvss_base", value:"10.0");
- script_tag(name:"risk_factor", value:"Critical");
+ script_tag(name:"cvss_base", value:"5.8");
+ script_tag(name:"risk_factor", value:"High");
  name = "Mandrake Security Advisory MDVSA-2009:003 (python)";
  script_name(name);
 

Modified: trunk/openvas-plugins/scripts/mdksa_2009_008.nasl
===================================================================
--- trunk/openvas-plugins/scripts/mdksa_2009_008.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/mdksa_2009_008.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,8 +30,8 @@
  script_id(63195);
  script_cve_id("CVE-2008-2382", "CVE-2008-5714");
  script_version ("$");
- script_tag(name:"cvss_base", value:"7.8");
- script_tag(name:"risk_factor", value:"High");
+ script_tag(name:"cvss_base", value:"5.0");
+ script_tag(name:"risk_factor", value:"Medium");
  name = "Mandrake Security Advisory MDVSA-2009:008 (qemu)";
  script_name(name);
 
@@ -53,7 +53,7 @@
 
 https://secure1.securityspace.com/smysecure/catid.html?in=MDVSA-2009:008
 
-Risk factor : High";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/mdksa_2009_009.nasl
===================================================================
--- trunk/openvas-plugins/scripts/mdksa_2009_009.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/mdksa_2009_009.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,8 +30,8 @@
  script_id(63196);
  script_cve_id("CVE-2008-2382", "CVE-2008-5714");
  script_version ("$");
- script_tag(name:"cvss_base", value:"7.8");
- script_tag(name:"risk_factor", value:"High");
+ script_tag(name:"cvss_base", value:"5.0");
+ script_tag(name:"risk_factor", value:"Medium");
  name = "Mandrake Security Advisory MDVSA-2009:009 (kvm)";
  script_name(name);
 
@@ -53,7 +53,7 @@
 
 https://secure1.securityspace.com/smysecure/catid.html?in=MDVSA-2009:009
 
-Risk factor : High";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/mdksa_2009_016.nasl
===================================================================
--- trunk/openvas-plugins/scripts/mdksa_2009_016.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/mdksa_2009_016.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,8 +30,8 @@
  script_id(63203);
  script_cve_id("CVE-2008-0928", "CVE-2008-4405", "CVE-2008-4993");
  script_version ("$");
- script_tag(name:"cvss_base", value:"7.2");
- script_tag(name:"risk_factor", value:"High");
+ script_tag(name:"cvss_base", value:"4.7");
+ script_tag(name:"risk_factor", value:"Medium");
  name = "Mandrake Security Advisory MDVSA-2009:016 (xen)";
  script_name(name);
 
@@ -67,7 +67,7 @@
 
 https://secure1.securityspace.com/smysecure/catid.html?in=MDVSA-2009:016
 
-Risk factor : High";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/mdksa_2009_020.nasl
===================================================================
--- trunk/openvas-plugins/scripts/mdksa_2009_020.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/mdksa_2009_020.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,8 +30,8 @@
  script_id(63252);
  script_cve_id("CVE-2008-3231", "CVE-2008-5233", "CVE-2008-5234", "CVE-2008-5236", "CVE-2008-5237", "CVE-2008-5239", "CVE-2008-5240", "CVE-2008-5241", "CVE-2008-5243", "CVE-2008-5245", "CVE-2008-5246");
  script_version ("$");
- script_tag(name:"cvss_base", value:"10.0");
- script_tag(name:"risk_factor", value:"Critical");
+ script_tag(name:"cvss_base", value:"4.3");
+ script_tag(name:"risk_factor", value:"Medium");
  name = "Mandrake Security Advisory MDVSA-2009:020 (xine-lib)";
  script_name(name);
 
@@ -54,7 +54,7 @@
 
 https://secure1.securityspace.com/smysecure/catid.html?in=MDVSA-2009:020
 
-Risk factor : High";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/mdksa_2009_022.nasl
===================================================================
--- trunk/openvas-plugins/scripts/mdksa_2009_022.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/mdksa_2009_022.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,8 +30,8 @@
  script_id(63253);
  script_cve_id("CVE-2007-4782", "CVE-2007-4850", "CVE-2008-1384", "CVE-2008-2050", "CVE-2008-3658", "CVE-2008-3659", "CVE-2008-3660", "CVE-2008-5498");
  script_version ("$");
- script_tag(name:"cvss_base", value:"10.0");
- script_tag(name:"risk_factor", value:"Critical");
+ script_tag(name:"cvss_base", value:"5.0");
+ script_tag(name:"risk_factor", value:"Medium");
  name = "Mandrake Security Advisory MDVSA-2009:022 (php)";
  script_name(name);
 
@@ -82,7 +82,7 @@
 
 https://secure1.securityspace.com/smysecure/catid.html?in=MDVSA-2009:022
 
-Risk factor : High";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/mdksa_2009_023.nasl
===================================================================
--- trunk/openvas-plugins/scripts/mdksa_2009_023.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/mdksa_2009_023.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,8 +30,8 @@
  script_id(63254);
  script_cve_id("CVE-2007-4782", "CVE-2007-4850", "CVE-2008-1384", "CVE-2008-2050", "CVE-2008-2371", "CVE-2008-3658", "CVE-2008-3659", "CVE-2008-3660", "CVE-2008-5498");
  script_version ("$");
- script_tag(name:"cvss_base", value:"10.0");
- script_tag(name:"risk_factor", value:"Critical");
+ script_tag(name:"cvss_base", value:"5.0");
+ script_tag(name:"risk_factor", value:"Medium");
  name = "Mandrake Security Advisory MDVSA-2009:023 (php)";
  script_name(name);
 
@@ -90,7 +90,7 @@
 
 https://secure1.securityspace.com/smysecure/catid.html?in=MDVSA-2009:023
 
-Risk factor : High";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/mdksa_2009_026.nasl
===================================================================
--- trunk/openvas-plugins/scripts/mdksa_2009_026.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/mdksa_2009_026.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,8 +30,8 @@
  script_id(63257);
  script_cve_id("CVE-2008-4775", "CVE-2008-5621", "CVE-2008-5622");
  script_version ("$");
- script_tag(name:"cvss_base", value:"6.0");
- script_tag(name:"risk_factor", value:"High");
+ script_tag(name:"cvss_base", value:"2.6");
+ script_tag(name:"risk_factor", value:"Medium");
  name = "Mandrake Security Advisory MDVSA-2009:026 (phpMyAdmin)";
  script_name(name);
 
@@ -61,7 +61,7 @@
 
 https://secure1.securityspace.com/smysecure/catid.html?in=MDVSA-2009:026
 
-Risk factor : High";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/mdksa_2009_026_1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/mdksa_2009_026_1.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/mdksa_2009_026_1.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,8 +30,8 @@
  script_id(63450);
  script_cve_id("CVE-2008-4775", "CVE-2008-5621", "CVE-2008-5622");
  script_version ("$");
- script_tag(name:"cvss_base", value:"6.0");
- script_tag(name:"risk_factor", value:"High");
+ script_tag(name:"cvss_base", value:"2.6");
+ script_tag(name:"risk_factor", value:"Medium");
  name = "Mandrake Security Advisory MDVSA-2009:026-1 (phpMyAdmin)";
  script_name(name);
 
@@ -65,7 +65,7 @@
 
 https://secure1.securityspace.com/smysecure/catid.html?in=MDVSA-2009:026-1
 
-Risk factor : High";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/mdksa_2009_036.nasl
===================================================================
--- trunk/openvas-plugins/scripts/mdksa_2009_036.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/mdksa_2009_036.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,8 +30,8 @@
  script_id(63373);
  script_cve_id("CVE-2007-4965", "CVE-2008-1679", "CVE-2008-4864", "CVE-2008-5031", "CVE-2008-2315");
  script_version ("$");
- script_tag(name:"cvss_base", value:"10.0");
- script_tag(name:"risk_factor", value:"Critical");
+ script_tag(name:"cvss_base", value:"5.8");
+ script_tag(name:"risk_factor", value:"High");
  name = "Mandrake Security Advisory MDVSA-2009:036 (python)";
  script_name(name);
 

Modified: trunk/openvas-plugins/scripts/mdksa_2009_041.nasl
===================================================================
--- trunk/openvas-plugins/scripts/mdksa_2009_041.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/mdksa_2009_041.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,8 +30,8 @@
  script_id(63404);
  script_cve_id("CVE-2008-4575", "CVE-2008-4639", "CVE-2008-4640", "CVE-2008-4641");
  script_version ("$");
- script_tag(name:"cvss_base", value:"10.0");
- script_tag(name:"risk_factor", value:"Critical");
+ script_tag(name:"cvss_base", value:"5.0");
+ script_tag(name:"risk_factor", value:"Medium");
  name = "Mandrake Security Advisory MDVSA-2009:041 (jhead)";
  script_name(name);
 
@@ -63,7 +63,7 @@
 
 https://secure1.securityspace.com/smysecure/catid.html?in=MDVSA-2009:041
 
-Risk factor : High";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/mdksa_2009_051.nasl
===================================================================
--- trunk/openvas-plugins/scripts/mdksa_2009_051.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/mdksa_2009_051.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,8 +30,8 @@
  script_id(63440);
  script_cve_id("CVE-2008-3964", "CVE-2008-5907", "CVE-2009-0040");
  script_version ("$");
- script_tag(name:"cvss_base", value:"6.8");
- script_tag(name:"risk_factor", value:"High");
+ script_tag(name:"cvss_base", value:"4.3");
+ script_tag(name:"risk_factor", value:"Medium");
  name = "Mandrake Security Advisory MDVSA-2009:051 (libpng)";
  script_name(name);
 
@@ -61,7 +61,7 @@
 
 https://secure1.securityspace.com/smysecure/catid.html?in=MDVSA-2009:051
 
-Risk factor : High";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/mdksa_2009_065.nasl
===================================================================
--- trunk/openvas-plugins/scripts/mdksa_2009_065.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/mdksa_2009_065.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,8 +30,8 @@
  script_id(63482);
  script_cve_id("CVE-2007-4850", "CVE-2008-5557", "CVE-2009-0754");
  script_version ("$");
- script_tag(name:"cvss_base", value:"10.0");
- script_tag(name:"risk_factor", value:"Critical");
+ script_tag(name:"cvss_base", value:"5.0");
+ script_tag(name:"risk_factor", value:"Medium");
  name = "Mandrake Security Advisory MDVSA-2009:065 (php4)";
  script_name(name);
 
@@ -61,7 +61,7 @@
 
 https://secure1.securityspace.com/smysecure/catid.html?in=MDVSA-2009:065
 
-Risk factor : High";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/mdksa_2009_075.nasl
===================================================================
--- trunk/openvas-plugins/scripts/mdksa_2009_075.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/mdksa_2009_075.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,8 +30,8 @@
  script_id(63587);
  script_cve_id("CVE-2009-0040", "CVE-2009-0771", "CVE-2009-0772", "CVE-2009-0773", "CVE-2009-0774", "CVE-2009-0775", "CVE-2009-0776", "CVE-2009-0777");
  script_version ("$");
- script_tag(name:"cvss_base", value:"10.0");
- script_tag(name:"risk_factor", value:"Critical");
+ script_tag(name:"cvss_base", value:"6.8");
+ script_tag(name:"risk_factor", value:"High");
  name = "Mandrake Security Advisory MDVSA-2009:075 (firefox)";
  script_name(name);
 

Modified: trunk/openvas-plugins/scripts/mdksa_2009_078.nasl
===================================================================
--- trunk/openvas-plugins/scripts/mdksa_2009_078.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/mdksa_2009_078.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,8 +30,8 @@
  script_id(63649);
  script_cve_id("CVE-2009-0547", "CVE-2009-0582", "CVE-2009-0587");
  script_version ("$");
- script_tag(name:"cvss_base", value:"7.5");
- script_tag(name:"risk_factor", value:"High");
+ script_tag(name:"cvss_base", value:"5.0");
+ script_tag(name:"risk_factor", value:"Medium");
  name = "Mandrake Security Advisory MDVSA-2009:078 (evolution-data-server)";
  script_name(name);
 
@@ -66,7 +66,7 @@
 
 https://secure1.securityspace.com/smysecure/catid.html?in=MDVSA-2009:078
 
-Risk factor : High";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/mdksa_2009_083.nasl
===================================================================
--- trunk/openvas-plugins/scripts/mdksa_2009_083.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/mdksa_2009_083.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,8 +30,8 @@
  script_id(63717);
  script_cve_id("CVE-2009-0040", "CVE-2009-0776", "CVE-2009-0771", "CVE-2009-0772", "CVE-2009-0773", "CVE-2009-0774", "CVE-2009-0352", "CVE-2009-0353");
  script_version ("$");
- script_tag(name:"cvss_base", value:"10.0");
- script_tag(name:"risk_factor", value:"Critical");
+ script_tag(name:"cvss_base", value:"6.8");
+ script_tag(name:"risk_factor", value:"High");
  name = "Mandrake Security Advisory MDVSA-2009:083 (mozilla-thunderbird)";
  script_name(name);
 

Modified: trunk/openvas-plugins/scripts/mdksa_2009_085.nasl
===================================================================
--- trunk/openvas-plugins/scripts/mdksa_2009_085.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/mdksa_2009_085.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,8 +30,8 @@
  script_id(63718);
  script_cve_id("CVE-2008-4316", "CVE-2009-0586");
  script_version ("$");
- script_tag(name:"cvss_base", value:"7.5");
- script_tag(name:"risk_factor", value:"High");
+ script_tag(name:"cvss_base", value:"4.6");
+ script_tag(name:"risk_factor", value:"Medium");
  name = "Mandrake Security Advisory MDVSA-2009:085 (gstreamer0.10-plugins-base)";
  script_name(name);
 
@@ -53,7 +53,7 @@
 
 https://secure1.securityspace.com/smysecure/catid.html?in=MDVSA-2009:085
 
-Risk factor : High";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/mdksa_2009_094.nasl
===================================================================
--- trunk/openvas-plugins/scripts/mdksa_2009_094.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/mdksa_2009_094.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,7 +30,7 @@
  script_id(63872);
  script_cve_id("CVE-2008-3963", "CVE-2008-2079", "CVE-2008-4097", "CVE-2008-4098", "CVE-2008-4456");
  script_version ("$");
- script_tag(name:"cvss_base", value:"4.6");
+ script_tag(name:"cvss_base", value:"4.0");
  script_tag(name:"risk_factor", value:"Medium");
  name = "Mandrake Security Advisory MDVSA-2009:094 (mysql)";
  script_name(name);
@@ -102,7 +102,7 @@
 
 https://secure1.securityspace.com/smysecure/catid.html?in=MDVSA-2009:094
 
-Risk factor : High";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/mdksa_2009_095.nasl
===================================================================
--- trunk/openvas-plugins/scripts/mdksa_2009_095.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/mdksa_2009_095.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,8 +30,8 @@
  script_id(63873);
  script_cve_id("CVE-2007-6725", "CVE-2008-6679", "CVE-2009-0583", "CVE-2009-0584", "CVE-2009-0792", "CVE-2009-0196");
  script_version ("$");
- script_tag(name:"cvss_base", value:"9.3");
- script_tag(name:"risk_factor", value:"Critical");
+ script_tag(name:"cvss_base", value:"7.5");
+ script_tag(name:"risk_factor", value:"High");
  name = "Mandrake Security Advisory MDVSA-2009:095 (ghostscript)";
  script_name(name);
 

Modified: trunk/openvas-plugins/scripts/mdksa_2009_096.nasl
===================================================================
--- trunk/openvas-plugins/scripts/mdksa_2009_096.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/mdksa_2009_096.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,8 +30,8 @@
  script_id(63874);
  script_cve_id("CVE-2007-6725", "CVE-2009-0583", "CVE-2009-0584", "CVE-2009-0792");
  script_version ("$");
- script_tag(name:"cvss_base", value:"9.3");
- script_tag(name:"risk_factor", value:"Critical");
+ script_tag(name:"cvss_base", value:"7.5");
+ script_tag(name:"risk_factor", value:"High");
  name = "Mandrake Security Advisory MDVSA-2009:096 (printer-drivers)";
  script_name(name);
 

Modified: trunk/openvas-plugins/scripts/mdksa_2009_096_1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/mdksa_2009_096_1.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/mdksa_2009_096_1.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,8 +30,8 @@
  script_id(63912);
  script_cve_id("CVE-2007-6725", "CVE-2009-0583", "CVE-2009-0584", "CVE-2009-0792");
  script_version ("$");
- script_tag(name:"cvss_base", value:"9.3");
- script_tag(name:"risk_factor", value:"Critical");
+ script_tag(name:"cvss_base", value:"7.5");
+ script_tag(name:"risk_factor", value:"High");
  name = "Mandrake Security Advisory MDVSA-2009:096-1 (printer-drivers)";
  script_name(name);
 

Modified: trunk/openvas-plugins/scripts/mdksa_2009_097.nasl
===================================================================
--- trunk/openvas-plugins/scripts/mdksa_2009_097.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/mdksa_2009_097.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,8 +30,8 @@
  script_id(63875);
  script_cve_id("CVE-2009-1241", "CVE-2008-6680", "CVE-2009-1270", "CVE-2009-1371", "CVE-2009-1372");
  script_version ("$");
- script_tag(name:"cvss_base", value:"10.0");
- script_tag(name:"risk_factor", value:"Critical");
+ script_tag(name:"cvss_base", value:"7.5");
+ script_tag(name:"risk_factor", value:"High");
  name = "Mandrake Security Advisory MDVSA-2009:097 (clamav)";
  script_name(name);
 

Modified: trunk/openvas-plugins/scripts/mdksa_2009_098.nasl
===================================================================
--- trunk/openvas-plugins/scripts/mdksa_2009_098.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/mdksa_2009_098.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,8 +30,8 @@
  script_id(63913);
  script_cve_id("CVE-2009-0844", "CVE-2009-0846", "CVE-2009-0847", "CVE-2009-0845");
  script_version ("$");
- script_tag(name:"cvss_base", value:"10.0");
- script_tag(name:"risk_factor", value:"Critical");
+ script_tag(name:"cvss_base", value:"5.8");
+ script_tag(name:"risk_factor", value:"High");
  name = "Mandrake Security Advisory MDVSA-2009:098 (krb5)";
  script_name(name);
 

Modified: trunk/openvas-plugins/scripts/mdksa_2009_098_1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/mdksa_2009_098_1.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/mdksa_2009_098_1.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,8 +30,8 @@
  script_id(66482);
  script_cve_id("CVE-2009-0844", "CVE-2009-0845", "CVE-2009-0846", "CVE-2009-0847");
  script_version ("$Revision$");
- script_tag(name:"cvss_base", value:"10.0");
- script_tag(name:"risk_factor", value:"Critical");
+ script_tag(name:"cvss_base", value:"5.8");
+ script_tag(name:"risk_factor", value:"High");
  script_name("Mandriva Security Advisory MDVSA-2009:098-1 (krb5)");
 
  desc = "The remote host is missing an update to krb5

Modified: trunk/openvas-plugins/scripts/mdksa_2009_099.nasl
===================================================================
--- trunk/openvas-plugins/scripts/mdksa_2009_099.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/mdksa_2009_099.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,8 +30,8 @@
  script_id(63914);
  script_cve_id("CVE-2009-1250", "CVE-2009-1251");
  script_version ("$");
- script_tag(name:"cvss_base", value:"10.0");
- script_tag(name:"risk_factor", value:"Critical");
+ script_tag(name:"cvss_base", value:"7.8");
+ script_tag(name:"risk_factor", value:"High");
  name = "Mandrake Security Advisory MDVSA-2009:099 (openafs)";
  script_name(name);
 

Modified: trunk/openvas-plugins/scripts/mdksa_2009_099_1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/mdksa_2009_099_1.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/mdksa_2009_099_1.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,8 +30,8 @@
  script_id(66483);
  script_cve_id("CVE-2009-1250", "CVE-2009-1251");
  script_version ("$Revision$");
- script_tag(name:"cvss_base", value:"10.0");
- script_tag(name:"risk_factor", value:"Critical");
+ script_tag(name:"cvss_base", value:"7.8");
+ script_tag(name:"risk_factor", value:"High");
  script_name("Mandriva Security Advisory MDVSA-2009:099-1 (openafs)");
 
  desc = "The remote host is missing an update to openafs

Modified: trunk/openvas-plugins/scripts/mdksa_2009_101.nasl
===================================================================
--- trunk/openvas-plugins/scripts/mdksa_2009_101.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/mdksa_2009_101.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,8 +30,8 @@
  script_id(63915);
  script_cve_id("CVE-2009-0146", "CVE-2009-0147", "CVE-2009-0165", "CVE-2009-0166", "CVE-2009-0800", "CVE-2009-0799", "CVE-2009-1179", "CVE-2009-1180", "CVE-2009-1181", "CVE-2009-1182", "CVE-2009-1183");
  script_version ("$");
- script_tag(name:"cvss_base", value:"10.0");
- script_tag(name:"risk_factor", value:"Critical");
+ script_tag(name:"cvss_base", value:"4.3");
+ script_tag(name:"risk_factor", value:"Medium");
  name = "Mandrake Security Advisory MDVSA-2009:101 (xpdf)";
  script_name(name);
 
@@ -85,7 +85,7 @@
 
 https://secure1.securityspace.com/smysecure/catid.html?in=MDVSA-2009:101
 
-Risk factor : High";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/mdksa_2009_110.nasl
===================================================================
--- trunk/openvas-plugins/scripts/mdksa_2009_110.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/mdksa_2009_110.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,8 +30,8 @@
  script_id(63984);
  script_cve_id("CVE-2009-1578", "CVE-2009-1579", "CVE-2009-1580", "CVE-2009-1581");
  script_version ("$");
- script_tag(name:"cvss_base", value:"6.8");
- script_tag(name:"risk_factor", value:"High");
+ script_tag(name:"cvss_base", value:"4.3");
+ script_tag(name:"risk_factor", value:"Medium");
  name = "Mandrake Security Advisory MDVSA-2009:110 (squirrelmail)";
  script_name(name);
 
@@ -76,7 +76,7 @@
 
 https://secure1.securityspace.com/smysecure/catid.html?in=MDVSA-2009:110
 
-Risk factor : High";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/mdksa_2009_111.nasl
===================================================================
--- trunk/openvas-plugins/scripts/mdksa_2009_111.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/mdksa_2009_111.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,8 +30,8 @@
  script_id(64134);
  script_cve_id("CVE-2009-1302", "CVE-2009-1303", "CVE-2009-1304", "CVE-2009-1305", "CVE-2009-0652", "CVE-2009-1306", "CVE-2009-1307", "CVE-2009-1308", "CVE-2009-1309", "CVE-2009-1310", "CVE-2009-1311", "CVE-2009-1312", "CVE-2009-1313");
  script_version ("$");
- script_tag(name:"cvss_base", value:"9.3");
- script_tag(name:"risk_factor", value:"Critical");
+ script_tag(name:"cvss_base", value:"5.0");
+ script_tag(name:"risk_factor", value:"Medium");
  name = "Mandrake Security Advisory MDVSA-2009:111 (firefox)";
  script_name(name);
 
@@ -60,7 +60,7 @@
 https://secure1.securityspace.com/smysecure/catid.html?in=MDVSA-2009:111
 http://www.mozilla.org/security/known-vulnerabilities/firefox30.html#firefox3.0.10
 
-Risk factor : High";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/mdksa_2009_111_1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/mdksa_2009_111_1.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/mdksa_2009_111_1.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,8 +30,8 @@
  script_id(63983);
  script_cve_id("CVE-2009-1302", "CVE-2009-1303", "CVE-2009-1304", "CVE-2009-1305", "CVE-2009-0652", "CVE-2009-1306", "CVE-2009-1307", "CVE-2009-1308", "CVE-2009-1309", "CVE-2009-1310", "CVE-2009-1311", "CVE-2009-1312", "CVE-2009-1313");
  script_version ("$");
- script_tag(name:"cvss_base", value:"9.3");
- script_tag(name:"risk_factor", value:"Critical");
+ script_tag(name:"cvss_base", value:"5.0");
+ script_tag(name:"risk_factor", value:"Medium");
  name = "Mandrake Security Advisory MDVSA-2009:111-1 (firefox)";
  script_name(name);
 
@@ -65,7 +65,7 @@
 https://secure1.securityspace.com/smysecure/catid.html?in=MDVSA-2009:111-1
 http://www.mozilla.org/security/known-vulnerabilities/firefox30.html#firefox3.0.10
 
-Risk factor : High";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/mdksa_2009_115.nasl
===================================================================
--- trunk/openvas-plugins/scripts/mdksa_2009_115.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/mdksa_2009_115.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,8 +30,8 @@
  script_id(64024);
  script_cve_id("CVE-2009-1150", "CVE-2009-1151");
  script_version ("$");
- script_tag(name:"cvss_base", value:"7.5");
- script_tag(name:"risk_factor", value:"High");
+ script_tag(name:"cvss_base", value:"4.3");
+ script_tag(name:"risk_factor", value:"Medium");
  name = "Mandrake Security Advisory MDVSA-2009:115 (phpMyAdmin)";
  script_name(name);
 
@@ -64,7 +64,7 @@
 http://www.phpmyadmin.net/home_page/security/PMASA-2009-2.php
 http://www.phpmyadmin.net/home_page/security/PMASA-2009-3.php
 
-Risk factor : High";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/mdksa_2009_116.nasl
===================================================================
--- trunk/openvas-plugins/scripts/mdksa_2009_116.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/mdksa_2009_116.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,8 +30,8 @@
  script_id(64129);
  script_cve_id("CVE-2009-1415", "CVE-2009-1416", "CVE-2009-1417");
  script_version ("$");
- script_tag(name:"cvss_base", value:"7.5");
- script_tag(name:"risk_factor", value:"High");
+ script_tag(name:"cvss_base", value:"4.3");
+ script_tag(name:"risk_factor", value:"Medium");
  name = "Mandrake Security Advisory MDVSA-2009:116 (gnutls)";
  script_name(name);
 
@@ -70,7 +70,7 @@
 
 https://secure1.securityspace.com/smysecure/catid.html?in=MDVSA-2009:116
 
-Risk factor : High";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/mdksa_2009_118.nasl
===================================================================
--- trunk/openvas-plugins/scripts/mdksa_2009_118.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/mdksa_2009_118.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,8 +30,8 @@
  script_id(64023);
  script_cve_id("CVE-2009-0028", "CVE-2009-0269", "CVE-2009-0342", "CVE-2009-0343", "CVE-2009-0834", "CVE-2009-0835", "CVE-2009-1184");
  script_version ("$");
- script_tag(name:"cvss_base", value:"7.2");
- script_tag(name:"risk_factor", value:"High");
+ script_tag(name:"cvss_base", value:"2.1");
+ script_tag(name:"risk_factor", value:"Medium");
  name = "Mandrake Security Advisory MDVSA-2009:118 (kernel)";
  script_name(name);
 
@@ -58,7 +58,7 @@
 
 https://secure1.securityspace.com/smysecure/catid.html?in=MDVSA-2009:118
 
-Risk factor : High";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/mdksa_2009_119.nasl
===================================================================
--- trunk/openvas-plugins/scripts/mdksa_2009_119.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/mdksa_2009_119.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,7 +30,7 @@
  script_id(64131);
  script_cve_id("CVE-2009-1337", "CVE-2009-1184", "CVE-2009-1192", "CVE-2009-1265");
  script_version ("$");
- script_tag(name:"cvss_base", value:"5.0");
+ script_tag(name:"cvss_base", value:"4.4");
  script_tag(name:"risk_factor", value:"Medium");
  name = "Mandrake Security Advisory MDVSA-2009:119 (kernel)";
  script_name(name);
@@ -78,7 +78,7 @@
 
 https://secure1.securityspace.com/smysecure/catid.html?in=MDVSA-2009:119
 
-Risk factor : High";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/mdksa_2009_121.nasl
===================================================================
--- trunk/openvas-plugins/scripts/mdksa_2009_121.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/mdksa_2009_121.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,8 +30,8 @@
  script_id(64133);
  script_cve_id("CVE-2009-0581", "CVE-2009-0723", "CVE-2009-0733", "CVE-2009-0793");
  script_version ("$");
- script_tag(name:"cvss_base", value:"9.3");
- script_tag(name:"risk_factor", value:"Critical");
+ script_tag(name:"cvss_base", value:"4.3");
+ script_tag(name:"risk_factor", value:"Medium");
  name = "Mandrake Security Advisory MDVSA-2009:121 (lcms)";
  script_name(name);
 
@@ -67,7 +67,7 @@
 
 https://secure1.securityspace.com/smysecure/catid.html?in=MDVSA-2009:121
 
-Risk factor : High";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/mdksa_2009_121_1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/mdksa_2009_121_1.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/mdksa_2009_121_1.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,8 +30,8 @@
  script_id(66360);
  script_cve_id("CVE-2009-0581", "CVE-2009-0723", "CVE-2009-0733", "CVE-2009-0793");
  script_version ("$Revision$");
- script_tag(name:"cvss_base", value:"9.3");
- script_tag(name:"risk_factor", value:"Critical");
+ script_tag(name:"cvss_base", value:"4.3");
+ script_tag(name:"risk_factor", value:"Medium");
  script_name("Mandriva Security Advisory MDVSA-2009:121-1 (lcms)");
 
  desc = "The remote host is missing an update to lcms
@@ -71,7 +71,7 @@
 
 https://secure1.securityspace.com/smysecure/catid.html?in=MDVSA-2009:121-1
 
-Risk factor : High";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/mdksa_2009_131.nasl
===================================================================
--- trunk/openvas-plugins/scripts/mdksa_2009_131.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/mdksa_2009_131.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,8 +30,8 @@
  script_id(64184);
  script_cve_id("CVE-2009-0023", "CVE-2003-1564", "CVE-2009-1955", "CVE-2009-1956");
  script_version ("$");
- script_tag(name:"cvss_base", value:"9.3");
- script_tag(name:"risk_factor", value:"Critical");
+ script_tag(name:"cvss_base", value:"4.3");
+ script_tag(name:"risk_factor", value:"Medium");
  name = "Mandrake Security Advisory MDVSA-2009:131 (apr-util)";
  script_name(name);
 
@@ -72,7 +72,7 @@
 
 https://secure1.securityspace.com/smysecure/catid.html?in=MDVSA-2009:131
 
-Risk factor : High";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/mdksa_2009_131_1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/mdksa_2009_131_1.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/mdksa_2009_131_1.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,8 +30,8 @@
  script_id(64182);
  script_cve_id("CVE-2009-0023", "CVE-2003-1564", "CVE-2009-1955", "CVE-2009-1956");
  script_version ("$");
- script_tag(name:"cvss_base", value:"9.3");
- script_tag(name:"risk_factor", value:"Critical");
+ script_tag(name:"cvss_base", value:"4.3");
+ script_tag(name:"risk_factor", value:"Medium");
  name = "Mandrake Security Advisory MDVSA-2009:131-1 (apr-util)";
  script_name(name);
 
@@ -76,7 +76,7 @@
 
 https://secure1.securityspace.com/smysecure/catid.html?in=MDVSA-2009:131-1
 
-Risk factor : High";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/mdksa_2009_135.nasl
===================================================================
--- trunk/openvas-plugins/scripts/mdksa_2009_135.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/mdksa_2009_135.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,8 +30,8 @@
  script_id(64220);
  script_cve_id("CVE-2009-1184", "CVE-2009-1337", "CVE-2009-1192", "CVE-2009-0029", "CVE-2009-1961", "CVE-2009-1385", "CVE-2009-1630", "CVE-2009-1265", "CVE-2009-1360");
  script_version ("$");
- script_tag(name:"cvss_base", value:"7.8");
- script_tag(name:"risk_factor", value:"High");
+ script_tag(name:"cvss_base", value:"4.4");
+ script_tag(name:"risk_factor", value:"Medium");
  name = "Mandrake Security Advisory MDVSA-2009:135 (kernel)";
  script_name(name);
 
@@ -57,7 +57,7 @@
 
 https://secure1.securityspace.com/smysecure/catid.html?in=MDVSA-2009:135
 
-Risk factor : High";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/mdksa_2009_137.nasl
===================================================================
--- trunk/openvas-plugins/scripts/mdksa_2009_137.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/mdksa_2009_137.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,8 +30,8 @@
  script_id(64221);
  script_cve_id("CVE-2009-0581", "CVE-2009-0723", "CVE-2009-0733", "CVE-2009-0793", "CVE-2006-2426", "CVE-2009-0794", "CVE-2009-1093", "CVE-2009-1094", "CVE-2009-1095", "CVE-2009-1096", "CVE-2009-1097", "CVE-2009-1098", "CVE-2009-1101", "CVE-2009-1102");
  script_version ("$");
- script_tag(name:"cvss_base", value:"10.0");
- script_tag(name:"risk_factor", value:"Critical");
+ script_tag(name:"cvss_base", value:"4.3");
+ script_tag(name:"risk_factor", value:"Medium");
  name = "Mandrake Security Advisory MDVSA-2009:137 (java-1.6.0-openjdk)";
  script_name(name);
 
@@ -57,7 +57,7 @@
 
 https://secure1.securityspace.com/smysecure/catid.html?in=MDVSA-2009:137
 
-Risk factor : High";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/mdksa_2009_140.nasl
===================================================================
--- trunk/openvas-plugins/scripts/mdksa_2009_140.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/mdksa_2009_140.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,8 +30,8 @@
  script_id(64286);
  script_cve_id("CVE-2009-1373", "CVE-2008-2927", "CVE-2009-1376");
  script_version ("$");
- script_tag(name:"cvss_base", value:"9.3");
- script_tag(name:"risk_factor", value:"Critical");
+ script_tag(name:"cvss_base", value:"7.1");
+ script_tag(name:"risk_factor", value:"High");
  name = "Mandrake Security Advisory MDVSA-2009:140 (gaim)";
  script_name(name);
 

Modified: trunk/openvas-plugins/scripts/mdksa_2009_141.nasl
===================================================================
--- trunk/openvas-plugins/scripts/mdksa_2009_141.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/mdksa_2009_141.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,8 +30,8 @@
  script_id(64287);
  script_cve_id("CVE-2009-1302", "CVE-2009-1303", "CVE-2009-1304", "CVE-2009-1305", "CVE-2009-1306", "CVE-2009-1307", "CVE-2009-1308", "CVE-2009-1309", "CVE-2009-2210", "CVE-2009-1392", "CVE-2009-1832", "CVE-2009-1833", "CVE-2009-1838", "CVE-2009-1836", "CVE-2009-1840", "CVE-2009-1841");
  script_version ("$");
- script_tag(name:"cvss_base", value:"9.3");
- script_tag(name:"risk_factor", value:"Critical");
+ script_tag(name:"cvss_base", value:"5.0");
+ script_tag(name:"risk_factor", value:"Medium");
  name = "Mandrake Security Advisory MDVSA-2009:141 (mozilla-thunderbird)";
  script_name(name);
 
@@ -56,7 +56,7 @@
 https://secure1.securityspace.com/smysecure/catid.html?in=MDVSA-2009:141
 http://www.mozilla.org/security/known-vulnerabilities/thunderbird20.html#thunderbird2.0.0.21
 
-Risk factor : High";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/mdksa_2009_142.nasl
===================================================================
--- trunk/openvas-plugins/scripts/mdksa_2009_142.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/mdksa_2009_142.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,8 +30,8 @@
  script_id(64340);
  script_cve_id("CVE-2007-2721", "CVE-2008-3520", "CVE-2008-3521", "CVE-2008-3522");
  script_version ("$");
- script_tag(name:"cvss_base", value:"10.0");
- script_tag(name:"risk_factor", value:"Critical");
+ script_tag(name:"cvss_base", value:"4.3");
+ script_tag(name:"risk_factor", value:"Medium");
  name = "Mandrake Security Advisory MDVSA-2009:142 (jasper)";
  script_name(name);
 
@@ -72,7 +72,7 @@
 
 https://secure1.securityspace.com/smysecure/catid.html?in=MDVSA-2009:142
 
-Risk factor : High";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/mdksa_2009_142_1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/mdksa_2009_142_1.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/mdksa_2009_142_1.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,8 +30,8 @@
  script_id(66379);
  script_cve_id("CVE-2007-2721", "CVE-2008-3520", "CVE-2008-3521", "CVE-2008-3522");
  script_version ("$Revision$");
- script_tag(name:"cvss_base", value:"10.0");
- script_tag(name:"risk_factor", value:"Critical");
+ script_tag(name:"cvss_base", value:"4.3");
+ script_tag(name:"risk_factor", value:"Medium");
  script_name("Mandriva Security Advisory MDVSA-2009:142-1 (jasper)");
 
  desc = "The remote host is missing an update to jasper
@@ -76,7 +76,7 @@
 
 https://secure1.securityspace.com/smysecure/catid.html?in=MDVSA-2009:142-1
 
-Risk factor : High";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/mdksa_2009_143.nasl
===================================================================
--- trunk/openvas-plugins/scripts/mdksa_2009_143.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/mdksa_2009_143.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,7 +30,7 @@
  script_id(64338);
  script_cve_id("CVE-2008-3520", "CVE-2008-3522");
  script_version ("$");
- script_tag(name:"cvss_base", value:"10.0");
+ script_tag(name:"cvss_base", value:"9.3");
  script_tag(name:"risk_factor", value:"Critical");
  name = "Mandrake Security Advisory MDVSA-2009:143 (netpbm)";
  script_name(name);
@@ -62,7 +62,7 @@
 
 https://secure1.securityspace.com/smysecure/catid.html?in=MDVSA-2009:143
 
-Risk factor : High";
+Risk factor : Critical";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/mdksa_2009_144.nasl
===================================================================
--- trunk/openvas-plugins/scripts/mdksa_2009_144.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/mdksa_2009_144.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,7 +30,7 @@
  script_id(64341);
  script_cve_id("CVE-2008-3520", "CVE-2008-3522");
  script_version ("$");
- script_tag(name:"cvss_base", value:"10.0");
+ script_tag(name:"cvss_base", value:"9.3");
  script_tag(name:"risk_factor", value:"Critical");
  name = "Mandrake Security Advisory MDVSA-2009:144 (ghostscript)";
  script_name(name);
@@ -66,7 +66,7 @@
 
 https://secure1.securityspace.com/smysecure/catid.html?in=MDVSA-2009:144
 
-Risk factor : High";
+Risk factor : Critical";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/mdksa_2009_147.nasl
===================================================================
--- trunk/openvas-plugins/scripts/mdksa_2009_147.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/mdksa_2009_147.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,8 +30,8 @@
  script_id(64343);
  script_cve_id("CVE-2009-1373", "CVE-2009-1374", "CVE-2009-1375", "CVE-2008-2927", "CVE-2009-1376");
  script_version ("$");
- script_tag(name:"cvss_base", value:"9.3");
- script_tag(name:"risk_factor", value:"Critical");
+ script_tag(name:"cvss_base", value:"7.1");
+ script_tag(name:"risk_factor", value:"High");
  name = "Mandrake Security Advisory MDVSA-2009:147 (pidgin)";
  script_name(name);
 

Modified: trunk/openvas-plugins/scripts/mdksa_2009_149.nasl
===================================================================
--- trunk/openvas-plugins/scripts/mdksa_2009_149.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/mdksa_2009_149.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,8 +30,8 @@
  script_id(64391);
  script_cve_id("CVE-2009-1890", "CVE-2009-1891");
  script_version ("$");
- script_tag(name:"cvss_base", value:"5.0");
- script_tag(name:"risk_factor", value:"Medium");
+ script_tag(name:"cvss_base", value:"7.1");
+ script_tag(name:"risk_factor", value:"High");
  name = "Mandrake Security Advisory MDVSA-2009:149 (apache)";
  script_name(name);
 

Modified: trunk/openvas-plugins/scripts/mdksa_2009_150.nasl
===================================================================
--- trunk/openvas-plugins/scripts/mdksa_2009_150.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/mdksa_2009_150.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,8 +30,8 @@
  script_id(64392);
  script_cve_id("CVE-2008-2327", "CVE-2009-2285", "CVE-2009-2347");
  script_version ("$");
- script_tag(name:"cvss_base", value:"9.3");
- script_tag(name:"risk_factor", value:"Critical");
+ script_tag(name:"cvss_base", value:"6.8");
+ script_tag(name:"risk_factor", value:"High");
  name = "Mandrake Security Advisory MDVSA-2009:150 (libtiff)";
  script_name(name);
 

Modified: trunk/openvas-plugins/scripts/mdksa_2009_162.nasl
===================================================================
--- trunk/openvas-plugins/scripts/mdksa_2009_162.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/mdksa_2009_162.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,8 +30,8 @@
  script_id(64495);
  script_cve_id("CVE-2009-0581", "CVE-2009-0723", "CVE-2009-0733", "CVE-2009-0793", "CVE-2006-2426", "CVE-2009-0794", "CVE-2009-1093", "CVE-2009-1094", "CVE-2009-1095", "CVE-2009-1096", "CVE-2009-1097", "CVE-2009-1098", "CVE-2009-1101", "CVE-2009-1102");
  script_version ("$");
- script_tag(name:"cvss_base", value:"10.0");
- script_tag(name:"risk_factor", value:"Critical");
+ script_tag(name:"cvss_base", value:"4.3");
+ script_tag(name:"risk_factor", value:"Medium");
  script_name("Mandrake Security Advisory MDVSA-2009:162 (java-1.6.0-openjdk)");
 
  desc = "The remote host is missing an update to java-1.6.0-openjdk
@@ -102,7 +102,7 @@
 
 https://secure1.securityspace.com/smysecure/catid.html?in=MDVSA-2009:162
 
-Risk factor : High";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/mdksa_2009_164.nasl
===================================================================
--- trunk/openvas-plugins/scripts/mdksa_2009_164.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/mdksa_2009_164.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,8 +30,8 @@
  script_id(64497);
  script_cve_id("CVE-2007-2721", "CVE-2008-3520", "CVE-2008-3521", "CVE-2008-3522");
  script_version ("$");
- script_tag(name:"cvss_base", value:"10.0");
- script_tag(name:"risk_factor", value:"Critical");
+ script_tag(name:"cvss_base", value:"4.3");
+ script_tag(name:"risk_factor", value:"Medium");
  script_name("Mandrake Security Advisory MDVSA-2009:164 (jasper)");
 
  desc = "The remote host is missing an update to jasper
@@ -71,7 +71,7 @@
 
 https://secure1.securityspace.com/smysecure/catid.html?in=MDVSA-2009:164
 
-Risk factor : High";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/mdksa_2009_165.nasl
===================================================================
--- trunk/openvas-plugins/scripts/mdksa_2009_165.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/mdksa_2009_165.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,7 +30,7 @@
  script_id(64498);
  script_cve_id("CVE-2008-3520", "CVE-2008-3522");
  script_version ("$");
- script_tag(name:"cvss_base", value:"10.0");
+ script_tag(name:"cvss_base", value:"9.3");
  script_tag(name:"risk_factor", value:"Critical");
  script_name("Mandrake Security Advisory MDVSA-2009:165 (ghostscript)");
 
@@ -65,7 +65,7 @@
 
 https://secure1.securityspace.com/smysecure/catid.html?in=MDVSA-2009:165
 
-Risk factor : High";
+Risk factor : Critical";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/mdksa_2009_168.nasl
===================================================================
--- trunk/openvas-plugins/scripts/mdksa_2009_168.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/mdksa_2009_168.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,8 +30,8 @@
  script_id(64500);
  script_cve_id("CVE-2009-1890", "CVE-2009-1891");
  script_version ("$");
- script_tag(name:"cvss_base", value:"5.0");
- script_tag(name:"risk_factor", value:"Medium");
+ script_tag(name:"cvss_base", value:"7.1");
+ script_tag(name:"risk_factor", value:"High");
  script_name("Mandrake Security Advisory MDVSA-2009:168 (apache)");
 
  desc = "The remote host is missing an update to apache

Modified: trunk/openvas-plugins/scripts/mdksa_2009_169.nasl
===================================================================
--- trunk/openvas-plugins/scripts/mdksa_2009_169.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/mdksa_2009_169.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,8 +30,8 @@
  script_id(64502);
  script_cve_id("CVE-2008-2327", "CVE-2009-2285", "CVE-2009-2347");
  script_version ("$");
- script_tag(name:"cvss_base", value:"9.3");
- script_tag(name:"risk_factor", value:"Critical");
+ script_tag(name:"cvss_base", value:"6.8");
+ script_tag(name:"risk_factor", value:"High");
  script_name("Mandrake Security Advisory MDVSA-2009:169 (libtiff)");
 
  desc = "The remote host is missing an update to libtiff

Modified: trunk/openvas-plugins/scripts/mdksa_2009_169_1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/mdksa_2009_169_1.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/mdksa_2009_169_1.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,8 +30,8 @@
  script_id(66375);
  script_cve_id("CVE-2008-2327", "CVE-2009-2285", "CVE-2009-2347");
  script_version ("$Revision$");
- script_tag(name:"cvss_base", value:"9.3");
- script_tag(name:"risk_factor", value:"Critical");
+ script_tag(name:"cvss_base", value:"6.8");
+ script_tag(name:"risk_factor", value:"High");
  script_name("Mandriva Security Advisory MDVSA-2009:169-1 (libtiff)");
 
  desc = "The remote host is missing an update to libtiff

Modified: trunk/openvas-plugins/scripts/mdksa_2009_173.nasl
===================================================================
--- trunk/openvas-plugins/scripts/mdksa_2009_173.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/mdksa_2009_173.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,8 +30,8 @@
  script_id(64516);
  script_cve_id("CVE-2009-1373", "CVE-2009-1374", "CVE-2009-1375", "CVE-2008-2927", "CVE-2009-1376");
  script_version ("$");
- script_tag(name:"cvss_base", value:"9.3");
- script_tag(name:"risk_factor", value:"Critical");
+ script_tag(name:"cvss_base", value:"7.1");
+ script_tag(name:"risk_factor", value:"High");
  script_name("Mandrake Security Advisory MDVSA-2009:173 (pidgin)");
 
  desc = "The remote host is missing an update to pidgin

Modified: trunk/openvas-plugins/scripts/mdksa_2009_183.nasl
===================================================================
--- trunk/openvas-plugins/scripts/mdksa_2009_183.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/mdksa_2009_183.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,8 +30,8 @@
  script_id(64526);
  script_cve_id("CVE-2008-5676", "CVE-2009-1902", "CVE-2009-1903");
  script_version ("$");
- script_tag(name:"cvss_base", value:"7.8");
- script_tag(name:"risk_factor", value:"High");
+ script_tag(name:"cvss_base", value:"5.0");
+ script_tag(name:"risk_factor", value:"Medium");
  script_name("Mandrake Security Advisory MDVSA-2009:183 (apache-mod_security)");
 
  desc = "The remote host is missing an update to apache-mod_security
@@ -67,7 +67,7 @@
 
 https://secure1.securityspace.com/smysecure/catid.html?in=MDVSA-2009:183
 
-Risk factor : High";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/mdksa_2009_185.nasl
===================================================================
--- trunk/openvas-plugins/scripts/mdksa_2009_185.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/mdksa_2009_185.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,7 +30,7 @@
  script_id(64528);
  script_cve_id("CVE-2009-1392", "CVE-2009-1832", "CVE-2009-1833", "CVE-2009-1837", "CVE-2009-1838", "CVE-2009-1841", "CVE-2009-2043", "CVE-2009-2044", "CVE-2009-1834", "CVE-2009-1835", "CVE-2009-1836", "CVE-2009-1839", "CVE-2009-1840", "CVE-2009-2462", "CVE-2009-2463", "CVE-2009-2464", "CVE-2009-2465", "CVE-2009-2466", "CVE-2009-2468", "CVE-2009-2467", "CVE-2009-2469", "CVE-2009-2472", "CVE-2009-2061", "CVE-2009-2065");
  script_version ("$");
- script_tag(name:"cvss_base", value:"10.0");
+ script_tag(name:"cvss_base", value:"9.3");
  script_tag(name:"risk_factor", value:"Critical");
  script_name("Mandrake Security Advisory MDVSA-2009:185 (firefox)");
 
@@ -83,7 +83,7 @@
 https://secure1.securityspace.com/smysecure/catid.html?in=MDVSA-2009:185
 http://www.mozilla.org/security/known-vulnerabilities/firefox30.html#firefox3.0.12
 
-Risk factor : High";
+Risk factor : Critical";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/mdksa_2009_194.nasl
===================================================================
--- trunk/openvas-plugins/scripts/mdksa_2009_194.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/mdksa_2009_194.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,8 +30,8 @@
  script_id(64600);
  script_cve_id("CVE-2009-2560", "CVE-2009-2562", "CVE-2009-2563");
  script_version ("$Revision$");
- script_tag(name:"cvss_base", value:"7.1");
- script_tag(name:"risk_factor", value:"High");
+ script_tag(name:"cvss_base", value:"5.0");
+ script_tag(name:"risk_factor", value:"Medium");
  script_name("Mandrake Security Advisory MDVSA-2009:194 (wireshark)");
 
  desc = "The remote host is missing an update to wireshark
@@ -52,7 +52,7 @@
 https://secure1.securityspace.com/smysecure/catid.html?in=MDVSA-2009:194
 http://www.wireshark.org/security/wnpa-sec-2009-04.html
 
-Risk factor : High";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/mdksa_2009_197.nasl
===================================================================
--- trunk/openvas-plugins/scripts/mdksa_2009_197.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/mdksa_2009_197.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,8 +30,8 @@
  script_id(64607);
  script_cve_id("CVE-2009-2408", "CVE-2009-2409", "CVE-2009-2404");
  script_version ("$Revision$");
- script_tag(name:"cvss_base", value:"9.3");
- script_tag(name:"risk_factor", value:"Critical");
+ script_tag(name:"cvss_base", value:"6.8");
+ script_tag(name:"risk_factor", value:"High");
  script_name("Mandrake Security Advisory MDVSA-2009:197 (nss)");
 
  desc = "The remote host is missing an update to nss

Modified: trunk/openvas-plugins/scripts/mdksa_2009_197_2.nasl
===================================================================
--- trunk/openvas-plugins/scripts/mdksa_2009_197_2.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/mdksa_2009_197_2.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,8 +30,8 @@
  script_id(64842);
  script_cve_id("CVE-2009-2408", "CVE-2009-2409", "CVE-2009-2404");
  script_version ("$");
- script_tag(name:"cvss_base", value:"9.3");
- script_tag(name:"risk_factor", value:"Critical");
+ script_tag(name:"cvss_base", value:"6.8");
+ script_tag(name:"risk_factor", value:"High");
  script_name("Mandrake Security Advisory MDVSA-2009:197-2 (nss)");
 
  desc = "The remote host is missing an update to nss

Modified: trunk/openvas-plugins/scripts/mdksa_2009_197_3.nasl
===================================================================
--- trunk/openvas-plugins/scripts/mdksa_2009_197_3.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/mdksa_2009_197_3.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,8 +30,8 @@
  script_id(66362);
  script_cve_id("CVE-2009-2408", "CVE-2009-2409", "CVE-2009-2404");
  script_version ("$Revision$");
- script_tag(name:"cvss_base", value:"9.3");
- script_tag(name:"risk_factor", value:"Critical");
+ script_tag(name:"cvss_base", value:"6.8");
+ script_tag(name:"risk_factor", value:"High");
  script_name("Mandriva Security Advisory MDVSA-2009:197-3 (nss)");
 
  desc = "The remote host is missing an update to nss

Modified: trunk/openvas-plugins/scripts/mdksa_2009_198.nasl
===================================================================
--- trunk/openvas-plugins/scripts/mdksa_2009_198.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/mdksa_2009_198.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,8 +30,8 @@
  script_id(64604);
  script_cve_id("CVE-2009-2654", "CVE-2009-2404", "CVE-2009-2408");
  script_version ("$Revision$");
- script_tag(name:"cvss_base", value:"9.3");
- script_tag(name:"risk_factor", value:"Critical");
+ script_tag(name:"cvss_base", value:"5.8");
+ script_tag(name:"risk_factor", value:"High");
  script_name("Mandrake Security Advisory MDVSA-2009:198 (firefox)");
 
  desc = "The remote host is missing an update to firefox

Modified: trunk/openvas-plugins/scripts/mdksa_2009_203.nasl
===================================================================
--- trunk/openvas-plugins/scripts/mdksa_2009_203.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/mdksa_2009_203.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,7 +30,7 @@
  script_id(64675);
  script_cve_id("CVE-2009-2408", "CVE-2009-2417");
  script_version ("$");
- script_tag(name:"cvss_base", value:"7.5");
+ script_tag(name:"cvss_base", value:"6.8");
  script_tag(name:"risk_factor", value:"High");
  script_name("Mandrake Security Advisory MDVSA-2009:203 (curl)");
 

Modified: trunk/openvas-plugins/scripts/mdksa_2009_203_1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/mdksa_2009_203_1.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/mdksa_2009_203_1.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,7 +30,7 @@
  script_id(66376);
  script_cve_id("CVE-2009-2408", "CVE-2009-2417");
  script_version ("$Revision$");
- script_tag(name:"cvss_base", value:"7.5");
+ script_tag(name:"cvss_base", value:"6.8");
  script_tag(name:"risk_factor", value:"High");
  script_name("Mandriva Security Advisory MDVSA-2009:203-1 (curl)");
 

Modified: trunk/openvas-plugins/scripts/mdksa_2009_209.nasl
===================================================================
--- trunk/openvas-plugins/scripts/mdksa_2009_209.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/mdksa_2009_209.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,8 +30,8 @@
  script_id(64681);
  script_cve_id("CVE-2009-0217", "CVE-2009-1896", "CVE-2009-2475", "CVE-2009-2476", "CVE-2009-2625", "CVE-2009-2670", "CVE-2009-2671", "CVE-2009-2673", "CVE-2009-2674", "CVE-2009-2675", "CVE-2009-2689", "CVE-2009-2690");
  script_version ("$");
- script_tag(name:"cvss_base", value:"10.0");
- script_tag(name:"risk_factor", value:"Critical");
+ script_tag(name:"cvss_base", value:"5.0");
+ script_tag(name:"risk_factor", value:"Medium");
  script_name("Mandrake Security Advisory MDVSA-2009:209 (java-1.6.0-openjdk)");
 
  desc = "The remote host is missing an update to java-1.6.0-openjdk
@@ -49,7 +49,7 @@
 
 https://secure1.securityspace.com/smysecure/catid.html?in=MDVSA-2009:209
 
-Risk factor : High";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/mdksa_2009_216.nasl
===================================================================
--- trunk/openvas-plugins/scripts/mdksa_2009_216.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/mdksa_2009_216.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,8 +30,8 @@
  script_id(64688);
  script_cve_id("CVE-2009-2408", "CVE-2009-2409", "CVE-2009-2404", "CVE-2009-2625");
  script_version ("$");
- script_tag(name:"cvss_base", value:"9.3");
- script_tag(name:"risk_factor", value:"Critical");
+ script_tag(name:"cvss_base", value:"6.8");
+ script_tag(name:"risk_factor", value:"High");
  script_name("Mandrake Security Advisory MDVSA-2009:216 (mozilla-thunderbird)");
 
  desc = "The remote host is missing an update to mozilla-thunderbird

Modified: trunk/openvas-plugins/scripts/mdksa_2009_230.nasl
===================================================================
--- trunk/openvas-plugins/scripts/mdksa_2009_230.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/mdksa_2009_230.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,7 +30,7 @@
  script_id(64839);
  script_cve_id("CVE-2009-1376", "CVE-2009-2694", "CVE-2009-3025", "CVE-2009-3026", "CVE-2009-2703", "CVE-2009-3083", "CVE-2009-3084", "CVE-2009-3085");
  script_version ("$");
- script_tag(name:"cvss_base", value:"10.0");
+ script_tag(name:"cvss_base", value:"9.3");
  script_tag(name:"risk_factor", value:"Critical");
  script_name("Mandrake Security Advisory MDVSA-2009:230 (pidgin)");
 
@@ -96,7 +96,7 @@
 https://secure1.securityspace.com/smysecure/catid.html?in=MDVSA-2009:230
 http://pidgin.im/news/security/
 
-Risk factor : High";
+Risk factor : Critical";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/mdksa_2009_237.nasl
===================================================================
--- trunk/openvas-plugins/scripts/mdksa_2009_237.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/mdksa_2009_237.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,8 +30,8 @@
  script_id(64947);
  script_cve_id("CVE-2009-1386", "CVE-2009-2409");
  script_version ("$");
- script_tag(name:"cvss_base", value:"6.4");
- script_tag(name:"risk_factor", value:"High");
+ script_tag(name:"cvss_base", value:"5.0");
+ script_tag(name:"risk_factor", value:"Medium");
  script_name("Mandrake Security Advisory MDVSA-2009:237 (openssl)");
 
  desc = "The remote host is missing an update to openssl
@@ -62,7 +62,7 @@
 
 https://secure1.securityspace.com/smysecure/catid.html?in=MDVSA-2009:237
 
-Risk factor : High";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/mdksa_2009_238.nasl
===================================================================
--- trunk/openvas-plugins/scripts/mdksa_2009_238.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/mdksa_2009_238.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,8 +30,8 @@
  script_id(64948);
  script_cve_id("CVE-2009-1379", "CVE-2009-1386", "CVE-2009-1387", "CVE-2009-2409");
  script_version ("$");
- script_tag(name:"cvss_base", value:"6.4");
- script_tag(name:"risk_factor", value:"High");
+ script_tag(name:"cvss_base", value:"5.0");
+ script_tag(name:"risk_factor", value:"Medium");
  script_name("Mandrake Security Advisory MDVSA-2009:238 (openssl)");
 
  desc = "The remote host is missing an update to openssl
@@ -75,7 +75,7 @@
 
 https://secure1.securityspace.com/smysecure/catid.html?in=MDVSA-2009:238
 
-Risk factor : High";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/mdksa_2009_239.nasl
===================================================================
--- trunk/openvas-plugins/scripts/mdksa_2009_239.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/mdksa_2009_239.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,8 +30,8 @@
  script_id(64949);
  script_cve_id("CVE-2009-1379", "CVE-2009-1387", "CVE-2009-2409");
  script_version ("$");
- script_tag(name:"cvss_base", value:"6.4");
- script_tag(name:"risk_factor", value:"High");
+ script_tag(name:"cvss_base", value:"5.0");
+ script_tag(name:"risk_factor", value:"Medium");
  script_name("Mandrake Security Advisory MDVSA-2009:239 (openssl)");
 
  desc = "The remote host is missing an update to openssl
@@ -70,7 +70,7 @@
 
 https://secure1.securityspace.com/smysecure/catid.html?in=MDVSA-2009:239
 
-Risk factor : High";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/mdksa_2009_240.nasl
===================================================================
--- trunk/openvas-plugins/scripts/mdksa_2009_240.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/mdksa_2009_240.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,8 +30,8 @@
  script_id(64950);
  script_cve_id("CVE-2009-3094", "CVE-2009-3095");
  script_version ("$");
- script_tag(name:"cvss_base", value:"7.5");
- script_tag(name:"risk_factor", value:"High");
+ script_tag(name:"cvss_base", value:"2.6");
+ script_tag(name:"risk_factor", value:"Medium");
  script_name("Mandrake Security Advisory MDVSA-2009:240 (apache)");
 
  desc = "The remote host is missing an update to apache
@@ -66,7 +66,7 @@
 
 https://secure1.securityspace.com/smysecure/catid.html?in=MDVSA-2009:240
 
-Risk factor : High";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/mdksa_2009_242.nasl
===================================================================
--- trunk/openvas-plugins/scripts/mdksa_2009_242.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/mdksa_2009_242.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,8 +30,8 @@
  script_id(64952);
  script_cve_id("CVE-2009-2632", "CVE-2009-3235");
  script_version ("$");
- script_tag(name:"cvss_base", value:"7.5");
- script_tag(name:"risk_factor", value:"High");
+ script_tag(name:"cvss_base", value:"4.4");
+ script_tag(name:"risk_factor", value:"Medium");
  script_name("Mandrake Security Advisory MDVSA-2009:242 (dovecot)");
 
  desc = "The remote host is missing an update to dovecot
@@ -57,7 +57,7 @@
 
 https://secure1.securityspace.com/smysecure/catid.html?in=MDVSA-2009:242
 
-Risk factor : High";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/mdksa_2009_242_1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/mdksa_2009_242_1.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/mdksa_2009_242_1.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,8 +30,8 @@
  script_id(64953);
  script_cve_id("CVE-2009-2632", "CVE-2009-3235");
  script_version ("$");
- script_tag(name:"cvss_base", value:"7.5");
- script_tag(name:"risk_factor", value:"High");
+ script_tag(name:"cvss_base", value:"4.4");
+ script_tag(name:"risk_factor", value:"Medium");
  script_name("Mandrake Security Advisory MDVSA-2009:242-1 (dovecot)");
 
  desc = "The remote host is missing an update to dovecot
@@ -62,7 +62,7 @@
 
 https://secure1.securityspace.com/smysecure/catid.html?in=MDVSA-2009:242-1
 
-Risk factor : High";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/mdksa_2009_246.nasl
===================================================================
--- trunk/openvas-plugins/scripts/mdksa_2009_246.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/mdksa_2009_246.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,7 +30,7 @@
  script_id(64958);
  script_cve_id("CVE-2008-7068", "CVE-2009-3291", "CVE-2009-3292", "CVE-2009-3293");
  script_version ("$");
- script_tag(name:"cvss_base", value:"7.5");
+ script_tag(name:"cvss_base", value:"6.4");
  script_tag(name:"risk_factor", value:"High");
  script_name("Mandrake Security Advisory MDVSA-2009:246 (php)");
 

Modified: trunk/openvas-plugins/scripts/mdksa_2009_247.nasl
===================================================================
--- trunk/openvas-plugins/scripts/mdksa_2009_247.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/mdksa_2009_247.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,7 +30,7 @@
  script_id(64959);
  script_cve_id("CVE-2008-7068", "CVE-2009-3291", "CVE-2009-3292", "CVE-2009-3293");
  script_version ("$");
- script_tag(name:"cvss_base", value:"7.5");
+ script_tag(name:"cvss_base", value:"6.4");
  script_tag(name:"risk_factor", value:"High");
  script_name("Mandrake Security Advisory MDVSA-2009:247 (php)");
 

Modified: trunk/openvas-plugins/scripts/mdksa_2009_251_1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/mdksa_2009_251_1.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/mdksa_2009_251_1.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,8 +30,8 @@
  script_id(66478);
  script_cve_id("CVE-2009-3229", "CVE-2007-6600", "CVE-2009-3230", "CVE-2009-3231");
  script_version ("$Revision$");
- script_tag(name:"cvss_base", value:"6.8");
- script_tag(name:"risk_factor", value:"High");
+ script_tag(name:"cvss_base", value:"4.0");
+ script_tag(name:"risk_factor", value:"Medium");
  script_name("Mandriva Security Advisory MDVSA-2009:251-1 (postgresql8.2)");
 
  desc = "The remote host is missing an update to postgresql8.2
@@ -69,7 +69,7 @@
 
 https://secure1.securityspace.com/smysecure/catid.html?in=MDVSA-2009:251-1
 
-Risk factor : High";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/mdksa_2009_256.nasl
===================================================================
--- trunk/openvas-plugins/scripts/mdksa_2009_256.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/mdksa_2009_256.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,7 +30,7 @@
  script_id(65733);
  script_cve_id("CVE-2008-3834", "CVE-2009-1189");
  script_version ("$Revision$");
- script_tag(name:"cvss_base", value:"3.6");
+ script_tag(name:"cvss_base", value:"2.1");
  script_tag(name:"risk_factor", value:"Medium");
  script_name("Mandrake Security Advisory MDVSA-2009:256 (dbus)");
 
@@ -55,7 +55,7 @@
 
 https://secure1.securityspace.com/smysecure/catid.html?in=MDVSA-2009:256
 
-Risk factor : High";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/mdksa_2009_256_1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/mdksa_2009_256_1.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/mdksa_2009_256_1.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,7 +30,7 @@
  script_id(66422);
  script_cve_id("CVE-2008-3834", "CVE-2009-1189");
  script_version ("$Revision$");
- script_tag(name:"cvss_base", value:"3.6");
+ script_tag(name:"cvss_base", value:"2.1");
  script_tag(name:"risk_factor", value:"Medium");
  script_name("Mandriva Security Advisory MDVSA-2009:256-1 (dbus)");
 
@@ -60,7 +60,7 @@
 
 https://secure1.securityspace.com/smysecure/catid.html?in=MDVSA-2009:256-1
 
-Risk factor : High";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/mdksa_2009_258.nasl
===================================================================
--- trunk/openvas-plugins/scripts/mdksa_2009_258.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/mdksa_2009_258.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,7 +30,7 @@
  script_id(65734);
  script_cve_id("CVE-2009-2409");
  script_version ("$Revision$");
- script_tag(name:"cvss_base", value:"6.4");
+ script_tag(name:"cvss_base", value:"5.1");
  script_tag(name:"risk_factor", value:"High");
  script_name("Mandrake Security Advisory MDVSA-2009:258 (openssl)");
 

Modified: trunk/openvas-plugins/scripts/mdksa_2009_268.nasl
===================================================================
--- trunk/openvas-plugins/scripts/mdksa_2009_268.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/mdksa_2009_268.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,7 +30,7 @@
  script_id(66025);
  script_cve_id("CVE-2008-3422", "CVE-2009-0217");
  script_version ("$Revision$");
- script_tag(name:"cvss_base", value:"5.0");
+ script_tag(name:"cvss_base", value:"4.3");
  script_tag(name:"risk_factor", value:"Medium");
  script_name("Mandrake Security Advisory MDVSA-2009:268 (mono)");
 
@@ -62,7 +62,7 @@
 
 https://secure1.securityspace.com/smysecure/catid.html?in=MDVSA-2009:268
 
-Risk factor : High";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/mdksa_2009_281.nasl
===================================================================
--- trunk/openvas-plugins/scripts/mdksa_2009_281.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/mdksa_2009_281.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,8 +30,8 @@
  script_id(66087);
  script_cve_id("CVE-2009-0146", "CVE-2009-0147", "CVE-2009-0163", "CVE-2009-0165", "CVE-2009-0166", "CVE-2009-1179", "CVE-2009-0791", "CVE-2009-0949", "CVE-2009-3608", "CVE-2009-3609");
  script_version ("$Revision$");
- script_tag(name:"cvss_base", value:"10.0");
- script_tag(name:"risk_factor", value:"Critical");
+ script_tag(name:"cvss_base", value:"4.3");
+ script_tag(name:"risk_factor", value:"Medium");
  script_name("Mandrake Security Advisory MDVSA-2009:281 (cups)");
 
  desc = "The remote host is missing an update to cups
@@ -89,7 +89,7 @@
 
 https://secure1.securityspace.com/smysecure/catid.html?in=MDVSA-2009:281
 
-Risk factor : High";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/mdksa_2009_282.nasl
===================================================================
--- trunk/openvas-plugins/scripts/mdksa_2009_282.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/mdksa_2009_282.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,8 +30,8 @@
  script_id(66084);
  script_cve_id("CVE-2009-0146", "CVE-2009-0147", "CVE-2009-0163", "CVE-2009-0165", "CVE-2009-0166", "CVE-2009-0195", "CVE-2009-1179", "CVE-2009-0791", "CVE-2009-0799", "CVE-2009-0800", "CVE-2009-0949", "CVE-2009-1180", "CVE-2009-1181", "CVE-2009-1182", "CVE-2009-1183", "CVE-2009-3608", "CVE-2009-3609");
  script_version ("$Revision$");
- script_tag(name:"cvss_base", value:"10.0");
- script_tag(name:"risk_factor", value:"Critical");
+ script_tag(name:"cvss_base", value:"4.3");
+ script_tag(name:"risk_factor", value:"Medium");
  script_name("Mandrake Security Advisory MDVSA-2009:282 (cups)");
 
  desc = "The remote host is missing an update to cups
@@ -48,7 +48,7 @@
 
 https://secure1.securityspace.com/smysecure/catid.html?in=MDVSA-2009:282
 
-Risk factor : High";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/mdksa_2009_282_1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/mdksa_2009_282_1.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/mdksa_2009_282_1.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,8 +30,8 @@
  script_id(66477);
  script_cve_id("CVE-2009-0146", "CVE-2009-0147", "CVE-2009-0163", "CVE-2009-0165", "CVE-2009-0166", "CVE-2009-0195", "CVE-2009-1179", "CVE-2009-0791", "CVE-2009-0799", "CVE-2009-0800", "CVE-2009-0949", "CVE-2009-1180", "CVE-2009-1181", "CVE-2009-1182", "CVE-2009-1183", "CVE-2009-3608", "CVE-2009-3609");
  script_version ("$Revision$");
- script_tag(name:"cvss_base", value:"10.0");
- script_tag(name:"risk_factor", value:"Critical");
+ script_tag(name:"cvss_base", value:"4.3");
+ script_tag(name:"risk_factor", value:"Medium");
  script_name("Mandriva Security Advisory MDVSA-2009:282-1 (cups)");
 
  desc = "The remote host is missing an update to cups
@@ -53,7 +53,7 @@
 
 https://secure1.securityspace.com/smysecure/catid.html?in=MDVSA-2009:282-1
 
-Risk factor : High";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/mdksa_2009_283.nasl
===================================================================
--- trunk/openvas-plugins/scripts/mdksa_2009_283.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/mdksa_2009_283.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,8 +30,8 @@
  script_id(66083);
  script_cve_id("CVE-2009-0146", "CVE-2009-0147", "CVE-2009-0163", "CVE-2009-0166", "CVE-2009-0195", "CVE-2009-1179", "CVE-2009-0791", "CVE-2009-0799", "CVE-2009-0800", "CVE-2009-0949", "CVE-2009-1180", "CVE-2009-1181", "CVE-2009-1182", "CVE-2009-1183", "CVE-2009-1196", "CVE-2009-3608", "CVE-2009-3609");
  script_version ("$Revision$");
- script_tag(name:"cvss_base", value:"9.3");
- script_tag(name:"risk_factor", value:"Critical");
+ script_tag(name:"cvss_base", value:"4.3");
+ script_tag(name:"risk_factor", value:"Medium");
  script_name("Mandrake Security Advisory MDVSA-2009:283 (cups)");
 
  desc = "The remote host is missing an update to cups
@@ -48,7 +48,7 @@
 
 https://secure1.securityspace.com/smysecure/catid.html?in=MDVSA-2009:283
 
-Risk factor : High";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/mdksa_2009_287.nasl
===================================================================
--- trunk/openvas-plugins/scripts/mdksa_2009_287.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/mdksa_2009_287.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,8 +30,8 @@
  script_id(66090);
  script_cve_id("CVE-2009-1188", "CVE-2009-3603", "CVE-2009-3604", "CVE-2009-3606", "CVE-2009-3608", "CVE-2009-3609");
  script_version ("$Revision$");
- script_tag(name:"cvss_base", value:"9.3");
- script_tag(name:"risk_factor", value:"Critical");
+ script_tag(name:"cvss_base", value:"5.0");
+ script_tag(name:"risk_factor", value:"Medium");
  script_name("Mandrake Security Advisory MDVSA-2009:287 (xpdf)");
 
  desc = "The remote host is missing an update to xpdf
@@ -81,7 +81,7 @@
 
 https://secure1.securityspace.com/smysecure/catid.html?in=MDVSA-2009:287
 
-Risk factor : High";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/mdksa_2009_287_1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/mdksa_2009_287_1.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/mdksa_2009_287_1.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,8 +30,8 @@
  script_id(66381);
  script_cve_id("CVE-2009-1188", "CVE-2009-3603", "CVE-2009-3604", "CVE-2009-3606", "CVE-2009-3608", "CVE-2009-3609");
  script_version ("$Revision$");
- script_tag(name:"cvss_base", value:"9.3");
- script_tag(name:"risk_factor", value:"Critical");
+ script_tag(name:"cvss_base", value:"5.0");
+ script_tag(name:"risk_factor", value:"Medium");
  script_name("Mandriva Security Advisory MDVSA-2009:287-1 (xpdf)");
 
  desc = "The remote host is missing an update to xpdf
@@ -86,7 +86,7 @@
 
 https://secure1.securityspace.com/smysecure/catid.html?in=MDVSA-2009:287-1
 
-Risk factor : High";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/mdksa_2009_292.nasl
===================================================================
--- trunk/openvas-plugins/scripts/mdksa_2009_292.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/mdksa_2009_292.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,8 +30,8 @@
  script_id(66184);
  script_cve_id("CVE-2009-3550", "CVE-2009-3829");
  script_version ("$Revision$");
- script_tag(name:"cvss_base", value:"9.3");
- script_tag(name:"risk_factor", value:"Critical");
+ script_tag(name:"cvss_base", value:"4.3");
+ script_tag(name:"risk_factor", value:"Medium");
  script_name("Mandriva Security Advisory MDVSA-2009:292 (wireshark)");
 
  desc = "The remote host is missing an update to wireshark
@@ -55,7 +55,7 @@
 
 https://secure1.securityspace.com/smysecure/catid.html?in=MDVSA-2009:292
 
-Risk factor : High";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/mdksa_2009_292_1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/mdksa_2009_292_1.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/mdksa_2009_292_1.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,8 +30,8 @@
  script_id(66390);
  script_cve_id("CVE-2009-3550", "CVE-2009-3829");
  script_version ("$Revision$");
- script_tag(name:"cvss_base", value:"9.3");
- script_tag(name:"risk_factor", value:"Critical");
+ script_tag(name:"cvss_base", value:"4.3");
+ script_tag(name:"risk_factor", value:"Medium");
  script_name("Mandriva Security Advisory MDVSA-2009:292-1 (wireshark)");
 
  desc = "The remote host is missing an update to wireshark
@@ -60,7 +60,7 @@
 
 https://secure1.securityspace.com/smysecure/catid.html?in=MDVSA-2009:292-1
 
-Risk factor : High";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/mdksa_2009_297.nasl
===================================================================
--- trunk/openvas-plugins/scripts/mdksa_2009_297.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/mdksa_2009_297.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,8 +30,8 @@
  script_id(66246);
  script_cve_id("CVE-2008-3230", "CVE-2008-4869", "CVE-2009-0385");
  script_version ("$Revision$");
- script_tag(name:"cvss_base", value:"10.0");
- script_tag(name:"risk_factor", value:"Critical");
+ script_tag(name:"cvss_base", value:"1.9");
+ script_tag(name:"risk_factor", value:"Low");
  script_name("Mandriva Security Advisory MDVSA-2009:297 (ffmpeg)");
 
  desc = "The remote host is missing an update to ffmpeg
@@ -63,7 +63,7 @@
 
 https://secure1.securityspace.com/smysecure/catid.html?in=MDVSA-2009:297
 
-Risk factor : High";
+Risk factor : Low";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/mdksa_2009_297_1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/mdksa_2009_297_1.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/mdksa_2009_297_1.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,8 +30,8 @@
  script_id(66398);
  script_cve_id("CVE-2008-3230", "CVE-2008-4869", "CVE-2009-0385");
  script_version ("$Revision$");
- script_tag(name:"cvss_base", value:"10.0");
- script_tag(name:"risk_factor", value:"Critical");
+ script_tag(name:"cvss_base", value:"1.9");
+ script_tag(name:"risk_factor", value:"Low");
  script_name("Mandriva Security Advisory MDVSA-2009:297-1 (ffmpeg)");
 
  desc = "The remote host is missing an update to ffmpeg
@@ -68,7 +68,7 @@
 
 https://secure1.securityspace.com/smysecure/catid.html?in=MDVSA-2009:297-1
 
-Risk factor : High";
+Risk factor : Low";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/mdksa_2009_298.nasl
===================================================================
--- trunk/openvas-plugins/scripts/mdksa_2009_298.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/mdksa_2009_298.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,8 +30,8 @@
  script_id(66245);
  script_cve_id("CVE-2008-5248", "CVE-2009-1274", "CVE-2009-0385", "CVE-2009-0698");
  script_version ("$Revision$");
- script_tag(name:"cvss_base", value:"9.3");
- script_tag(name:"risk_factor", value:"Critical");
+ script_tag(name:"cvss_base", value:"4.3");
+ script_tag(name:"risk_factor", value:"Medium");
  script_name("Mandriva Security Advisory MDVSA-2009:298 (xine-lib)");
 
  desc = "The remote host is missing an update to xine-lib
@@ -65,7 +65,7 @@
 
 https://secure1.securityspace.com/smysecure/catid.html?in=MDVSA-2009:298
 
-Risk factor : High";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/mdksa_2009_299.nasl
===================================================================
--- trunk/openvas-plugins/scripts/mdksa_2009_299.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/mdksa_2009_299.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,8 +30,8 @@
  script_id(66247);
  script_cve_id("CVE-2009-1274", "CVE-2009-0385", "CVE-2009-0698");
  script_version ("$Revision$");
- script_tag(name:"cvss_base", value:"9.3");
- script_tag(name:"risk_factor", value:"Critical");
+ script_tag(name:"cvss_base", value:"5.0");
+ script_tag(name:"risk_factor", value:"Medium");
  script_name("Mandriva Security Advisory MDVSA-2009:299 (xine-lib)");
 
  desc = "The remote host is missing an update to xine-lib
@@ -61,7 +61,7 @@
 
 https://secure1.securityspace.com/smysecure/catid.html?in=MDVSA-2009:299
 
-Risk factor : High";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/mdksa_2009_301.nasl
===================================================================
--- trunk/openvas-plugins/scripts/mdksa_2009_301.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/mdksa_2009_301.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,7 +30,7 @@
  script_id(66289);
  script_cve_id("CVE-2009-2903", "CVE-2009-3547", "CVE-2005-4881", "CVE-2009-3612", "CVE-2009-3621", "CVE-2009-3638", "CVE-2009-3726");
  script_version ("$Revision$");
- script_tag(name:"cvss_base", value:"7.8");
+ script_tag(name:"cvss_base", value:"7.1");
  script_tag(name:"risk_factor", value:"High");
  script_name("Mandriva Security Advisory MDVSA-2009:301 (kernel)");
 

Modified: trunk/openvas-plugins/scripts/mdksa_2009_303.nasl
===================================================================
--- trunk/openvas-plugins/scripts/mdksa_2009_303.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/mdksa_2009_303.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,8 +30,8 @@
  script_id(66320);
  script_cve_id("CVE-2009-3557", "CVE-2009-3558", "CVE-2009-4017", "CVE-2009-4018");
  script_version ("$Revision$");
- script_tag(name:"cvss_base", value:"7.5");
- script_tag(name:"risk_factor", value:"High");
+ script_tag(name:"cvss_base", value:"5.0");
+ script_tag(name:"risk_factor", value:"Medium");
  script_name("Mandriva Security Advisory MDVSA-2009:303 (php)");
 
  desc = "The remote host is missing an update to php
@@ -81,7 +81,7 @@
 
 https://secure1.securityspace.com/smysecure/catid.html?in=MDVSA-2009:303
 
-Risk factor : High";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/mdksa_2009_308.nasl
===================================================================
--- trunk/openvas-plugins/scripts/mdksa_2009_308.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/mdksa_2009_308.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,8 +30,8 @@
  script_id(66371);
  script_cve_id("CVE-2009-1417", "CVE-2009-2730");
  script_version ("$Revision$");
- script_tag(name:"cvss_base", value:"7.5");
- script_tag(name:"risk_factor", value:"High");
+ script_tag(name:"cvss_base", value:"5.0");
+ script_tag(name:"risk_factor", value:"Medium");
  script_name("Mandriva Security Advisory MDVSA-2009:308 (gnutls)");
 
  desc = "The remote host is missing an update to gnutls
@@ -65,7 +65,7 @@
 
 https://secure1.securityspace.com/smysecure/catid.html?in=MDVSA-2009:308
 
-Risk factor : High";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/mdksa_2009_310.nasl
===================================================================
--- trunk/openvas-plugins/scripts/mdksa_2009_310.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/mdksa_2009_310.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,8 +30,8 @@
  script_id(66370);
  script_cve_id("CVE-2009-1377", "CVE-2009-1378", "CVE-2009-1379", "CVE-2009-1386", "CVE-2009-1387", "CVE-2009-2409");
  script_version ("$Revision$");
- script_tag(name:"cvss_base", value:"6.4");
- script_tag(name:"risk_factor", value:"High");
+ script_tag(name:"cvss_base", value:"5.0");
+ script_tag(name:"risk_factor", value:"Medium");
  script_name("Mandriva Security Advisory MDVSA-2009:310 (openssl)");
 
  desc = "The remote host is missing an update to openssl
@@ -54,7 +54,7 @@
 https://secure1.securityspace.com/smysecure/catid.html?in=MDVSA-2009:310
 http://marc.info/?l=openssl-cvs&m=124508133203041&w=2
 
-Risk factor : High";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/mdksa_2009_311.nasl
===================================================================
--- trunk/openvas-plugins/scripts/mdksa_2009_311.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/mdksa_2009_311.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,8 +30,8 @@
  script_id(66380);
  script_cve_id("CVE-2007-6725", "CVE-2008-6679", "CVE-2009-0583", "CVE-2009-0584", "CVE-2009-0792", "CVE-2009-0196", "CVE-2008-3520", "CVE-2008-3522");
  script_version ("$Revision$");
- script_tag(name:"cvss_base", value:"10.0");
- script_tag(name:"risk_factor", value:"Critical");
+ script_tag(name:"cvss_base", value:"7.5");
+ script_tag(name:"risk_factor", value:"High");
  script_name("Mandriva Security Advisory MDVSA-2009:311 (ghostscript)");
 
  desc = "The remote host is missing an update to ghostscript

Modified: trunk/openvas-plugins/scripts/mdksa_2009_313_1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/mdksa_2009_313_1.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/mdksa_2009_313_1.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,7 +30,7 @@
  script_id(66373);
  script_cve_id("CVE-2009-4022");
  script_version ("$Revision$");
- script_tag(name:"cvss_base", value:"4.0");
+ script_tag(name:"cvss_base", value:"2.6");
  script_tag(name:"risk_factor", value:"Medium");
  script_name("Mandriva Security Advisory MDVSA-2009:313-1 (bind)");
 
@@ -64,7 +64,7 @@
 
 https://secure1.securityspace.com/smysecure/catid.html?in=MDVSA-2009:313-1
 
-Risk factor : High";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/mdksa_2009_317.nasl
===================================================================
--- trunk/openvas-plugins/scripts/mdksa_2009_317.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/mdksa_2009_317.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,7 +30,7 @@
  script_id(66411);
  script_cve_id("CVE-2008-3520", "CVE-2008-3522", "CVE-2008-4799");
  script_version ("$Revision$");
- script_tag(name:"cvss_base", value:"10.0");
+ script_tag(name:"cvss_base", value:"9.3");
  script_tag(name:"risk_factor", value:"Critical");
  script_name("Mandriva Security Advisory MDVSA-2009:317 (netpbm)");
 
@@ -69,7 +69,7 @@
 
 https://secure1.securityspace.com/smysecure/catid.html?in=MDVSA-2009:317
 
-Risk factor : High";
+Risk factor : Critical";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/mdksa_2009_318.nasl
===================================================================
--- trunk/openvas-plugins/scripts/mdksa_2009_318.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/mdksa_2009_318.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,8 +30,8 @@
  script_id(66400);
  script_cve_id("CVE-2009-0217", "CVE-2009-3736");
  script_version ("$Revision$");
- script_tag(name:"cvss_base", value:"6.9");
- script_tag(name:"risk_factor", value:"High");
+ script_tag(name:"cvss_base", value:"5.0");
+ script_tag(name:"risk_factor", value:"Medium");
  script_name("Mandriva Security Advisory MDVSA-2009:318 (xmlsec1)");
 
  desc = "The remote host is missing an update to xmlsec1
@@ -65,7 +65,7 @@
 https://secure1.securityspace.com/smysecure/catid.html?in=MDVSA-2009:318
 http://www.kb.cert.org/vuls/id/466161
 
-Risk factor : High";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/mdksa_2009_319.nasl
===================================================================
--- trunk/openvas-plugins/scripts/mdksa_2009_319.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/mdksa_2009_319.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,8 +30,8 @@
  script_id(66401);
  script_cve_id("CVE-2008-3231", "CVE-2008-5233", "CVE-2008-5234", "CVE-2008-5236", "CVE-2008-5237", "CVE-2008-5239", "CVE-2008-5240", "CVE-2008-5241", "CVE-2008-5243", "CVE-2008-5245", "CVE-2008-5246", "CVE-2009-1274", "CVE-2009-0385", "CVE-2009-0698");
  script_version ("$Revision$");
- script_tag(name:"cvss_base", value:"10.0");
- script_tag(name:"risk_factor", value:"Critical");
+ script_tag(name:"cvss_base", value:"4.3");
+ script_tag(name:"risk_factor", value:"Medium");
  script_name("Mandriva Security Advisory MDVSA-2009:319 (xine-lib)");
 
  desc = "The remote host is missing an update to xine-lib
@@ -108,7 +108,7 @@
 
 https://secure1.securityspace.com/smysecure/catid.html?in=MDVSA-2009:319
 
-Risk factor : High";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/mdksa_2009_320.nasl
===================================================================
--- trunk/openvas-plugins/scripts/mdksa_2009_320.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/mdksa_2009_320.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,7 +30,7 @@
  script_id(66405);
  script_cve_id("CVE-2009-1888", "CVE-2009-2813", "CVE-2009-2906", "CVE-2009-2948");
  script_version ("$Revision$");
- script_tag(name:"cvss_base", value:"6.0");
+ script_tag(name:"cvss_base", value:"5.8");
  script_tag(name:"risk_factor", value:"High");
  script_name("Mandriva Security Advisory MDVSA-2009:320 (samba)");
 

Modified: trunk/openvas-plugins/scripts/mdksa_2009_321.nasl
===================================================================
--- trunk/openvas-plugins/scripts/mdksa_2009_321.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/mdksa_2009_321.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,8 +30,8 @@
  script_id(66406);
  script_cve_id("CVE-2008-3532", "CVE-2008-2955", "CVE-2008-2957", "CVE-2009-1373", "CVE-2009-1374", "CVE-2009-1375", "CVE-2008-2927", "CVE-2009-1376", "CVE-2009-1889", "CVE-2009-2694", "CVE-2009-3025", "CVE-2009-3026", "CVE-2009-2703", "CVE-2009-3083", "CVE-2009-3084", "CVE-2009-3085");
  script_version ("$Revision$");
- script_tag(name:"cvss_base", value:"10.0");
- script_tag(name:"risk_factor", value:"Critical");
+ script_tag(name:"cvss_base", value:"6.8");
+ script_tag(name:"risk_factor", value:"High");
  script_name("Mandriva Security Advisory MDVSA-2009:321 (pidgin)");
 
  desc = "The remote host is missing an update to pidgin

Modified: trunk/openvas-plugins/scripts/mdksa_2009_323.nasl
===================================================================
--- trunk/openvas-plugins/scripts/mdksa_2009_323.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/mdksa_2009_323.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,8 +30,8 @@
  script_id(66414);
  script_cve_id("CVE-2008-1678", "CVE-2009-1191", "CVE-2008-2939", "CVE-2009-1195", "CVE-2009-1890", "CVE-2009-1891", "CVE-2009-3094", "CVE-2009-3095", "CVE-2009-3555");
  script_version ("$Revision$");
- script_tag(name:"cvss_base", value:"7.5");
- script_tag(name:"risk_factor", value:"High");
+ script_tag(name:"cvss_base", value:"5.0");
+ script_tag(name:"risk_factor", value:"Medium");
  script_name("Mandriva Security Advisory MDVSA-2009:323 (apache)");
 
  desc = "The remote host is missing an update to apache
@@ -54,7 +54,7 @@
 https://secure1.securityspace.com/smysecure/catid.html?in=MDVSA-2009:323
 http://marc.info/?l=apache-httpd-announce&m=125755783724966&w=2
 
-Risk factor : High";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/mdksa_2009_324.nasl
===================================================================
--- trunk/openvas-plugins/scripts/mdksa_2009_324.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/mdksa_2009_324.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,7 +30,7 @@
  script_id(66420);
  script_cve_id("CVE-2008-7068", "CVE-2009-1271", "CVE-2009-2687", "CVE-2009-3291", "CVE-2009-3292", "CVE-2009-3293", "CVE-2009-3546", "CVE-2009-3557", "CVE-2009-3558", "CVE-2009-4017", "CVE-2009-4018");
  script_version ("$Revision$");
- script_tag(name:"cvss_base", value:"7.5");
+ script_tag(name:"cvss_base", value:"6.4");
  script_tag(name:"risk_factor", value:"High");
  script_name("Mandriva Security Advisory MDVSA-2009:324 (php)");
 

Modified: trunk/openvas-plugins/scripts/mdksa_2009_326.nasl
===================================================================
--- trunk/openvas-plugins/scripts/mdksa_2009_326.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/mdksa_2009_326.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,8 +30,8 @@
  script_id(66425);
  script_cve_id("CVE-2008-3963", "CVE-2008-4097", "CVE-2008-4098", "CVE-2008-4456", "CVE-2009-2446");
  script_version ("$Revision$");
- script_tag(name:"cvss_base", value:"8.5");
- script_tag(name:"risk_factor", value:"Critical");
+ script_tag(name:"cvss_base", value:"4.0");
+ script_tag(name:"risk_factor", value:"Medium");
  script_name("Mandriva Security Advisory MDVSA-2009:326 (mysql)");
 
  desc = "The remote host is missing an update to mysql
@@ -81,7 +81,7 @@
 
 https://secure1.securityspace.com/smysecure/catid.html?in=MDVSA-2009:326
 
-Risk factor : High";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/mdksa_2009_327.nasl
===================================================================
--- trunk/openvas-plugins/scripts/mdksa_2009_327.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/mdksa_2009_327.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,8 +30,8 @@
  script_id(66481);
  script_cve_id("CVE-2009-1241", "CVE-2008-6680", "CVE-2009-1270", "CVE-2009-1371", "CVE-2009-1372");
  script_version ("$Revision$");
- script_tag(name:"cvss_base", value:"10.0");
- script_tag(name:"risk_factor", value:"Critical");
+ script_tag(name:"cvss_base", value:"7.5");
+ script_tag(name:"risk_factor", value:"High");
  script_name("Mandriva Security Advisory MDVSA-2009:327 (clamav)");
 
  desc = "The remote host is missing an update to clamav

Modified: trunk/openvas-plugins/scripts/mdksa_2009_330.nasl
===================================================================
--- trunk/openvas-plugins/scripts/mdksa_2009_330.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/mdksa_2009_330.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,8 +30,8 @@
  script_id(66492);
  script_cve_id("CVE-2009-0689", "CVE-2009-1687", "CVE-2009-1690", "CVE-2009-1698", "CVE-2009-1725", "CVE-2009-1692", "CVE-2009-2537", "CVE-2009-2408", "CVE-2009-2702");
  script_version ("$Revision$");
- script_tag(name:"cvss_base", value:"9.3");
- script_tag(name:"risk_factor", value:"Critical");
+ script_tag(name:"cvss_base", value:"6.8");
+ script_tag(name:"risk_factor", value:"High");
  script_name("Mandriva Security Advisory MDVSA-2009:330 (kdelibs)");
 
  desc = "The remote host is missing an update to kdelibs

Modified: trunk/openvas-plugins/scripts/mdksa_2009_331.nasl
===================================================================
--- trunk/openvas-plugins/scripts/mdksa_2009_331.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/mdksa_2009_331.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,8 +30,8 @@
  script_id(66493);
  script_cve_id("CVE-2009-0146", "CVE-2009-0147", "CVE-2009-0166", "CVE-2009-1179", "CVE-2009-0791", "CVE-2009-1709", "CVE-2009-0945");
  script_version ("$Revision$");
- script_tag(name:"cvss_base", value:"9.3");
- script_tag(name:"risk_factor", value:"Critical");
+ script_tag(name:"cvss_base", value:"4.3");
+ script_tag(name:"risk_factor", value:"Medium");
  script_name("Mandriva Security Advisory MDVSA-2009:331 (kdegraphics)");
 
  desc = "The remote host is missing an update to kdegraphics
@@ -82,7 +82,7 @@
 
 https://secure1.securityspace.com/smysecure/catid.html?in=MDVSA-2009:331
 
-Risk factor : High";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/mdksa_2009_334.nasl
===================================================================
--- trunk/openvas-plugins/scripts/mdksa_2009_334.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/mdksa_2009_334.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,8 +30,8 @@
  script_id(66544);
  script_cve_id("CVE-2009-0791", "CVE-2009-3605", "CVE-2009-3608", "CVE-2009-3609");
  script_version ("$Revision$");
- script_tag(name:"cvss_base", value:"9.3");
- script_tag(name:"risk_factor", value:"Critical");
+ script_tag(name:"cvss_base", value:"6.8");
+ script_tag(name:"risk_factor", value:"High");
  script_name("Mandriva Security Advisory MDVSA-2009:334 (poppler)");
 
  desc = "The remote host is missing an update to poppler

Modified: trunk/openvas-plugins/scripts/mdksa_2009_335.nasl
===================================================================
--- trunk/openvas-plugins/scripts/mdksa_2009_335.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/mdksa_2009_335.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,7 +30,7 @@
  script_id(66545);
  script_cve_id("CVE-2007-6718", "CVE-2008-4610");
  script_version ("$Revision$");
- script_tag(name:"cvss_base", value:"5.0");
+ script_tag(name:"cvss_base", value:"4.3");
  script_tag(name:"risk_factor", value:"Medium");
  script_name("Mandriva Security Advisory MDVSA-2009:335 (ffmpeg)");
 
@@ -58,7 +58,7 @@
 
 https://secure1.securityspace.com/smysecure/catid.html?in=MDVSA-2009:335
 
-Risk factor : High";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/mdksa_2009_344.nasl
===================================================================
--- trunk/openvas-plugins/scripts/mdksa_2009_344.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/mdksa_2009_344.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,8 +30,8 @@
  script_id(66552);
  script_cve_id("CVE-2009-1341", "CVE-2009-0663");
  script_version ("$Revision$");
- script_tag(name:"cvss_base", value:"7.5");
- script_tag(name:"risk_factor", value:"High");
+ script_tag(name:"cvss_base", value:"5.0");
+ script_tag(name:"risk_factor", value:"Medium");
  script_name("Mandriva Security Advisory MDVSA-2009:344 (perl-DBD-Pg)");
 
  desc = "The remote host is missing an update to perl-DBD-Pg
@@ -62,7 +62,7 @@
 
 https://secure1.securityspace.com/smysecure/catid.html?in=MDVSA-2009:344
 
-Risk factor : High";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/merak_multiple_vulns.nasl
===================================================================
--- trunk/openvas-plugins/scripts/merak_multiple_vulns.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/merak_multiple_vulns.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -25,8 +25,8 @@
 if (description) {
   script_id(14379);
   script_version("$Revision$");
-  script_tag(name:"cvss_base", value:"7.5");
-  script_tag(name:"risk_factor", value:"High");
+  script_tag(name:"cvss_base", value:"4.3");
+  script_tag(name:"risk_factor", value:"Medium");
 
   script_cve_id("CVE-2004-1719", "CVE-2004-1720", "CVE-2004-1721", "CVE-2004-1722");
   script_bugtraq_id(10966);

Modified: trunk/openvas-plugins/scripts/mercur_imap_buffer_overflow.nasl
===================================================================
--- trunk/openvas-plugins/scripts/mercur_imap_buffer_overflow.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/mercur_imap_buffer_overflow.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -60,8 +60,8 @@
 if (description) {
  script_id(200050);
  script_version("$Revision: 1.1 $");
- script_tag(name:"cvss_base", value:"8.0");
- script_tag(name:"risk_factor", value:"High");
+ script_tag(name:"cvss_base", value:"10.0");
+ script_tag(name:"risk_factor", value:"Critical");
  
  script_bugtraq_id(17138);
  script_cve_id("CVE-2006-1255");

Modified: trunk/openvas-plugins/scripts/mercuryboard_multiple_vuln.nasl
===================================================================
--- trunk/openvas-plugins/scripts/mercuryboard_multiple_vuln.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/mercuryboard_multiple_vuln.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,8 +30,8 @@
 {
  script_id(16247);
  script_version ("$Revision$");
- script_tag(name:"cvss_base", value:"7.5");
- script_tag(name:"risk_factor", value:"High");
+ script_tag(name:"cvss_base", value:"5.0");
+ script_tag(name:"risk_factor", value:"Medium");
  script_cve_id(
     "CVE-2005-0306",
     "CVE-2005-0307",

Modified: trunk/openvas-plugins/scripts/microsoft-iis-nlst-stack-overflow.nasl
===================================================================
--- trunk/openvas-plugins/scripts/microsoft-iis-nlst-stack-overflow.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/microsoft-iis-nlst-stack-overflow.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -42,12 +42,12 @@
 See also:
 http://www.securityfocus.com/bid/36189
 
-Risk factor: High";
+Risk factor : Critical";
 
 if (description)
 {
 	script_id(100952);
-    script_tag(name:"cvss_base", value:"9.0");
+    script_tag(name:"cvss_base", value:"9.3");
     script_tag(name:"risk_factor", value:"Critical");
 	script_cve_id("CVE-2009-3023");
 	name = "Microsoft IIS FTPd NLST stack overflow";

Modified: trunk/openvas-plugins/scripts/moodle_sql_inject.nasl
===================================================================
--- trunk/openvas-plugins/scripts/moodle_sql_inject.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/moodle_sql_inject.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -31,8 +31,8 @@
  script_bugtraq_id(11608, 11691, 12120);
  script_xref(name:"OSVDB", value:"11427");
  script_version("$Revision$");
- script_tag(name:"cvss_base", value:"7.5");
- script_tag(name:"risk_factor", value:"High");
+ script_tag(name:"cvss_base", value:"4.3");
+ script_tag(name:"risk_factor", value:"Medium");
 
  script_name("Moodle SQL injection flaws");
  desc = "
@@ -43,7 +43,7 @@
 in 'glossary' module due to a lack of user input sanitization.
 
 Solution : Upgrade to Moodle 1.4.3 or later.
-Risk factor : High";
+Risk factor : Medium";
 
  script_description(desc);
  script_summary("Determines if Moodle is older than 1.4.3");

Modified: trunk/openvas-plugins/scripts/mozilla_firefox_xul_spoof.nasl
===================================================================
--- trunk/openvas-plugins/scripts/mozilla_firefox_xul_spoof.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/mozilla_firefox_xul_spoof.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,8 +30,8 @@
   script_bugtraq_id(10796, 10832);
   script_cve_id("CVE-2004-0763", "CVE-2004-0764");
   script_version("$Revision$");
-  script_tag(name:"cvss_base", value:"10.0");
-  script_tag(name:"risk_factor", value:"Critical");
+  script_tag(name:"cvss_base", value:"5.0");
+  script_tag(name:"risk_factor", value:"Medium");
   script_name("Mozilla/Firefox user interface spoofing");
   desc = "
   The remote host is using Mozilla and/or Firefox, an alternative web browser.

Modified: trunk/openvas-plugins/scripts/ms07-016.nasl
===================================================================
--- trunk/openvas-plugins/scripts/ms07-016.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/ms07-016.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -46,7 +46,7 @@
   http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0217
   http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0219"; 
   script_description(desc);
-  script_tag(name:"cvss_base", value:"10.0");
+  script_tag(name:"cvss_base", value:"9.3");
   script_tag(name:"risk_factor", value:"Critical");
   script_summary("Checks for Internet Explorer version");
   script_category(ACT_GATHER_INFO);

Modified: trunk/openvas-plugins/scripts/ms07-045.nasl
===================================================================
--- trunk/openvas-plugins/scripts/ms07-045.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/ms07-045.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -46,8 +46,8 @@
   References:
   http://www.nsfocus.com/english/homepage/research/0701.htm";
   script_description(desc);
-  script_tag(name:"cvss_base", value:"9.3");
-  script_tag(name:"risk_factor", value:"Critical");
+  script_tag(name:"cvss_base", value:"6.8");
+  script_tag(name:"risk_factor", value:"High");
   script_summary("Checks for vulnerable file version");
   script_category(ACT_GATHER_INFO);
   script_copyright("Copyright (C) 2010 LSS");

Modified: trunk/openvas-plugins/scripts/ms07-057.nasl
===================================================================
--- trunk/openvas-plugins/scripts/ms07-057.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/ms07-057.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -48,8 +48,8 @@
   References:
   http://secunia.com/secunia_research/2007-1/";
   script_description(desc);
-  script_tag(name:"cvss_base", value:"9.3");
-  script_tag(name:"risk_factor", value:"Critical");
+  script_tag(name:"cvss_base", value:"7.5");
+  script_tag(name:"risk_factor", value:"High");
   script_summary("Checks for Internet Explorer version");
   script_category(ACT_GATHER_INFO);
   script_copyright("Copyright (C) 2010 LSS");

Modified: trunk/openvas-plugins/scripts/ms_smb2_highid.nasl
===================================================================
--- trunk/openvas-plugins/scripts/ms_smb2_highid.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/ms_smb2_highid.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,8 +30,8 @@
  script_bugtraq_id(36299);
  script_cve_id("CVE-2009-3103");
  script_version ("1.0-$Revision$");
- script_tag(name:"cvss_base", value:"7.8");
- script_tag(name:"risk_factor", value:"High");
+ script_tag(name:"cvss_base", value:"10.0");
+ script_tag(name:"risk_factor", value:"Critical");
 
  script_name("Microsoft Windows SMB2 '_Smb2ValidateProviderCallback()' Remote Code Execution Vulnerability");
 
@@ -70,7 +70,7 @@
 http://www.securityfocus.com/archive/1/506327
 http://www.kb.cert.org/vuls/id/135940
 
-Risk factor : High";
+Risk factor : Critical";
 
  script_description(desc);
  script_summary("Determine if Microsoft Windows is prone to a remote code-execution vulnerability");

Modified: trunk/openvas-plugins/scripts/mssql_version.nasl
===================================================================
--- trunk/openvas-plugins/scripts/mssql_version.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/mssql_version.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -40,8 +40,8 @@
  script_id(11217);
  script_bugtraq_id(1292, 2030, 2042, 2043, 2863, 3733, 4135, 4847, 5014, 5205);
  script_version ("$Revision$");
- script_tag(name:"cvss_base", value:"7.5");
- script_tag(name:"risk_factor", value:"High");
+ script_tag(name:"cvss_base", value:"4.6");
+ script_tag(name:"risk_factor", value:"Medium");
  name = "Microsoft's SQL Version Query";
  script_name(name);
  
@@ -62,7 +62,7 @@
 attacks, and the ability of a hacker to run code of their
 choice.
 
-Risk factor : High
+Risk factor : Medium
 Solution : Apply current service packs and hotfixes";
 
 

Modified: trunk/openvas-plugins/scripts/mybloggie_sql_injection.nasl
===================================================================
--- trunk/openvas-plugins/scripts/mybloggie_sql_injection.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/mybloggie_sql_injection.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -32,8 +32,8 @@
  script_cve_id("CVE-2005-1140", "CVE-2005-1498", "CVE-2005-1499", "CVE-2005-1500");
  script_bugtraq_id(13192, 13507);
  script_version("$Revision$");
- script_tag(name:"cvss_base", value:"7.5");
- script_tag(name:"risk_factor", value:"High");
+ script_tag(name:"cvss_base", value:"4.3");
+ script_tag(name:"risk_factor", value:"Medium");
  
  name = "myBloggie Multiple Vulnerabilities";
 
@@ -62,7 +62,7 @@
 Solution: Patches have been provided by the vendor and are available at:
 http://mywebland.com/forums/viewtopic.php?t=180
 
-Risk factor: High";
+Risk factor : Medium";
 
  script_description(desc);
  

Modified: trunk/openvas-plugins/scripts/mysql_single_row_subselect_dos.nasl
===================================================================
--- trunk/openvas-plugins/scripts/mysql_single_row_subselect_dos.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/mysql_single_row_subselect_dos.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -26,7 +26,7 @@
 {
  script_id(80075);;
  script_version ("$Revision: 1.4 $");
- script_tag(name:"cvss_base", value:"4.9");
+ script_tag(name:"cvss_base", value:"2.1");
  script_tag(name:"risk_factor", value:"Medium");
 
  script_cve_id("CVE-2007-1420"); 	

Modified: trunk/openvas-plugins/scripts/nph-publish.nasl
===================================================================
--- trunk/openvas-plugins/scripts/nph-publish.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/nph-publish.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -27,8 +27,8 @@
  script_id(10164);
  script_bugtraq_id(2563);
  script_version ("$Revision$");
- script_tag(name:"cvss_base", value:"7.5");
- script_tag(name:"risk_factor", value:"High");
+ script_tag(name:"cvss_base", value:"5.0");
+ script_tag(name:"risk_factor", value:"Medium");
  script_cve_id("CVE-1999-1177", "CVE-2001-0400");
  
  name = "nph-publish.cgi";
@@ -40,7 +40,7 @@
 
 Solution :  remove it from /cgi-bin.
 
-Risk factor : High";
+Risk factor : Medium";
 
 
 

Modified: trunk/openvas-plugins/scripts/nsm2004_dos.nasl
===================================================================
--- trunk/openvas-plugins/scripts/nsm2004_dos.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/nsm2004_dos.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -33,8 +33,8 @@
 
  script_name(name);
  script_version ("$Revision$");
- script_tag(name:"cvss_base", value:"4.0");
- script_tag(name:"risk_factor", value:"Medium");
+ script_tag(name:"cvss_base", value:"7.8");
+ script_tag(name:"risk_factor", value:"High");
  
  desc = "
 Synopsis :

Modified: trunk/openvas-plugins/scripts/openwebmail_logindomain_xss.nasl
===================================================================
--- trunk/openvas-plugins/scripts/openwebmail_logindomain_xss.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/openwebmail_logindomain_xss.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -25,8 +25,8 @@
 if (description) {
   script_id(16463);
   script_version("$Revision$");
-  script_tag(name:"cvss_base", value:"2.0");
-  script_tag(name:"risk_factor", value:"Low");
+  script_tag(name:"cvss_base", value:"4.3");
+  script_tag(name:"risk_factor", value:"Medium");
   script_cve_id("CVE-2005-0445");
   script_bugtraq_id(12547);
   script_xref(name:"OSVDB", value:"13788");

Modified: trunk/openvas-plugins/scripts/opera_favicon_address_bar_spoofing.nasl
===================================================================
--- trunk/openvas-plugins/scripts/opera_favicon_address_bar_spoofing.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/opera_favicon_address_bar_spoofing.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -32,8 +32,8 @@
   script_cve_id("CVE-2004-0537");
   script_bugtraq_id(10452);
   script_version("$Revision$");
-  script_tag(name:"cvss_base", value:"2.0");
-  script_tag(name:"risk_factor", value:"Low");
+  script_tag(name:"cvss_base", value:"5.0");
+  script_tag(name:"risk_factor", value:"Medium");
   script_name("Opera web browser address bar spoofing weakness (2)");
   desc = "
   Synopsis :

Modified: trunk/openvas-plugins/scripts/oracle9i_java_process_manager.nasl
===================================================================
--- trunk/openvas-plugins/scripts/oracle9i_java_process_manager.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/oracle9i_java_process_manager.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,8 +30,8 @@
  script_id(10851);
  script_bugtraq_id(4293);
  script_version("$Revision$");
- script_tag(name:"cvss_base", value:"7.0");
- script_tag(name:"risk_factor", value:"High");
+ script_tag(name:"cvss_base", value:"5.0");
+ script_tag(name:"risk_factor", value:"Medium");
  script_cve_id("CVE-2002-0563");
  name = "Oracle 9iAS Java Process Manager";
  script_name(name);

Modified: trunk/openvas-plugins/scripts/ovcesa2009_0001_01.nasl
===================================================================
--- trunk/openvas-plugins/scripts/ovcesa2009_0001_01.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/ovcesa2009_0001_01.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -32,8 +32,8 @@
      script_cve_id("CVE-2006-4814", "CVE-2007-2172", "CVE-2007-3848", "CVE-2007-4308", "CVE-2007-6063", "CVE-2007-6151", "CVE-2007-6206", "CVE-2008-0007");
  };
  script_version ("$");
- script_tag(name:"cvss_base", value:"7.8");
- script_tag(name:"risk_factor", value:"High");
+ script_tag(name:"cvss_base", value:"4.6");
+ script_tag(name:"risk_factor", value:"Medium");
  name = "CentOS Security Advisory CESA-2009:0001-01 (kernel)";
  script_name(name);
 
@@ -50,7 +50,7 @@
 http://www.securityspace.com/smysecure/catid.html?in=RHSA-2009:0001
 https://rhn.redhat.com/errata/rh21as-errata.html
 
-Risk factor : High";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/ovcesa2009_0010.nasl
===================================================================
--- trunk/openvas-plugins/scripts/ovcesa2009_0010.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/ovcesa2009_0010.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -28,7 +28,7 @@
  script_id(63177);
  script_cve_id("CVE-2008-2379", "CVE-2008-3663");
  script_version ("$");
- script_tag(name:"cvss_base", value:"5.0");
+ script_tag(name:"cvss_base", value:"4.3");
  script_tag(name:"risk_factor", value:"Medium");
  name = "CentOS Security Advisory CESA-2009:0010 (squirrelmail)";
  script_name(name);

Modified: trunk/openvas-plugins/scripts/ovcesa2009_0012.nasl
===================================================================
--- trunk/openvas-plugins/scripts/ovcesa2009_0012.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/ovcesa2009_0012.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -28,8 +28,8 @@
  script_id(63366);
  script_cve_id("CVE-2007-2721", "CVE-2008-3520");
  script_version ("$");
- script_tag(name:"cvss_base", value:"9.3");
- script_tag(name:"risk_factor", value:"Critical");
+ script_tag(name:"cvss_base", value:"4.3");
+ script_tag(name:"risk_factor", value:"Medium");
  name = "CentOS Security Advisory CESA-2009:0012 (netpbm)";
  script_name(name);
 

Modified: trunk/openvas-plugins/scripts/ovcesa2009_0014.nasl
===================================================================
--- trunk/openvas-plugins/scripts/ovcesa2009_0014.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/ovcesa2009_0014.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -28,8 +28,8 @@
  script_id(63245);
  script_cve_id("CVE-2008-3275", "CVE-2008-4933", "CVE-2008-4934", "CVE-2008-5025", "CVE-2008-5029", "CVE-2008-5300", "CVE-2008-5702");
  script_version ("$");
- script_tag(name:"cvss_base", value:"7.8");
- script_tag(name:"risk_factor", value:"High");
+ script_tag(name:"cvss_base", value:"4.9");
+ script_tag(name:"risk_factor", value:"Medium");
  name = "CentOS Security Advisory CESA-2009:0014 (kernel)";
  script_name(name);
 
@@ -46,7 +46,7 @@
 http://www.securityspace.com/smysecure/catid.html?in=RHSA-2009:0014
 https://rhn.redhat.com/errata/RHSA-2009-0014.html
 
-Risk factor : High";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/ovcesa2009_0313.nasl
===================================================================
--- trunk/openvas-plugins/scripts/ovcesa2009_0313.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/ovcesa2009_0313.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -28,7 +28,7 @@
  script_id(63569);
  script_cve_id("CVE-2008-4680", "CVE-2008-4681", "CVE-2008-4682", "CVE-2008-4683", "CVE-2008-4684", "CVE-2008-4685", "CVE-2008-5285", "CVE-2009-0599", "CVE-2009-0600");
  script_version ("$");
- script_tag(name:"cvss_base", value:"5.0");
+ script_tag(name:"cvss_base", value:"4.3");
  script_tag(name:"risk_factor", value:"Medium");
  name = "CentOS Security Advisory CESA-2009:0313 (wireshark)";
  script_name(name);

Modified: trunk/openvas-plugins/scripts/ovcesa2009_0315.nasl
===================================================================
--- trunk/openvas-plugins/scripts/ovcesa2009_0315.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/ovcesa2009_0315.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -28,8 +28,8 @@
  script_id(63568);
  script_cve_id("CVE-2009-0040", "CVE-2009-0771", "CVE-2009-0772", "CVE-2009-0773", "CVE-2009-0774", "CVE-2009-0775", "CVE-2009-0776", "CVE-2009-0777");
  script_version ("$");
- script_tag(name:"cvss_base", value:"10.0");
- script_tag(name:"risk_factor", value:"Critical");
+ script_tag(name:"cvss_base", value:"6.8");
+ script_tag(name:"risk_factor", value:"High");
  name = "CentOS Security Advisory CESA-2009:0315 (firefox)";
  script_name(name);
 

Modified: trunk/openvas-plugins/scripts/ovcesa2009_0325.nasl
===================================================================
--- trunk/openvas-plugins/scripts/ovcesa2009_0325.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/ovcesa2009_0325.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -28,8 +28,8 @@
  script_id(63516);
  script_cve_id("CVE-2009-0040", "CVE-2009-0772", "CVE-2009-0774", "CVE-2009-0775", "CVE-2009-0776");
  script_version ("$");
- script_tag(name:"cvss_base", value:"10.0");
- script_tag(name:"risk_factor", value:"Critical");
+ script_tag(name:"cvss_base", value:"6.8");
+ script_tag(name:"risk_factor", value:"High");
  name = "CentOS Security Advisory CESA-2009:0325 (seamonkey)";
  script_name(name);
 

Modified: trunk/openvas-plugins/scripts/ovcesa2009_0325_01.nasl
===================================================================
--- trunk/openvas-plugins/scripts/ovcesa2009_0325_01.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/ovcesa2009_0325_01.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -28,8 +28,8 @@
  script_id(63566);
  script_cve_id("CVE-2009-0040", "CVE-2009-0772", "CVE-2009-0774", "CVE-2009-0775", "CVE-2009-0776");
  script_version ("$");
- script_tag(name:"cvss_base", value:"10.0");
- script_tag(name:"risk_factor", value:"Critical");
+ script_tag(name:"cvss_base", value:"6.8");
+ script_tag(name:"risk_factor", value:"High");
  name = "CentOS Security Advisory CESA-2009:0325-01 (seamonkey)";
  script_name(name);
 

Modified: trunk/openvas-plugins/scripts/ovcesa2009_0326.nasl
===================================================================
--- trunk/openvas-plugins/scripts/ovcesa2009_0326.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/ovcesa2009_0326.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -28,8 +28,8 @@
  script_id(63752);
  script_cve_id("CVE-2008-3528", "CVE-2008-5700", "CVE-2009-0028", "CVE-2009-0269", "CVE-2009-0322", "CVE-2009-0675", "CVE-2009-0676", "CVE-2009-0778");
  script_version ("$");
- script_tag(name:"cvss_base", value:"7.1");
- script_tag(name:"risk_factor", value:"High");
+ script_tag(name:"cvss_base", value:"2.1");
+ script_tag(name:"risk_factor", value:"Medium");
  name = "CentOS Security Advisory CESA-2009:0326 (kernel)";
  script_name(name);
 
@@ -46,7 +46,7 @@
 http://www.securityspace.com/smysecure/catid.html?in=RHSA-2009:0326
 https://rhn.redhat.com/errata/RHSA-2009-0326.html
 
-Risk factor : High";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/ovcesa2009_0329.nasl
===================================================================
--- trunk/openvas-plugins/scripts/ovcesa2009_0329.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/ovcesa2009_0329.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -28,8 +28,8 @@
  script_id(64061);
  script_cve_id("CVE-2006-1861", "CVE-2007-2754", "CVE-2008-1808", "CVE-2009-0946");
  script_version ("$");
- script_tag(name:"cvss_base", value:"10.0");
- script_tag(name:"risk_factor", value:"Critical");
+ script_tag(name:"cvss_base", value:"7.5");
+ script_tag(name:"risk_factor", value:"High");
  name = "CentOS Security Advisory CESA-2009:0329 (freetype)";
  script_name(name);
 

Modified: trunk/openvas-plugins/scripts/ovcesa2009_0331.nasl
===================================================================
--- trunk/openvas-plugins/scripts/ovcesa2009_0331.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/ovcesa2009_0331.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -28,8 +28,8 @@
  script_id(63902);
  script_cve_id("CVE-2008-5700", "CVE-2009-0031", "CVE-2009-0065", "CVE-2009-0322");
  script_version ("$");
- script_tag(name:"cvss_base", value:"10.0");
- script_tag(name:"risk_factor", value:"Critical");
+ script_tag(name:"cvss_base", value:"1.9");
+ script_tag(name:"risk_factor", value:"Low");
  name = "CentOS Security Advisory CESA-2009:0331 (kernel)";
  script_name(name);
 
@@ -46,7 +46,7 @@
 http://www.securityspace.com/smysecure/catid.html?in=RHSA-2009:0331
 https://rhn.redhat.com/errata/RHSA-2009-0331.html
 
-Risk factor : High";
+Risk factor : Low";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/ovcesa2009_0337.nasl
===================================================================
--- trunk/openvas-plugins/scripts/ovcesa2009_0337.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/ovcesa2009_0337.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -28,8 +28,8 @@
  script_id(63827);
  script_cve_id("CVE-2008-3658", "CVE-2008-3660", "CVE-2008-5498", "CVE-2008-5557", "CVE-2009-0754");
  script_version ("$");
- script_tag(name:"cvss_base", value:"10.0");
- script_tag(name:"risk_factor", value:"Critical");
+ script_tag(name:"cvss_base", value:"7.5");
+ script_tag(name:"risk_factor", value:"High");
  name = "CentOS Security Advisory CESA-2009:0337 (php)";
  script_name(name);
 
@@ -46,7 +46,7 @@
 http://www.securityspace.com/smysecure/catid.html?in=RHSA-2009:0337
 https://rhn.redhat.com/errata/RHSA-2009-0337.html
 
-Risk factor : Medium";
+Risk factor : High";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/ovcesa2009_0338.nasl
===================================================================
--- trunk/openvas-plugins/scripts/ovcesa2009_0338.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/ovcesa2009_0338.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -28,8 +28,8 @@
  script_id(63826);
  script_cve_id("CVE-2008-3658", "CVE-2008-3660", "CVE-2008-5498", "CVE-2008-5557", "CVE-2008-5814", "CVE-2009-0754");
  script_version ("$");
- script_tag(name:"cvss_base", value:"10.0");
- script_tag(name:"risk_factor", value:"Critical");
+ script_tag(name:"cvss_base", value:"7.5");
+ script_tag(name:"risk_factor", value:"High");
  name = "CentOS Security Advisory CESA-2009:0338 (php)";
  script_name(name);
 
@@ -46,7 +46,7 @@
 http://www.securityspace.com/smysecure/catid.html?in=RHSA-2009:0338
 https://rhn.redhat.com/errata/RHSA-2009-0338.html
 
-Risk factor : Medium";
+Risk factor : High";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/ovcesa2009_0354.nasl
===================================================================
--- trunk/openvas-plugins/scripts/ovcesa2009_0354.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/ovcesa2009_0354.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -28,8 +28,8 @@
  script_id(64055);
  script_cve_id("CVE-2009-0547", "CVE-2009-0582", "CVE-2009-0587");
  script_version ("$");
- script_tag(name:"cvss_base", value:"7.5");
- script_tag(name:"risk_factor", value:"High");
+ script_tag(name:"cvss_base", value:"5.0");
+ script_tag(name:"risk_factor", value:"Medium");
  name = "CentOS Security Advisory CESA-2009:0354 (evolution-data-server)";
  script_name(name);
 

Modified: trunk/openvas-plugins/scripts/ovcesa2009_0355.nasl
===================================================================
--- trunk/openvas-plugins/scripts/ovcesa2009_0355.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/ovcesa2009_0355.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -28,8 +28,8 @@
  script_id(64049);
  script_cve_id("CVE-2009-0547", "CVE-2009-0582", "CVE-2009-0587");
  script_version ("$");
- script_tag(name:"cvss_base", value:"7.5");
- script_tag(name:"risk_factor", value:"High");
+ script_tag(name:"cvss_base", value:"5.0");
+ script_tag(name:"risk_factor", value:"Medium");
  name = "CentOS Security Advisory CESA-2009:0355 (evolution-data-server)";
  script_name(name);
 

Modified: trunk/openvas-plugins/scripts/ovcesa2009_0358.nasl
===================================================================
--- trunk/openvas-plugins/scripts/ovcesa2009_0358.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/ovcesa2009_0358.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -28,7 +28,7 @@
  script_id(63635);
  script_cve_id("CVE-2009-0582", "CVE-2009-0587");
  script_version ("$");
- script_tag(name:"cvss_base", value:"7.5");
+ script_tag(name:"cvss_base", value:"5.8");
  script_tag(name:"risk_factor", value:"High");
  name = "CentOS Security Advisory CESA-2009:0358 (evolution)";
  script_name(name);
@@ -46,7 +46,7 @@
 http://www.securityspace.com/smysecure/catid.html?in=RHSA-2009:0358
 https://rhn.redhat.com/errata/RHSA-2009-0358.html
 
-Risk factor : Medium";
+Risk factor : High";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/ovcesa2009_0361.nasl
===================================================================
--- trunk/openvas-plugins/scripts/ovcesa2009_0361.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/ovcesa2009_0361.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -28,8 +28,8 @@
  script_id(63820);
  script_cve_id("CVE-2009-0365", "CVE-2009-0578");
  script_version ("$");
- script_tag(name:"cvss_base", value:"6.2");
- script_tag(name:"risk_factor", value:"High");
+ script_tag(name:"cvss_base", value:"4.6");
+ script_tag(name:"risk_factor", value:"Medium");
  name = "CentOS Security Advisory CESA-2009:0361 (NetworkManager)";
  script_name(name);
 

Modified: trunk/openvas-plugins/scripts/ovcesa2009_0377.nasl
===================================================================
--- trunk/openvas-plugins/scripts/ovcesa2009_0377.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/ovcesa2009_0377.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -28,8 +28,8 @@
  script_id(63824);
  script_cve_id("CVE-2006-2426", "CVE-2009-0581", "CVE-2009-0723", "CVE-2009-0733", "CVE-2009-0793", "CVE-2009-1093", "CVE-2009-1094", "CVE-2009-1095", "CVE-2009-1096", "CVE-2009-1097", "CVE-2009-1098", "CVE-2009-1101", "CVE-2009-1102");
  script_version ("$");
- script_tag(name:"cvss_base", value:"10.0");
- script_tag(name:"risk_factor", value:"Critical");
+ script_tag(name:"cvss_base", value:"6.4");
+ script_tag(name:"risk_factor", value:"High");
  name = "CentOS Security Advisory CESA-2009:0377 (java-1.6.0-openjdk)";
  script_name(name);
 

Modified: trunk/openvas-plugins/scripts/ovcesa2009_0402.nasl
===================================================================
--- trunk/openvas-plugins/scripts/ovcesa2009_0402.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/ovcesa2009_0402.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -28,7 +28,7 @@
  script_id(63818);
  script_cve_id("CVE-2008-4190", "CVE-2009-0790");
  script_version ("$");
- script_tag(name:"cvss_base", value:"5.0");
+ script_tag(name:"cvss_base", value:"4.4");
  script_tag(name:"risk_factor", value:"Medium");
  name = "CentOS Security Advisory CESA-2009:0402 (openswan)";
  script_name(name);
@@ -46,7 +46,7 @@
 http://www.securityspace.com/smysecure/catid.html?in=RHSA-2009:0402
 https://rhn.redhat.com/errata/RHSA-2009-0402.html
 
-Risk factor : High";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/ovcesa2009_0408.nasl
===================================================================
--- trunk/openvas-plugins/scripts/ovcesa2009_0408.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/ovcesa2009_0408.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -28,8 +28,8 @@
  script_id(63823);
  script_cve_id("CVE-2009-0844", "CVE-2009-0845", "CVE-2009-0846");
  script_version ("$");
- script_tag(name:"cvss_base", value:"10.0");
- script_tag(name:"risk_factor", value:"Critical");
+ script_tag(name:"cvss_base", value:"5.8");
+ script_tag(name:"risk_factor", value:"High");
  name = "CentOS Security Advisory CESA-2009:0408 (krb5)";
  script_name(name);
 

Modified: trunk/openvas-plugins/scripts/ovcesa2009_0411.nasl
===================================================================
--- trunk/openvas-plugins/scripts/ovcesa2009_0411.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/ovcesa2009_0411.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -28,7 +28,7 @@
  script_id(63822);
  script_cve_id("CVE-2009-0115");
  script_version ("$");
- script_tag(name:"cvss_base", value:"6.9");
+ script_tag(name:"cvss_base", value:"7.2");
  script_tag(name:"risk_factor", value:"High");
  name = "CentOS Security Advisory CESA-2009:0411 (device-mapper-multipath)";
  script_name(name);
@@ -46,7 +46,7 @@
 http://www.securityspace.com/smysecure/catid.html?in=RHSA-2009:0411
 https://rhn.redhat.com/errata/RHSA-2009-0411.html
 
-Risk factor : Medium";
+Risk factor : High";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/ovcesa2009_0420.nasl
===================================================================
--- trunk/openvas-plugins/scripts/ovcesa2009_0420.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/ovcesa2009_0420.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -28,8 +28,8 @@
  script_id(64058);
  script_cve_id("CVE-2007-6725", "CVE-2009-0792", "CVE-2009-0583");
  script_version ("$");
- script_tag(name:"cvss_base", value:"9.3");
- script_tag(name:"risk_factor", value:"Critical");
+ script_tag(name:"cvss_base", value:"7.5");
+ script_tag(name:"risk_factor", value:"High");
  name = "CentOS Security Advisory CESA-2009:0420 (ghostscript)";
  script_name(name);
 
@@ -46,7 +46,7 @@
 http://www.securityspace.com/smysecure/catid.html?in=RHSA-2009:0420
 https://rhn.redhat.com/errata/RHSA-2009-0420.html
 
-Risk factor : Medium";
+Risk factor : High";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/ovcesa2009_0429.nasl
===================================================================
--- trunk/openvas-plugins/scripts/ovcesa2009_0429.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/ovcesa2009_0429.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -28,8 +28,8 @@
  script_id(64059);
  script_cve_id("CVE-2009-0146", "CVE-2009-0147", "CVE-2009-0163", "CVE-2009-0166", "CVE-2009-0799", "CVE-2009-0800", "CVE-2009-1179", "CVE-2009-1180", "CVE-2009-1181", "CVE-2009-1182", "CVE-2009-1183");
  script_version ("$");
- script_tag(name:"cvss_base", value:"7.5");
- script_tag(name:"risk_factor", value:"High");
+ script_tag(name:"cvss_base", value:"4.3");
+ script_tag(name:"risk_factor", value:"Medium");
  name = "CentOS Security Advisory CESA-2009:0429 (cups)";
  script_name(name);
 
@@ -46,7 +46,7 @@
 http://www.securityspace.com/smysecure/catid.html?in=RHSA-2009:0429
 https://rhn.redhat.com/errata/RHSA-2009-0429.html
 
-Risk factor : High";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/ovcesa2009_0430.nasl
===================================================================
--- trunk/openvas-plugins/scripts/ovcesa2009_0430.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/ovcesa2009_0430.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -28,8 +28,8 @@
  script_id(64060);
  script_cve_id("CVE-2009-0146", "CVE-2009-0147", "CVE-2009-0166", "CVE-2009-0799", "CVE-2009-0800", "CVE-2009-1179", "CVE-2009-1180", "CVE-2009-1181", "CVE-2009-1182", "CVE-2009-1183");
  script_version ("$");
- script_tag(name:"cvss_base", value:"7.5");
- script_tag(name:"risk_factor", value:"High");
+ script_tag(name:"cvss_base", value:"4.3");
+ script_tag(name:"risk_factor", value:"Medium");
  name = "CentOS Security Advisory CESA-2009:0430 (xpdf)";
  script_name(name);
 
@@ -46,7 +46,7 @@
 http://www.securityspace.com/smysecure/catid.html?in=RHSA-2009:0430
 https://rhn.redhat.com/errata/RHSA-2009-0430.html
 
-Risk factor : High";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/ovcesa2009_0431.nasl
===================================================================
--- trunk/openvas-plugins/scripts/ovcesa2009_0431.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/ovcesa2009_0431.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -28,8 +28,8 @@
  script_id(64012);
  script_cve_id("CVE-2009-0146", "CVE-2009-0147", "CVE-2009-0166", "CVE-2009-0799", "CVE-2009-0800", "CVE-2009-1179", "CVE-2009-1180", "CVE-2009-1181", "CVE-2009-1182", "CVE-2009-1183");
  script_version ("$");
- script_tag(name:"cvss_base", value:"7.5");
- script_tag(name:"risk_factor", value:"High");
+ script_tag(name:"cvss_base", value:"4.3");
+ script_tag(name:"risk_factor", value:"Medium");
  name = "CentOS Security Advisory CESA-2009:0431 (kdegraphics)";
  script_name(name);
 
@@ -46,7 +46,7 @@
 http://www.securityspace.com/smysecure/catid.html?in=RHSA-2009:0431
 https://rhn.redhat.com/errata/RHSA-2009-0431.html
 
-Risk factor : High";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/ovcesa2009_0436.nasl
===================================================================
--- trunk/openvas-plugins/scripts/ovcesa2009_0436.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/ovcesa2009_0436.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -28,7 +28,7 @@
  script_id(63904);
  script_cve_id("CVE-2009-0652", "CVE-2009-1302", "CVE-2009-1303", "CVE-2009-1304", "CVE-2009-1305", "CVE-2009-1306", "CVE-2009-1307", "CVE-2009-1308", "CVE-2009-1309", "CVE-2009-1310", "CVE-2009-1311", "CVE-2009-1312");
  script_version ("$");
- script_tag(name:"cvss_base", value:"6.8");
+ script_tag(name:"cvss_base", value:"5.8");
  script_tag(name:"risk_factor", value:"High");
  name = "CentOS Security Advisory CESA-2009:0436 (firefox)";
  script_name(name);

Modified: trunk/openvas-plugins/scripts/ovcesa2009_0437.nasl
===================================================================
--- trunk/openvas-plugins/scripts/ovcesa2009_0437.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/ovcesa2009_0437.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -28,7 +28,7 @@
  script_id(64057);
  script_cve_id("CVE-2009-0652", "CVE-2009-1303", "CVE-2009-1305", "CVE-2009-1306", "CVE-2009-1307", "CVE-2009-1309", "CVE-2009-1311", "CVE-2009-1312");
  script_version ("$");
- script_tag(name:"cvss_base", value:"6.8");
+ script_tag(name:"cvss_base", value:"5.8");
  script_tag(name:"risk_factor", value:"High");
  name = "CentOS Security Advisory CESA-2009:0437 (seamonkey)";
  script_name(name);

Modified: trunk/openvas-plugins/scripts/ovcesa2009_0437_02.nasl
===================================================================
--- trunk/openvas-plugins/scripts/ovcesa2009_0437_02.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/ovcesa2009_0437_02.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -28,7 +28,7 @@
  script_id(63906);
  script_cve_id("CVE-2009-0652", "CVE-2009-1303", "CVE-2009-1305", "CVE-2009-1306", "CVE-2009-1307", "CVE-2009-1309", "CVE-2009-1311", "CVE-2009-1312");
  script_version ("$");
- script_tag(name:"cvss_base", value:"6.8");
+ script_tag(name:"cvss_base", value:"5.8");
  script_tag(name:"risk_factor", value:"High");
  name = "CentOS Security Advisory CESA-2009:0437-02 (seamonkey)";
  script_name(name);

Modified: trunk/openvas-plugins/scripts/ovcesa2009_0444.nasl
===================================================================
--- trunk/openvas-plugins/scripts/ovcesa2009_0444.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/ovcesa2009_0444.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -28,8 +28,8 @@
  script_id(63905);
  script_cve_id("CVE-2005-2974", "CVE-2005-3350");
  script_version ("$");
- script_tag(name:"cvss_base", value:"7.5");
- script_tag(name:"risk_factor", value:"High");
+ script_tag(name:"cvss_base", value:"2.6");
+ script_tag(name:"risk_factor", value:"Medium");
  name = "CentOS Security Advisory CESA-2009:0444 (giflib)";
  script_name(name);
 
@@ -46,7 +46,7 @@
 http://www.securityspace.com/smysecure/catid.html?in=RHSA-2009:0444
 https://rhn.redhat.com/errata/RHSA-2009-0444.html
 
-Risk factor : High";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/ovcesa2009_0458.nasl
===================================================================
--- trunk/openvas-plugins/scripts/ovcesa2009_0458.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/ovcesa2009_0458.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -28,8 +28,8 @@
  script_id(64062);
  script_cve_id("CVE-2009-0146", "CVE-2009-0147", "CVE-2009-0166", "CVE-2009-0195", "CVE-2009-0799", "CVE-2009-0800", "CVE-2009-1179", "CVE-2009-1180", "CVE-2009-1181", "CVE-2009-1182", "CVE-2009-1183");
  script_version ("$");
- script_tag(name:"cvss_base", value:"7.5");
- script_tag(name:"risk_factor", value:"High");
+ script_tag(name:"cvss_base", value:"4.3");
+ script_tag(name:"risk_factor", value:"Medium");
  name = "CentOS Security Advisory CESA-2009:0458 (gpdf)";
  script_name(name);
 
@@ -46,7 +46,7 @@
 http://www.securityspace.com/smysecure/catid.html?in=RHSA-2009:0458
 https://rhn.redhat.com/errata/RHSA-2009-0458.html
 
-Risk factor : High";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/ovcesa2009_0459.nasl
===================================================================
--- trunk/openvas-plugins/scripts/ovcesa2009_0459.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/ovcesa2009_0459.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -28,8 +28,8 @@
  script_id(63946);
  script_cve_id("CVE-2008-4307", "CVE-2009-0028", "CVE-2009-0676", "CVE-2009-0834");
  script_version ("$");
- script_tag(name:"cvss_base", value:"7.2");
- script_tag(name:"risk_factor", value:"High");
+ script_tag(name:"cvss_base", value:"4.0");
+ script_tag(name:"risk_factor", value:"Medium");
  name = "CentOS Security Advisory CESA-2009:0459 (kernel)";
  script_name(name);
 
@@ -46,7 +46,7 @@
 http://www.securityspace.com/smysecure/catid.html?in=RHSA-2009:0459
 https://rhn.redhat.com/errata/RHSA-2009-0459.html
 
-Risk factor : High";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/ovcesa2009_0473.nasl
===================================================================
--- trunk/openvas-plugins/scripts/ovcesa2009_0473.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/ovcesa2009_0473.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -28,8 +28,8 @@
  script_id(63970);
  script_cve_id("CVE-2008-4307", "CVE-2009-0787", "CVE-2009-0834", "CVE-2009-1336", "CVE-2009-1337");
  script_version ("$");
- script_tag(name:"cvss_base", value:"7.2");
- script_tag(name:"risk_factor", value:"High");
+ script_tag(name:"cvss_base", value:"4.0");
+ script_tag(name:"risk_factor", value:"Medium");
  name = "CentOS Security Advisory CESA-2009:0473 (kernel)";
  script_name(name);
 
@@ -46,7 +46,7 @@
 http://www.securityspace.com/smysecure/catid.html?in=RHSA-2009:0473
 https://rhn.redhat.com/errata/RHSA-2009-0473.html
 
-Risk factor : High";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/ovcesa2009_0480.nasl
===================================================================
--- trunk/openvas-plugins/scripts/ovcesa2009_0480.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/ovcesa2009_0480.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -28,8 +28,8 @@
  script_id(64011);
  script_cve_id("CVE-2009-0146", "CVE-2009-0147", "CVE-2009-0166", "CVE-2009-0195", "CVE-2009-0799", "CVE-2009-0800", "CVE-2009-1179", "CVE-2009-1180", "CVE-2009-1181", "CVE-2009-1182", "CVE-2009-1183", "CVE-2009-1187", "CVE-2009-1188");
  script_version ("$");
- script_tag(name:"cvss_base", value:"7.5");
- script_tag(name:"risk_factor", value:"High");
+ script_tag(name:"cvss_base", value:"4.3");
+ script_tag(name:"risk_factor", value:"Medium");
  name = "CentOS Security Advisory CESA-2009:0480 (poppler)";
  script_name(name);
 
@@ -46,7 +46,7 @@
 http://www.securityspace.com/smysecure/catid.html?in=RHSA-2009:0480
 https://rhn.redhat.com/errata/RHSA-2009-0480.html
 
-Risk factor : High";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/ovcesa2009_1059.nasl
===================================================================
--- trunk/openvas-plugins/scripts/ovcesa2009_1059.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/ovcesa2009_1059.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -28,8 +28,8 @@
  script_id(64051);
  script_cve_id("CVE-2009-1373", "CVE-2009-1376", "CVE-2008-2927");
  script_version ("$");
- script_tag(name:"cvss_base", value:"9.3");
- script_tag(name:"risk_factor", value:"Critical");
+ script_tag(name:"cvss_base", value:"7.1");
+ script_tag(name:"risk_factor", value:"High");
  name = "CentOS Security Advisory CESA-2009:1059 (pidgin)";
  script_name(name);
 

Modified: trunk/openvas-plugins/scripts/ovcesa2009_1060.nasl
===================================================================
--- trunk/openvas-plugins/scripts/ovcesa2009_1060.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/ovcesa2009_1060.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -28,8 +28,8 @@
  script_id(64052);
  script_cve_id("CVE-2009-1373", "CVE-2009-1374", "CVE-2009-1375", "CVE-2009-1376", "CVE-2008-2927");
  script_version ("$");
- script_tag(name:"cvss_base", value:"9.3");
- script_tag(name:"risk_factor", value:"Critical");
+ script_tag(name:"cvss_base", value:"7.1");
+ script_tag(name:"risk_factor", value:"High");
  name = "CentOS Security Advisory CESA-2009:1060 (pidgin)";
  script_name(name);
 

Modified: trunk/openvas-plugins/scripts/ovcesa2009_1066.nasl
===================================================================
--- trunk/openvas-plugins/scripts/ovcesa2009_1066.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/ovcesa2009_1066.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -28,8 +28,8 @@
  script_id(64123);
  script_cve_id("CVE-2009-1578", "CVE-2009-1579", "CVE-2009-1581");
  script_version ("$");
- script_tag(name:"cvss_base", value:"6.8");
- script_tag(name:"risk_factor", value:"High");
+ script_tag(name:"cvss_base", value:"4.3");
+ script_tag(name:"risk_factor", value:"Medium");
  name = "CentOS Security Advisory CESA-2009:1066 (squirrelmail)";
  script_name(name);
 
@@ -46,7 +46,7 @@
 http://www.securityspace.com/smysecure/catid.html?in=RHSA-2009:1066
 https://rhn.redhat.com/errata/RHSA-2009-1066.html
 
-Risk factor : High";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/ovcesa2009_1101.nasl
===================================================================
--- trunk/openvas-plugins/scripts/ovcesa2009_1101.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/ovcesa2009_1101.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -28,8 +28,8 @@
  script_id(64268);
  script_cve_id("CVE-2004-2541", "CVE-2006-4262", "CVE-2009-0148", "CVE-2009-1577");
  script_version ("$");
- script_tag(name:"cvss_base", value:"9.3");
- script_tag(name:"risk_factor", value:"Critical");
+ script_tag(name:"cvss_base", value:"6.9");
+ script_tag(name:"risk_factor", value:"High");
  name = "CentOS Security Advisory CESA-2009:1101 (cscope)";
  script_name(name);
 
@@ -46,7 +46,7 @@
 http://www.securityspace.com/smysecure/catid.html?in=RHSA-2009:1101
 https://rhn.redhat.com/errata/RHSA-2009-1101.html
 
-Risk factor : Medium";
+Risk factor : High";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/ovcesa2009_1102.nasl
===================================================================
--- trunk/openvas-plugins/scripts/ovcesa2009_1102.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/ovcesa2009_1102.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -28,8 +28,8 @@
  script_id(64273);
  script_cve_id("CVE-2004-2541", "CVE-2009-0148");
  script_version ("$");
- script_tag(name:"cvss_base", value:"9.3");
- script_tag(name:"risk_factor", value:"Critical");
+ script_tag(name:"cvss_base", value:"6.9");
+ script_tag(name:"risk_factor", value:"High");
  name = "CentOS Security Advisory CESA-2009:1102 (cscope)";
  script_name(name);
 
@@ -46,7 +46,7 @@
 http://www.securityspace.com/smysecure/catid.html?in=RHSA-2009:1102
 https://rhn.redhat.com/errata/RHSA-2009-1102.html
 
-Risk factor : Medium";
+Risk factor : High";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/ovcesa2009_1106.nasl
===================================================================
--- trunk/openvas-plugins/scripts/ovcesa2009_1106.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/ovcesa2009_1106.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -28,8 +28,8 @@
  script_id(64270);
  script_cve_id("CVE-2009-1072", "CVE-2009-1192", "CVE-2009-1439", "CVE-2009-1630", "CVE-2009-1633", "CVE-2009-1758");
  script_version ("$");
- script_tag(name:"cvss_base", value:"7.8");
- script_tag(name:"risk_factor", value:"High");
+ script_tag(name:"cvss_base", value:"4.9");
+ script_tag(name:"risk_factor", value:"Medium");
  name = "CentOS Security Advisory CESA-2009:1106 (kernel)";
  script_name(name);
 
@@ -46,7 +46,7 @@
 http://www.securityspace.com/smysecure/catid.html?in=RHSA-2009:1106
 https://rhn.redhat.com/errata/RHSA-2009-1106.html
 
-Risk factor : High";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/ovcesa2009_1107.nasl
===================================================================
--- trunk/openvas-plugins/scripts/ovcesa2009_1107.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/ovcesa2009_1107.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -28,8 +28,8 @@
  script_id(64272);
  script_cve_id("CVE-2009-0023", "CVE-2009-1955", "CVE-2009-1956");
  script_version ("$");
- script_tag(name:"cvss_base", value:"7.8");
- script_tag(name:"risk_factor", value:"High");
+ script_tag(name:"cvss_base", value:"4.3");
+ script_tag(name:"risk_factor", value:"Medium");
  name = "CentOS Security Advisory CESA-2009:1107 (apr-util)";
  script_name(name);
 

Modified: trunk/openvas-plugins/scripts/ovcesa2009_1108.nasl
===================================================================
--- trunk/openvas-plugins/scripts/ovcesa2009_1108.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/ovcesa2009_1108.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -28,8 +28,8 @@
  script_id(64269);
  script_cve_id("CVE-2009-0023", "CVE-2009-1955", "CVE-2009-1956");
  script_version ("$");
- script_tag(name:"cvss_base", value:"7.8");
- script_tag(name:"risk_factor", value:"High");
+ script_tag(name:"cvss_base", value:"4.3");
+ script_tag(name:"risk_factor", value:"Medium");
  name = "CentOS Security Advisory CESA-2009:1108 (httpd)";
  script_name(name);
 

Modified: trunk/openvas-plugins/scripts/ovcesa2009_1126.nasl
===================================================================
--- trunk/openvas-plugins/scripts/ovcesa2009_1126.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/ovcesa2009_1126.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -28,8 +28,8 @@
  script_id(64332);
  script_cve_id("CVE-2009-1303", "CVE-2009-1305", "CVE-2009-1306", "CVE-2009-1307", "CVE-2009-1308", "CVE-2009-1309", "CVE-2009-1392", "CVE-2009-1833", "CVE-2009-1836", "CVE-2009-1838");
  script_version ("$");
- script_tag(name:"cvss_base", value:"9.3");
- script_tag(name:"risk_factor", value:"Critical");
+ script_tag(name:"cvss_base", value:"5.0");
+ script_tag(name:"risk_factor", value:"Medium");
  name = "CentOS Security Advisory CESA-2009:1126 (thunderbird)";
  script_name(name);
 

Modified: trunk/openvas-plugins/scripts/ovcesa2009_1140.nasl
===================================================================
--- trunk/openvas-plugins/scripts/ovcesa2009_1140.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/ovcesa2009_1140.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -28,8 +28,8 @@
  script_id(64375);
  script_cve_id("CVE-2007-1558", "CVE-2009-0642", "CVE-2009-1904");
  script_version ("$");
- script_tag(name:"cvss_base", value:"6.8");
- script_tag(name:"risk_factor", value:"High");
+ script_tag(name:"cvss_base", value:"2.6");
+ script_tag(name:"risk_factor", value:"Medium");
  name = "CentOS Security Advisory CESA-2009:1140 (ruby)";
  script_name(name);
 

Modified: trunk/openvas-plugins/scripts/ovcesa2009_1148.nasl
===================================================================
--- trunk/openvas-plugins/scripts/ovcesa2009_1148.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/ovcesa2009_1148.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -28,8 +28,8 @@
  script_id(64448);
  script_cve_id("CVE-2009-1890", "CVE-2009-1891");
  script_version ("$");
- script_tag(name:"cvss_base", value:"5.0");
- script_tag(name:"risk_factor", value:"Medium");
+ script_tag(name:"cvss_base", value:"7.1");
+ script_tag(name:"risk_factor", value:"High");
  name = "CentOS Security Advisory CESA-2009:1148 (httpd)";
  script_name(name);
 

Modified: trunk/openvas-plugins/scripts/ovcesa2009_1159.nasl
===================================================================
--- trunk/openvas-plugins/scripts/ovcesa2009_1159.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/ovcesa2009_1159.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -28,8 +28,8 @@
  script_id(64491);
  script_cve_id("CVE-2009-2285", "CVE-2009-2347");
  script_version ("$");
- script_tag(name:"cvss_base", value:"9.3");
- script_tag(name:"risk_factor", value:"Critical");
+ script_tag(name:"cvss_base", value:"4.3");
+ script_tag(name:"risk_factor", value:"Medium");
  script_name("CentOS Security Advisory CESA-2009:1159 (libtiff)");
 
  desc = "The remote host is missing updates to libtiff announced in

Modified: trunk/openvas-plugins/scripts/ovcesa2009_1176.nasl
===================================================================
--- trunk/openvas-plugins/scripts/ovcesa2009_1176.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/ovcesa2009_1176.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -28,8 +28,8 @@
  script_id(64583);
  script_cve_id("CVE-2007-2052", "CVE-2007-4965", "CVE-2008-1721", "CVE-2008-1887", "CVE-2008-2315", "CVE-2008-3142", "CVE-2008-3143", "CVE-2008-3144", "CVE-2008-4864", "CVE-2008-5031");
  script_version ("$");
- script_tag(name:"cvss_base", value:"10.0");
- script_tag(name:"risk_factor", value:"Critical");
+ script_tag(name:"cvss_base", value:"5.0");
+ script_tag(name:"risk_factor", value:"Medium");
  script_name("CentOS Security Advisory CESA-2009:1176 (python)");
 
  desc = "The remote host is missing updates to python announced in

Modified: trunk/openvas-plugins/scripts/ovcesa2009_1178.nasl
===================================================================
--- trunk/openvas-plugins/scripts/ovcesa2009_1178.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/ovcesa2009_1178.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -28,8 +28,8 @@
  script_id(64493);
  script_cve_id("CVE-2008-1679", "CVE-2008-1887", "CVE-2008-2315", "CVE-2008-3142", "CVE-2008-3143", "CVE-2008-3144", "CVE-2008-4864", "CVE-2008-5031");
  script_version ("$");
- script_tag(name:"cvss_base", value:"10.0");
- script_tag(name:"risk_factor", value:"Critical");
+ script_tag(name:"cvss_base", value:"6.8");
+ script_tag(name:"risk_factor", value:"High");
  script_name("CentOS Security Advisory CESA-2009:1178 (python)");
 
  desc = "The remote host is missing updates to python announced in
@@ -45,7 +45,7 @@
 http://www.securityspace.com/smysecure/catid.html?in=RHSA-2009:1178
 https://rhn.redhat.com/errata/RHSA-2009-1178.html
 
-Risk factor : Medium";
+Risk factor : High";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/ovcesa2009_1193.nasl
===================================================================
--- trunk/openvas-plugins/scripts/ovcesa2009_1193.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/ovcesa2009_1193.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -28,7 +28,7 @@
  script_id(64588);
  script_cve_id("CVE-2007-5966", "CVE-2009-1385", "CVE-2009-1388", "CVE-2009-1389", "CVE-2009-1895", "CVE-2009-2406", "CVE-2009-2407");
  script_version ("$");
- script_tag(name:"cvss_base", value:"7.8");
+ script_tag(name:"cvss_base", value:"7.2");
  script_tag(name:"risk_factor", value:"High");
  script_name("CentOS Security Advisory CESA-2009:1193 (kernel)");
 

Modified: trunk/openvas-plugins/scripts/ovcesa2009_1201.nasl
===================================================================
--- trunk/openvas-plugins/scripts/ovcesa2009_1201.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/ovcesa2009_1201.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -28,8 +28,8 @@
  script_id(64660);
  script_cve_id("CVE-2009-0217", "CVE-2009-2475", "CVE-2009-2476", "CVE-2009-2625", "CVE-2009-2670", "CVE-2009-2671", "CVE-2009-2672", "CVE-2009-2673", "CVE-2009-2674", "CVE-2009-2675", "CVE-2009-2689", "CVE-2009-2690");
  script_version ("$Revision$");
- script_tag(name:"cvss_base", value:"10.0");
- script_tag(name:"risk_factor", value:"Critical");
+ script_tag(name:"cvss_base", value:"5.0");
+ script_tag(name:"risk_factor", value:"Medium");
  script_name("CentOS Security Advisory CESA-2009:1201 (java-1.6.0-openjdk)");
 
  desc = "The remote host is missing updates to java-1.6.0-openjdk announced in
@@ -45,7 +45,7 @@
 http://www.securityspace.com/smysecure/catid.html?in=RHSA-2009:1201
 https://rhn.redhat.com/errata/RHSA-2009-1201.html
 
-Risk factor : High";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/ovcesa2009_1205.nasl
===================================================================
--- trunk/openvas-plugins/scripts/ovcesa2009_1205.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/ovcesa2009_1205.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -28,8 +28,8 @@
  script_id(64661);
  script_cve_id("CVE-2009-1891", "CVE-2009-2412");
  script_version ("$Revision$");
- script_tag(name:"cvss_base", value:"10.0");
- script_tag(name:"risk_factor", value:"Critical");
+ script_tag(name:"cvss_base", value:"7.1");
+ script_tag(name:"risk_factor", value:"High");
  script_name("CentOS Security Advisory CESA-2009:1205 (httpd)");
 
  desc = "The remote host is missing updates to httpd announced in
@@ -45,7 +45,7 @@
 http://www.securityspace.com/smysecure/catid.html?in=RHSA-2009:1205
 https://rhn.redhat.com/errata/RHSA-2009-1205.html
 
-Risk factor : Medium";
+Risk factor : High";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/ovcesa2009_1289.nasl
===================================================================
--- trunk/openvas-plugins/scripts/ovcesa2009_1289.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/ovcesa2009_1289.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -28,8 +28,8 @@
  script_id(64932);
  script_cve_id("CVE-2008-2079", "CVE-2008-3963", "CVE-2008-4456", "CVE-2009-2446");
  script_version ("$");
- script_tag(name:"cvss_base", value:"8.5");
- script_tag(name:"risk_factor", value:"Critical");
+ script_tag(name:"cvss_base", value:"4.6");
+ script_tag(name:"risk_factor", value:"Medium");
  script_name("CentOS Security Advisory CESA-2009:1289 (mysql)");
 
  desc = "The remote host is missing updates to mysql announced in

Modified: trunk/openvas-plugins/scripts/ovcesa2009_1341.nasl
===================================================================
--- trunk/openvas-plugins/scripts/ovcesa2009_1341.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/ovcesa2009_1341.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -28,8 +28,8 @@
  script_id(64938);
  script_cve_id("CVE-2008-4579", "CVE-2008-6552");
  script_version ("$");
- script_tag(name:"cvss_base", value:"6.9");
- script_tag(name:"risk_factor", value:"High");
+ script_tag(name:"cvss_base", value:"1.9");
+ script_tag(name:"risk_factor", value:"Low");
  script_name("CentOS Security Advisory CESA-2009:1341 (cman)");
 
  desc = "The remote host is missing updates to cman announced in

Modified: trunk/openvas-plugins/scripts/ovcesa2009_1427.nasl
===================================================================
--- trunk/openvas-plugins/scripts/ovcesa2009_1427.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/ovcesa2009_1427.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -28,8 +28,8 @@
  script_id(64900);
  script_cve_id("CVE-2007-4565", "CVE-2008-2711", "CVE-2009-2666");
  script_version ("$Revision$");
- script_tag(name:"cvss_base", value:"6.4");
- script_tag(name:"risk_factor", value:"High");
+ script_tag(name:"cvss_base", value:"5.0");
+ script_tag(name:"risk_factor", value:"Medium");
  script_name("CentOS Security Advisory CESA-2009:1427 (fetchmail)");
 
  desc = "The remote host is missing updates to fetchmail announced in

Modified: trunk/openvas-plugins/scripts/ovcesa2009_1430.nasl
===================================================================
--- trunk/openvas-plugins/scripts/ovcesa2009_1430.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/ovcesa2009_1430.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -28,8 +28,8 @@
  script_id(64903);
  script_cve_id("CVE-2009-2654", "CVE-2009-3070", "CVE-2009-3071", "CVE-2009-3072", "CVE-2009-3074", "CVE-2009-3075", "CVE-2009-3076", "CVE-2009-3077", "CVE-2009-3078", "CVE-2009-3079");
  script_version ("$");
- script_tag(name:"cvss_base", value:"10.0");
- script_tag(name:"risk_factor", value:"Critical");
+ script_tag(name:"cvss_base", value:"5.8");
+ script_tag(name:"risk_factor", value:"High");
  script_name("CentOS Security Advisory CESA-2009:1430 (seamonkey)");
 
  desc = "The remote host is missing updates to seamonkey announced in

Modified: trunk/openvas-plugins/scripts/ovcesa2009_1431.nasl
===================================================================
--- trunk/openvas-plugins/scripts/ovcesa2009_1431.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/ovcesa2009_1431.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -28,8 +28,8 @@
  script_id(64904);
  script_cve_id("CVE-2009-2654", "CVE-2009-3072", "CVE-2009-3075", "CVE-2009-3076", "CVE-2009-3077");
  script_version ("$");
- script_tag(name:"cvss_base", value:"10.0");
- script_tag(name:"risk_factor", value:"Critical");
+ script_tag(name:"cvss_base", value:"5.8");
+ script_tag(name:"risk_factor", value:"High");
  script_name("CentOS Security Advisory CESA-2009:1431 (seamonkey)");
 
  desc = "The remote host is missing updates to seamonkey announced in

Modified: trunk/openvas-plugins/scripts/ovcesa2009_1432.nasl
===================================================================
--- trunk/openvas-plugins/scripts/ovcesa2009_1432.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/ovcesa2009_1432.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -28,8 +28,8 @@
  script_id(64902);
  script_cve_id("CVE-2009-2408", "CVE-2009-2409", "CVE-2009-2654", "CVE-2009-3072", "CVE-2009-3075", "CVE-2009-3076", "CVE-2009-3077");
  script_version ("$");
- script_tag(name:"cvss_base", value:"10.0");
- script_tag(name:"risk_factor", value:"Critical");
+ script_tag(name:"cvss_base", value:"6.8");
+ script_tag(name:"risk_factor", value:"High");
  script_name("CentOS Security Advisory CESA-2009:1432 (seamonkey)");
 
  desc = "The remote host is missing updates to seamonkey announced in

Modified: trunk/openvas-plugins/scripts/ovcesa2009_1438.nasl
===================================================================
--- trunk/openvas-plugins/scripts/ovcesa2009_1438.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/ovcesa2009_1438.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -28,8 +28,8 @@
  script_id(64940);
  script_cve_id("CVE-2009-1883", "CVE-2009-1895", "CVE-2009-2847", "CVE-2009-2848");
  script_version ("$");
- script_tag(name:"cvss_base", value:"7.2");
- script_tag(name:"risk_factor", value:"High");
+ script_tag(name:"cvss_base", value:"4.4");
+ script_tag(name:"risk_factor", value:"Medium");
  script_name("CentOS Security Advisory CESA-2009:1438 (kernel)");
 
  desc = "The remote host is missing updates to kernel announced in
@@ -44,7 +44,7 @@
 http://www.securityspace.com/smysecure/catid.html?in=CESA-2009:1438
 http://www.securityspace.com/smysecure/catid.html?in=RHSA-2009:1438
 
-Risk factor : High";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/ovcesa2009_1452.nasl
===================================================================
--- trunk/openvas-plugins/scripts/ovcesa2009_1452.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/ovcesa2009_1452.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -28,8 +28,8 @@
  script_id(64986);
  script_cve_id("CVE-2009-2473", "CVE-2009-2474");
  script_version ("$Revision$");
- script_tag(name:"cvss_base", value:"6.8");
- script_tag(name:"risk_factor", value:"High");
+ script_tag(name:"cvss_base", value:"4.3");
+ script_tag(name:"risk_factor", value:"Medium");
  script_name("CentOS Security Advisory CESA-2009:1452 (neon)");
 
  desc = "The remote host is missing updates to neon announced in

Modified: trunk/openvas-plugins/scripts/ovcesa2009_1459.nasl
===================================================================
--- trunk/openvas-plugins/scripts/ovcesa2009_1459.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/ovcesa2009_1459.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -28,8 +28,8 @@
  script_id(64989);
  script_cve_id("CVE-2009-2632", "CVE-2009-3235");
  script_version ("$Revision$");
- script_tag(name:"cvss_base", value:"7.5");
- script_tag(name:"risk_factor", value:"High");
+ script_tag(name:"cvss_base", value:"4.4");
+ script_tag(name:"risk_factor", value:"Medium");
  script_name("CentOS Security Advisory CESA-2009:1459 (cyrus-imapd)");
 
  desc = "The remote host is missing updates to cyrus-imapd announced in
@@ -45,7 +45,7 @@
 http://www.securityspace.com/smysecure/catid.html?in=RHSA-2009:1459
 https://rhn.redhat.com/errata/RHSA-2009-1459.html
 
-Risk factor : High";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/ovcesa2009_1471.nasl
===================================================================
--- trunk/openvas-plugins/scripts/ovcesa2009_1471.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/ovcesa2009_1471.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -28,8 +28,8 @@
  script_id(65754);
  script_cve_id("CVE-2007-2027", "CVE-2008-7224");
  script_version ("$Revision$");
- script_tag(name:"cvss_base", value:"7.8");
- script_tag(name:"risk_factor", value:"High");
+ script_tag(name:"cvss_base", value:"4.4");
+ script_tag(name:"risk_factor", value:"Medium");
  script_name("CentOS Security Advisory CESA-2009:1471 (elinks)");
 
  desc = "The remote host is missing updates to elinks announced in
@@ -45,7 +45,7 @@
 http://www.securityspace.com/smysecure/catid.html?in=RHSA-2009:1471
 https://rhn.redhat.com/errata/RHSA-2009-1471.html
 
-Risk factor : High";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/ovcesa2009_1484.nasl
===================================================================
--- trunk/openvas-plugins/scripts/ovcesa2009_1484.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/ovcesa2009_1484.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -28,8 +28,8 @@
  script_id(65757);
  script_cve_id("CVE-2009-0922", "CVE-2009-3230", "CVE-2007-6600");
  script_version ("$Revision$");
- script_tag(name:"cvss_base", value:"6.5");
- script_tag(name:"risk_factor", value:"High");
+ script_tag(name:"cvss_base", value:"4.0");
+ script_tag(name:"risk_factor", value:"Medium");
  script_name("CentOS Security Advisory CESA-2009:1484 (postgresql)");
 
  desc = "The remote host is missing updates to postgresql announced in

Modified: trunk/openvas-plugins/scripts/ovcesa2009_1500.nasl
===================================================================
--- trunk/openvas-plugins/scripts/ovcesa2009_1500.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/ovcesa2009_1500.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -28,8 +28,8 @@
  script_id(66066);
  script_cve_id("CVE-2009-0791", "CVE-2009-3604", "CVE-2009-3606", "CVE-2009-3609");
  script_version ("$Revision$");
- script_tag(name:"cvss_base", value:"9.3");
- script_tag(name:"risk_factor", value:"Critical");
+ script_tag(name:"cvss_base", value:"6.8");
+ script_tag(name:"risk_factor", value:"High");
  script_name("CentOS Security Advisory CESA-2009:1500 (xpdf)");
 
  desc = "The remote host is missing updates to xpdf announced in

Modified: trunk/openvas-plugins/scripts/ovcesa2009_1501.nasl
===================================================================
--- trunk/openvas-plugins/scripts/ovcesa2009_1501.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/ovcesa2009_1501.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -28,8 +28,8 @@
  script_id(66067);
  script_cve_id("CVE-2009-0791", "CVE-2009-1188", "CVE-2009-3604", "CVE-2009-3606", "CVE-2009-3608", "CVE-2009-3609");
  script_version ("$Revision$");
- script_tag(name:"cvss_base", value:"9.3");
- script_tag(name:"risk_factor", value:"Critical");
+ script_tag(name:"cvss_base", value:"6.8");
+ script_tag(name:"risk_factor", value:"High");
  script_name("CentOS Security Advisory CESA-2009:1501 (xpdf)");
 
  desc = "The remote host is missing updates to xpdf announced in

Modified: trunk/openvas-plugins/scripts/ovcesa2009_1502.nasl
===================================================================
--- trunk/openvas-plugins/scripts/ovcesa2009_1502.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/ovcesa2009_1502.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -28,8 +28,8 @@
  script_id(66167);
  script_cve_id("CVE-2009-0791", "CVE-2009-1188", "CVE-2009-3604", "CVE-2009-3606", "CVE-2009-3608", "CVE-2009-3609");
  script_version ("$Revision$");
- script_tag(name:"cvss_base", value:"9.3");
- script_tag(name:"risk_factor", value:"Critical");
+ script_tag(name:"cvss_base", value:"6.8");
+ script_tag(name:"risk_factor", value:"High");
  script_name("CentOS Security Advisory CESA-2009:1502 (kdegraphics)");
 
  desc = "The remote host is missing updates to kdegraphics announced in

Modified: trunk/openvas-plugins/scripts/ovcesa2009_1503.nasl
===================================================================
--- trunk/openvas-plugins/scripts/ovcesa2009_1503.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/ovcesa2009_1503.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -28,8 +28,8 @@
  script_id(66068);
  script_cve_id("CVE-2009-0791", "CVE-2009-1188", "CVE-2009-3604", "CVE-2009-3608", "CVE-2009-3609");
  script_version ("$Revision$");
- script_tag(name:"cvss_base", value:"9.3");
- script_tag(name:"risk_factor", value:"Critical");
+ script_tag(name:"cvss_base", value:"6.8");
+ script_tag(name:"risk_factor", value:"High");
  script_name("CentOS Security Advisory CESA-2009:1503 (gpdf)");
 
  desc = "The remote host is missing updates to gpdf announced in

Modified: trunk/openvas-plugins/scripts/ovcesa2009_1512.nasl
===================================================================
--- trunk/openvas-plugins/scripts/ovcesa2009_1512.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/ovcesa2009_1512.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -28,8 +28,8 @@
  script_id(66069);
  script_cve_id("CVE-2009-0791", "CVE-2009-1188", "CVE-2009-3604", "CVE-2009-3608", "CVE-2009-3609");
  script_version ("$Revision$");
- script_tag(name:"cvss_base", value:"9.3");
- script_tag(name:"risk_factor", value:"Critical");
+ script_tag(name:"cvss_base", value:"6.8");
+ script_tag(name:"risk_factor", value:"High");
  script_name("CentOS Security Advisory CESA-2009:1512 (kdegraphics)");
 
  desc = "The remote host is missing updates to kdegraphics announced in

Modified: trunk/openvas-plugins/scripts/ovcesa2009_1529.nasl
===================================================================
--- trunk/openvas-plugins/scripts/ovcesa2009_1529.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/ovcesa2009_1529.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -28,7 +28,7 @@
  script_id(66161);
  script_cve_id("CVE-2009-1888", "CVE-2009-2813", "CVE-2009-2906", "CVE-2009-2948");
  script_version ("$Revision$");
- script_tag(name:"cvss_base", value:"6.0");
+ script_tag(name:"cvss_base", value:"5.8");
  script_tag(name:"risk_factor", value:"High");
  script_name("CentOS Security Advisory CESA-2009:1529 (samba)");
 
@@ -45,7 +45,7 @@
 http://www.securityspace.com/smysecure/catid.html?in=RHSA-2009:1529
 https://rhn.redhat.com/errata/RHSA-2009-1529.html
 
-Risk factor : Medium";
+Risk factor : High";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/ovcesa2009_1548.nasl
===================================================================
--- trunk/openvas-plugins/scripts/ovcesa2009_1548.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/ovcesa2009_1548.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -28,7 +28,7 @@
  script_id(66219);
  script_cve_id("CVE-2009-2695", "CVE-2009-2908", "CVE-2009-3228", "CVE-2009-3286", "CVE-2009-3547", "CVE-2009-3613");
  script_version ("$Revision$");
- script_tag(name:"cvss_base", value:"7.8");
+ script_tag(name:"cvss_base", value:"7.2");
  script_tag(name:"risk_factor", value:"High");
  script_name("CentOS Security Advisory CESA-2009:1548 (kernel)");
 

Modified: trunk/openvas-plugins/scripts/ovcesa2009_1550.nasl
===================================================================
--- trunk/openvas-plugins/scripts/ovcesa2009_1550.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/ovcesa2009_1550.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -28,8 +28,8 @@
  script_id(66217);
  script_cve_id("CVE-2008-5029", "CVE-2008-5300", "CVE-2009-1337", "CVE-2009-1385", "CVE-2009-1895", "CVE-2009-2848", "CVE-2009-3002", "CVE-2009-3547", "CVE-2009-3001");
  script_version ("$Revision$");
- script_tag(name:"cvss_base", value:"7.8");
- script_tag(name:"risk_factor", value:"High");
+ script_tag(name:"cvss_base", value:"4.9");
+ script_tag(name:"risk_factor", value:"Medium");
  script_name("CentOS Security Advisory CESA-2009:1550 (kernel)");
 
  desc = "The remote host is missing updates to kernel announced in
@@ -45,7 +45,7 @@
 http://www.securityspace.com/smysecure/catid.html?in=RHSA-2009:1550
 https://rhn.redhat.com/errata/RHSA-2009-1550.html
 
-Risk factor : High";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/ovcesa2009_1579.nasl
===================================================================
--- trunk/openvas-plugins/scripts/ovcesa2009_1579.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/ovcesa2009_1579.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -28,8 +28,8 @@
  script_id(66274);
  script_cve_id("CVE-2009-3094", "CVE-2009-3095", "CVE-2009-3555");
  script_version ("$Revision$");
- script_tag(name:"cvss_base", value:"7.5");
- script_tag(name:"risk_factor", value:"High");
+ script_tag(name:"cvss_base", value:"2.6");
+ script_tag(name:"risk_factor", value:"Medium");
  script_name("CentOS Security Advisory CESA-2009:1579 (httpd)");
 
  desc = "The remote host is missing updates to httpd announced in

Modified: trunk/openvas-plugins/scripts/ovcesa2009_1580.nasl
===================================================================
--- trunk/openvas-plugins/scripts/ovcesa2009_1580.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/ovcesa2009_1580.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -28,7 +28,7 @@
  script_id(66275);
  script_cve_id("CVE-2009-1891", "CVE-2009-3094", "CVE-2009-3095", "CVE-2009-3555");
  script_version ("$Revision$");
- script_tag(name:"cvss_base", value:"7.5");
+ script_tag(name:"cvss_base", value:"7.1");
  script_tag(name:"risk_factor", value:"High");
  script_name("CentOS Security Advisory CESA-2009:1580 (httpd)");
 
@@ -45,7 +45,7 @@
 http://www.securityspace.com/smysecure/catid.html?in=RHSA-2009:1580
 https://rhn.redhat.com/errata/RHSA-2009-1580.html
 
-Risk factor : Medium";
+Risk factor : High";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/ovcesa2009_1584.nasl
===================================================================
--- trunk/openvas-plugins/scripts/ovcesa2009_1584.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/ovcesa2009_1584.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -28,8 +28,8 @@
  script_id(66301);
  script_cve_id("CVE-2009-2409", "CVE-2009-3728", "CVE-2009-3869", "CVE-2009-3871", "CVE-2009-3873", "CVE-2009-3874", "CVE-2009-3875", "CVE-2009-3876", "CVE-2009-3877", "CVE-2009-3879", "CVE-2009-3880", "CVE-2009-3881", "CVE-2009-3882", "CVE-2009-3883", "CVE-2009-3884");
  script_version ("$Revision$");
- script_tag(name:"cvss_base", value:"9.3");
- script_tag(name:"risk_factor", value:"Critical");
+ script_tag(name:"cvss_base", value:"5.1");
+ script_tag(name:"risk_factor", value:"High");
  script_name("CentOS Security Advisory CESA-2009:1584 (java-1.6.0-openjdk)");
 
  desc = "The remote host is missing updates to java-1.6.0-openjdk announced in

Modified: trunk/openvas-plugins/scripts/ovcesa2009_1620.nasl
===================================================================
--- trunk/openvas-plugins/scripts/ovcesa2009_1620.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/ovcesa2009_1620.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -28,7 +28,7 @@
  script_id(66615);
  script_cve_id("CVE-2009-4022");
  script_version ("$Revision$");
- script_tag(name:"cvss_base", value:"4.0");
+ script_tag(name:"cvss_base", value:"2.6");
  script_tag(name:"risk_factor", value:"Medium");
  script_name("CentOS Security Advisory CESA-2009:1620 (bind)");
 

Modified: trunk/openvas-plugins/scripts/ovcesa2009_1670.nasl
===================================================================
--- trunk/openvas-plugins/scripts/ovcesa2009_1670.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/ovcesa2009_1670.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -28,8 +28,8 @@
  script_id(66618);
  script_cve_id("CVE-2009-3612", "CVE-2009-3620", "CVE-2009-3621", "CVE-2009-3726");
  script_version ("$Revision$");
- script_tag(name:"cvss_base", value:"7.8");
- script_tag(name:"risk_factor", value:"High");
+ script_tag(name:"cvss_base", value:"4.9");
+ script_tag(name:"risk_factor", value:"Medium");
  script_name("CentOS Security Advisory CESA-2009:1670 (kernel)");
 
  desc = "The remote host is missing updates to kernel announced in
@@ -45,7 +45,7 @@
 http://www.securityspace.com/smysecure/catid.html?in=RHSA-2009:1670
 https://rhn.redhat.com/errata/RHSA-2009-1670.html
 
-Risk factor : High";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/ovcesa2009_1671.nasl
===================================================================
--- trunk/openvas-plugins/scripts/ovcesa2009_1671.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/ovcesa2009_1671.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -28,8 +28,8 @@
  script_id(66622);
  script_cve_id("CVE-2009-2910", "CVE-2009-3613", "CVE-2009-3620", "CVE-2009-3621");
  script_version ("$Revision$");
- script_tag(name:"cvss_base", value:"7.8");
- script_tag(name:"risk_factor", value:"High");
+ script_tag(name:"cvss_base", value:"4.9");
+ script_tag(name:"risk_factor", value:"Medium");
  script_name("CentOS Security Advisory CESA-2009:1671 (kernel)");
 
  desc = "The remote host is missing updates to kernel announced in
@@ -45,7 +45,7 @@
 http://www.securityspace.com/smysecure/catid.html?in=RHSA-2009:1671
 https://rhn.redhat.com/errata/RHSA-2009-1671.html
 
-Risk factor : High";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/owa_sqlinject.nasl
===================================================================
--- trunk/openvas-plugins/scripts/owa_sqlinject.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/owa_sqlinject.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -28,8 +28,8 @@
 {
   script_id(17636);
   script_version ("$Revision$");
-  script_tag(name:"cvss_base", value:"3.0");
-  script_tag(name:"risk_factor", value:"Medium");
+  script_tag(name:"cvss_base", value:"7.5");
+  script_tag(name:"risk_factor", value:"High");
   script_cve_id("CVE-2005-0420");
   script_bugtraq_id(12459);
   name = "Outlook Web Access URL Injection";

Modified: trunk/openvas-plugins/scripts/phpMyAdmin_remote_cmd.nasl
===================================================================
--- trunk/openvas-plugins/scripts/phpMyAdmin_remote_cmd.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/phpMyAdmin_remote_cmd.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -32,7 +32,7 @@
  script_xref(name:"OSVDB", value:"10715");
  
  script_version("$Revision$");
- script_tag(name:"cvss_base", value:"6.0");
+ script_tag(name:"cvss_base", value:"7.5");
  script_tag(name:"risk_factor", value:"High");
  name = "phpMyAdmin remote command execution";
  script_name(name);

Modified: trunk/openvas-plugins/scripts/phpMyAgenda_30final_file_include.nasl
===================================================================
--- trunk/openvas-plugins/scripts/phpMyAgenda_30final_file_include.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/phpMyAgenda_30final_file_include.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -28,7 +28,7 @@
 if (description) {
  script_id(200002);
  script_version("$Revision: 1.0 $");
- script_tag(name:"cvss_base", value:"7.0");
+ script_tag(name:"cvss_base", value:"7.5");
  script_tag(name:"risk_factor", value:"High");
 
  script_cve_id("CVE-2006-2009");

Modified: trunk/openvas-plugins/scripts/phpSurveyor_sql_inject.nasl
===================================================================
--- trunk/openvas-plugins/scripts/phpSurveyor_sql_inject.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/phpSurveyor_sql_inject.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -28,8 +28,8 @@
 {
  script_id(20376);
  script_version ("$Revision$");
- script_tag(name:"cvss_base", value:"5.0");
- script_tag(name:"risk_factor", value:"Medium");
+ script_tag(name:"cvss_base", value:"7.5");
+ script_tag(name:"risk_factor", value:"High");
 
  script_cve_id("CVE-2005-4586");
  script_bugtraq_id(16077);

Modified: trunk/openvas-plugins/scripts/php_5_2_13.nasl
===================================================================
--- trunk/openvas-plugins/scripts/php_5_2_13.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/php_5_2_13.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,7 +30,7 @@
  script_bugtraq_id(38182,38431,38430);
  script_cve_id("CVE-2010-1128", "CVE-2010-1129");
  script_version ("1.0-$Revision$");
- script_tag(name:"cvss_base", value:"7.5");
+ script_tag(name:"cvss_base", value:"6.4");
  script_tag(name:"risk_factor", value:"High");
  script_name("PHP < 5.2.13 Multiple Vulnerabilities");
 

Modified: trunk/openvas-plugins/scripts/php_dec_2009.nasl
===================================================================
--- trunk/openvas-plugins/scripts/php_dec_2009.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/php_dec_2009.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,8 +30,8 @@
  script_bugtraq_id(37390,37389);
  script_cve_id("CVE-2009-4143","CVE-2009-4142");
  script_version ("1.0-$Revision$");
- script_tag(name:"cvss_base", value:"7.5");
- script_tag(name:"risk_factor", value:"High");
+ script_tag(name:"cvss_base", value:"10.0");
+ script_tag(name:"risk_factor", value:"Critical");
 
  script_name("PHP < 5.2.12 Multiple Vulnerabilities");
 
@@ -65,7 +65,7 @@
 http://d.hatena.ne.jp/t_komura/20091004/1254665511
 http://bugs.php.net/bug.php?id=49785
 
-Risk factor : High";
+Risk factor : Critical";
 
  script_description(desc);
  script_summary("Determine if php version is < 5.2.12");

Modified: trunk/openvas-plugins/scripts/phpdocumentor_1_3_remote_file_inclusion.nasl
===================================================================
--- trunk/openvas-plugins/scripts/phpdocumentor_1_3_remote_file_inclusion.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/phpdocumentor_1_3_remote_file_inclusion.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -25,7 +25,7 @@
 if (description) {
  script_id(20374);
  script_version("$Revision$");
- script_tag(name:"cvss_base", value:"6.0");
+ script_tag(name:"cvss_base", value:"7.5");
  script_tag(name:"risk_factor", value:"High");
  script_cve_id("CVE-2005-4593");
  script_bugtraq_id(16080);

Modified: trunk/openvas-plugins/scripts/phpgroupware_35761.nasl
===================================================================
--- trunk/openvas-plugins/scripts/phpgroupware_35761.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/phpgroupware_35761.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,7 +30,7 @@
  script_cve_id("CVE-2009-4414");
  script_bugtraq_id(35761);
  script_version ("1.0");
- script_tag(name:"cvss_base", value:"7.5");
+ script_tag(name:"cvss_base", value:"6.8");
  script_tag(name:"risk_factor", value:"High");
 
  script_name("phpGroupWare Multiple Input Validation Vulnerabilities");
@@ -55,7 +55,7 @@
 http://www.phpgroupware.org/
 
 
-Risk factor : Low";
+Risk factor : High";
 
  script_description(desc);
  script_summary("Determine if phpGroupWare Version = 0.9.16.12");

Modified: trunk/openvas-plugins/scripts/phpmyadmin_36658.nasl
===================================================================
--- trunk/openvas-plugins/scripts/phpmyadmin_36658.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/phpmyadmin_36658.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,8 +30,8 @@
  script_cve_id("CVE-2009-3696");
  script_bugtraq_id(36658);
  script_version ("1.0-$Revision$");
- script_tag(name:"cvss_base", value:"7.5");
- script_tag(name:"risk_factor", value:"High");
+ script_tag(name:"cvss_base", value:"4.3");
+ script_tag(name:"risk_factor", value:"Medium");
 
  script_name("phpMyAdmin Unspecified SQL Injection and Cross Site Scripting Vulnerabilities");
 
@@ -57,7 +57,7 @@
 http://freshmeat.net/projects/phpmyadmin/releases/306667
 
 
-Risk factor : Low";
+Risk factor : Medium";
 
  script_description(desc);
  script_summary("Determine if phpMyAdmin is prone to SQL-injection and cross-site scripting vulnerabilities");

Modified: trunk/openvas-plugins/scripts/phpmyadmin_37826.nasl
===================================================================
--- trunk/openvas-plugins/scripts/phpmyadmin_37826.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/phpmyadmin_37826.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,8 +30,8 @@
  script_bugtraq_id(37826);
  script_cve_id("CVE-2008-7251","CVE-2008-7252");
  script_version ("1.0-$Revision$");
- script_tag(name:"cvss_base", value:"7.5");
- script_tag(name:"risk_factor", value:"High");
+ script_tag(name:"cvss_base", value:"10.0");
+ script_tag(name:"risk_factor", value:"Critical");
 
  script_name("phpMyAdmin Insecure Temporary File and Directory Creation Vulnerabilities");
 
@@ -56,7 +56,7 @@
 http://www.phpmyadmin.net/home_page/security/PMASA-2010-1.php
 http://www.phpmyadmin.net/home_page/security/PMASA-2010-2.php
 
-Risk factor : Medium";
+Risk factor : Critical";
 
  script_description(desc);
  script_summary("Determine if phpMyAdmin version is < 2.11.10");

Modified: trunk/openvas-plugins/scripts/phpmyfaq_action_parameter_flaw.nasl
===================================================================
--- trunk/openvas-plugins/scripts/phpmyfaq_action_parameter_flaw.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/phpmyfaq_action_parameter_flaw.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -33,8 +33,8 @@
  script_xref(name:"OSVDB", value:"6300");
  
  script_version("$Revision$");
- script_tag(name:"cvss_base", value:"2.0");
- script_tag(name:"risk_factor", value:"Low");
+ script_tag(name:"cvss_base", value:"6.4");
+ script_tag(name:"risk_factor", value:"High");
 
  name = "phpMyFAQ action parameter arbitrary file disclosure vulnerability";
  script_name(name);

Modified: trunk/openvas-plugins/scripts/phptonuke_dir_trav.nasl
===================================================================
--- trunk/openvas-plugins/scripts/phptonuke_dir_trav.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/phptonuke_dir_trav.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -36,8 +36,8 @@
 {
  script_id(11824);
  script_version ("$Revision$");
- script_tag(name:"cvss_base", value:"2.0");
- script_tag(name:"risk_factor", value:"Low");
+ script_tag(name:"cvss_base", value:"5.0");
+ script_tag(name:"risk_factor", value:"Medium");
 
  script_cve_id("CVE-2002-1913");
  script_bugtraq_id(5982);

Modified: trunk/openvas-plugins/scripts/phpweblog_xss.nasl
===================================================================
--- trunk/openvas-plugins/scripts/phpweblog_xss.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/phpweblog_xss.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,8 +30,8 @@
 {
  script_id(17343);
  script_version("$Revision$");
- script_tag(name:"cvss_base", value:"6.0");
- script_tag(name:"risk_factor", value:"High");
+ script_tag(name:"cvss_base", value:"4.6");
+ script_tag(name:"risk_factor", value:"Medium");
  script_cve_id("CVE-2005-0698");
  script_bugtraq_id(12747);
  

Modified: trunk/openvas-plugins/scripts/phpwebthings_sql_injection.nasl
===================================================================
--- trunk/openvas-plugins/scripts/phpwebthings_sql_injection.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/phpwebthings_sql_injection.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -25,8 +25,8 @@
 if (description) {
 script_id(20170);
 script_version("$Revision$");
-script_tag(name:"cvss_base", value:"4.0");
-script_tag(name:"risk_factor", value:"Medium");
+script_tag(name:"cvss_base", value:"7.5");
+script_tag(name:"risk_factor", value:"High");
 
 script_cve_id("CVE-2005-3585", "CVE-2005-4218");
 script_bugtraq_id(15276, 15465);

Modified: trunk/openvas-plugins/scripts/plumecms_prepend_file_inclusion.nasl
===================================================================
--- trunk/openvas-plugins/scripts/plumecms_prepend_file_inclusion.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/plumecms_prepend_file_inclusion.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -25,7 +25,7 @@
 if (description) {
  script_id(20972);
  script_version("$Revision$");
- script_tag(name:"cvss_base", value:"6.0");
+ script_tag(name:"cvss_base", value:"7.5");
  script_tag(name:"risk_factor", value:"High");
 
  script_cve_id("CVE-2006-0725");

Modified: trunk/openvas-plugins/scripts/qk_smtp_server_dos.nasl
===================================================================
--- trunk/openvas-plugins/scripts/qk_smtp_server_dos.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/qk_smtp_server_dos.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -25,8 +25,8 @@
 if (description) {
  script_id(2000201); 
  script_version("$Revision: 1.0 $");
- script_tag(name:"cvss_base", value:"10.0");
- script_tag(name:"risk_factor", value:"Critical");
+ script_tag(name:"cvss_base", value:"7.5");
+ script_tag(name:"risk_factor", value:"High");
 
  script_cve_id("CVE-2006-5551");
  script_bugtraq_id(20681);

Modified: trunk/openvas-plugins/scripts/quote.nasl
===================================================================
--- trunk/openvas-plugins/scripts/quote.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/quote.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -26,8 +26,8 @@
 {
  script_id(10198);
  script_version ("$Revision$");
- script_tag(name:"cvss_base", value:"0.0");
- script_tag(name:"risk_factor", value:"None");
+ script_tag(name:"cvss_base", value:"5.0");
+ script_tag(name:"risk_factor", value:"Medium");
  script_cve_id("CVE-1999-0103");
  name = "Quote of the day";
  script_name(name);

Modified: trunk/openvas-plugins/scripts/rcblog_dir_transversal.nasl
===================================================================
--- trunk/openvas-plugins/scripts/rcblog_dir_transversal.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/rcblog_dir_transversal.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -33,7 +33,7 @@
   script_xref(name:"OSVDB", value:"22681");
 
   script_version ("$Revision$");
-  script_tag(name:"cvss_base", value:"3.0");
+  script_tag(name:"cvss_base", value:"5.0");
   script_tag(name:"risk_factor", value:"Medium");
 
   name = "RCBlog post Parameter Directory Traversal Vulnerability";

Modified: trunk/openvas-plugins/scripts/remote-MS03-018.nasl
===================================================================
--- trunk/openvas-plugins/scripts/remote-MS03-018.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/remote-MS03-018.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -90,8 +90,8 @@
 if(description)
 {
 script_id(101017);
-script_tag(name:"cvss_base", value:"10.0");
-script_tag(name:"risk_factor", value:"Critical");
+script_tag(name:"cvss_base", value:"6.8");
+script_tag(name:"risk_factor", value:"High");
 script_cve_id("CVE-2003-0223", "CVE-2003-0224", "CVE-2003-0225", "CVE-2003-0226");
 name = "Microsoft MS03-018 security check";
 script_name(name);
@@ -143,7 +143,7 @@
 
  
 
-Risk factor: High";
+Risk factor : High";
 
 
 script_description(desc);

Modified: trunk/openvas-plugins/scripts/remote-MS04-011.nasl
===================================================================
--- trunk/openvas-plugins/scripts/remote-MS04-011.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/remote-MS04-011.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -95,7 +95,7 @@
 if(description)
 {
 script_id(101011);
-script_tag(name:"cvss_base", value:"7.6");
+script_tag(name:"cvss_base", value:"7.5");
 script_tag(name:"risk_factor", value:"High");
 script_cve_id("CVE-2003-0533", "CVE-2003-0663", "CVE-2003-0719", "CVE-2003-0806", "CVE-2003-0906","CVE-2003-0907","CVE-2003-0908", 
 	      "CVE-2003-0909", "CVE-2003-0910", "CVE-2004-09117", "CVE-2004-0118", "CVE-2004-0119", "CVE-2004-0120", "CVE-2004-0123");
@@ -126,7 +126,7 @@
 Solution :
 Microsoft has released a patch to fix these issues. 
 
-Risk factor : Critical";
+Risk factor : High";
 
 script_description(desc); 
 

Modified: trunk/openvas-plugins/scripts/rt_37162.nasl
===================================================================
--- trunk/openvas-plugins/scripts/rt_37162.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/rt_37162.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,7 +30,7 @@
  script_bugtraq_id(37162);
  script_cve_id("CVE-2009-3585");
  script_version ("1.0-$Revision$");
- script_tag(name:"cvss_base", value:"7.5");
+ script_tag(name:"cvss_base", value:"5.8");
  script_tag(name:"risk_factor", value:"High");
 
  script_name("RT Session Fixation Vulnerability");
@@ -52,7 +52,7 @@
 http://lists.bestpractical.com/pipermail/rt-announce/2009-November/000176.html
 http://www.bestpractical.com/rt/
 
-Risk factor : Low";
+Risk factor : High";
 
  script_description(desc);
  script_summary("Determine if RT is prone to a session-fixation	vulnerability.");

Modified: trunk/openvas-plugins/scripts/secpod_adobe_shockwave_player_mult_code_exec_vuln_aug11.nasl
===================================================================
--- trunk/openvas-plugins/scripts/secpod_adobe_shockwave_player_mult_code_exec_vuln_aug11.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/secpod_adobe_shockwave_player_mult_code_exec_vuln_aug11.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -31,7 +31,7 @@
   script_cve_id("CVE-2010-4308", "CVE-2010-4309", "CVE-2011-2419", "CVE-2011-2420",
                 "CVE-2011-2421", "CVE-2011-2422", "CVE-2011-2423");
   script_bugtraq_id(49102);
-  script_tag(name:"cvss_base", value:"9.3");
+  script_tag(name:"cvss_base", value:"10.0");
   script_tag(name:"risk_factor", value:"Critical");
   script_name("Adobe Shockwave Player Multiple Remote Code Execution Vulnerabilities - Aug 2011");
   desc = "

Modified: trunk/openvas-plugins/scripts/secpod_adobe_shockwave_player_mult_code_exec_vuln_macosx.nasl
===================================================================
--- trunk/openvas-plugins/scripts/secpod_adobe_shockwave_player_mult_code_exec_vuln_macosx.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/secpod_adobe_shockwave_player_mult_code_exec_vuln_macosx.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -31,7 +31,7 @@
   script_cve_id("CVE-2010-4308", "CVE-2010-4309", "CVE-2011-2419", "CVE-2011-2420",
                 "CVE-2011-2421", "CVE-2011-2422", "CVE-2011-2423");
   script_bugtraq_id(49102);
-  script_tag(name:"cvss_base", value:"9.3");
+  script_tag(name:"cvss_base", value:"10.0");
   script_tag(name:"risk_factor", value:"Critical");
   script_name("Adobe Shockwave Player Multiple Remote Code Execution Vulnerabilities (Mac OS X)");
   desc = "

Modified: trunk/openvas-plugins/scripts/secpod_ms11-057.nasl
===================================================================
--- trunk/openvas-plugins/scripts/secpod_ms11-057.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/secpod_ms11-057.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -31,8 +31,8 @@
   script_cve_id("CVE-2011-1257", "CVE-2011-1960", "CVE-2011-1961", "CVE-2011-1962",
                 "CVE-2011-1963", "CVE-2011-1964", "CVE-2011-2383");
   script_bugtraq_id(48994, 49023, 49027, 49032, 49037, 49039, 47989);
-  script_tag(name:"cvss_base", value:"10.0");
-  script_tag(name:"risk_factor", value:"Critical");
+  script_tag(name:"cvss_base", value:"7.6");
+  script_tag(name:"risk_factor", value:"High");
   script_name("Microsoft Internet Explorer Multiple Vulnerabilities (2559049)");
   desc = "
   Overview: This host has critical security update missing according to

Modified: trunk/openvas-plugins/scripts/secpod_ms11-059.nasl
===================================================================
--- trunk/openvas-plugins/scripts/secpod_ms11-059.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/secpod_ms11-059.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,7 +30,7 @@
   script_version("$Revision$:1.0");
   script_bugtraq_id(49026);
   script_cve_id("CVE-2011-1975");
-  script_tag(name:"cvss_base", value:"10.0");
+  script_tag(name:"cvss_base", value:"9.3");
   script_tag(name:"risk_factor", value:"Critical");
   script_name("Microsoft Data Access Components Remote Code Execution Vulnerabilities (2560656)");
   desc = "

Modified: trunk/openvas-plugins/scripts/secpod_ms11-060.nasl
===================================================================
--- trunk/openvas-plugins/scripts/secpod_ms11-060.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/secpod_ms11-060.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -29,8 +29,8 @@
   script_version("$Revision: 1.0$");
   script_cve_id("CVE-2011-1972", "CVE-2011-1979");
   script_bugtraq_id(49024);
-  script_tag(name:"cvss_base", value:"7.6");
-  script_tag(name:"risk_factor", value:"High");
+  script_tag(name:"cvss_base", value:"9.3");
+  script_tag(name:"risk_factor", value:"Critical");
   script_name("Microsoft Visio Remote Code Execution Vulnerabilities (2560978)");
   desc = "
   Overview: This host has important security update missing according to

Modified: trunk/openvas-plugins/scripts/secpod_ms11-062.nasl
===================================================================
--- trunk/openvas-plugins/scripts/secpod_ms11-062.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/secpod_ms11-062.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,7 +30,7 @@
   script_version("$Revision: 1.0$");
   script_bugtraq_id(48996);
   script_cve_id("CVE-2011-1974");
-  script_tag(name:"cvss_base", value:"5.5");
+  script_tag(name:"cvss_base", value:"7.2");
   script_tag(name:"risk_factor", value:"High");
   script_name("MS Windows Remote Access Service NDISTAPI Driver Privilege Elevation Vulnerability (2566454)");
   desc = "

Modified: trunk/openvas-plugins/scripts/secpod_ms11-063.nasl
===================================================================
--- trunk/openvas-plugins/scripts/secpod_ms11-063.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/secpod_ms11-063.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,7 +30,7 @@
   script_version("$Revision: 1.0$");
   script_cve_id("CVE-2011-1967");
   script_bugtraq_id(48992);
-  script_tag(name:"cvss_base", value:"6.8");
+  script_tag(name:"cvss_base", value:"7.2");
   script_tag(name:"risk_factor", value:"High");
   script_name("Microsoft Windows Client/Server Run-time Subsystem Privilege Escalation Vulnerability (2567680)");
   desc = "

Modified: trunk/openvas-plugins/scripts/secpod_ms11-065.nasl
===================================================================
--- trunk/openvas-plugins/scripts/secpod_ms11-065.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/secpod_ms11-065.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,8 +30,8 @@
   script_version("$Revision: 1.0$");
   script_cve_id("CVE-2011-1968");
   script_bugtraq_id(48995);
-  script_tag(name:"cvss_base", value:"9.3");
-  script_tag(name:"risk_factor", value:"Critical");
+  script_tag(name:"cvss_base", value:"7.1");
+  script_tag(name:"risk_factor", value:"High");
   script_name("Microsoft Remote Desktop Protocol Denial of Service Vulnerability (2570222)");
   desc = "
   Overview: This host has critical security update missing according to

Modified: trunk/openvas-plugins/scripts/secpod_ms11-068.nasl
===================================================================
--- trunk/openvas-plugins/scripts/secpod_ms11-068.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/secpod_ms11-068.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,8 +30,8 @@
   script_version("$Revision:1.0$");
   script_cve_id("CVE-2011-1971");
   script_bugtraq_id(48997);
-  script_tag(name:"cvss_base", value:"7.8");
-  script_tag(name:"risk_factor", value:"High");
+  script_tag(name:"cvss_base", value:"4.7");
+  script_tag(name:"risk_factor", value:"Medium");
   script_name("Microsoft Windows Kernel Denial of Service Vulnerability (2556532)");
   desc = "
   Overview: This host has important security update missing according to

Modified: trunk/openvas-plugins/scripts/sun_dir_server_37699.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sun_dir_server_37699.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/sun_dir_server_37699.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -27,11 +27,11 @@
 if (description)
 {
  script_id(100438);
- script_tag(name:"cvss_base", value:"7.8");
+ script_tag(name:"cvss_base", value:"5.0");
  script_cve_id("CVE-2010-0313");
  script_bugtraq_id(37699);
  script_version ("1.0-$Revision$");
- script_tag(name:"risk_factor", value:"High");
+ script_tag(name:"risk_factor", value:"Medium");
 
  script_name("Sun Java System Directory Server 'core_get_proxyauth_dn' Denial of Service Vulnerability");
 

Modified: trunk/openvas-plugins/scripts/tftpd_overflow.nasl
===================================================================
--- trunk/openvas-plugins/scripts/tftpd_overflow.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/tftpd_overflow.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -28,7 +28,7 @@
 {
  script_id(18264);
  script_version ("$Revision$");
- script_tag(name:"cvss_base", value:"7.5");
+ script_tag(name:"cvss_base", value:"7.1");
  script_tag(name:"risk_factor", value:"High");
  # Not sure for 10526 or 11584
  # BID=6043 / CVE-2002-1542 is different

Modified: trunk/openvas-plugins/scripts/tikiwiki_multiple_input_flaws.nasl
===================================================================
--- trunk/openvas-plugins/scripts/tikiwiki_multiple_input_flaws.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/tikiwiki_multiple_input_flaws.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -38,8 +38,8 @@
  );
  script_bugtraq_id(10100);
  script_version("$Revision$");
- script_tag(name:"cvss_base", value:"7.5");
- script_tag(name:"risk_factor", value:"High");
+ script_tag(name:"cvss_base", value:"5.0");
+ script_tag(name:"risk_factor", value:"Medium");
  
  name = "TikiWiki multiple input validation vulnerabilities";
 
@@ -56,7 +56,7 @@
 directory traversal, and arbitrary file upload. 
 
 Solution : Upgrade to TikiWiki 1.8.2 or newer
-Risk factor: High";
+Risk factor : Medium";
 
  script_description(desc);
  

Modified: trunk/openvas-plugins/scripts/trac_sql_injection.nasl
===================================================================
--- trunk/openvas-plugins/scripts/trac_sql_injection.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/trac_sql_injection.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -29,8 +29,8 @@
 script_bugtraq_id(15676);
 
 script_version("$Revision$");
-script_tag(name:"cvss_base", value:"2.0");
-script_tag(name:"risk_factor", value:"Low");
+script_tag(name:"cvss_base", value:"7.5");
+script_tag(name:"risk_factor", value:"High");
 script_name("Edgewall Software Trac SQL injection flaw");
 
 

Modified: trunk/openvas-plugins/scripts/trillian_installed.nasl
===================================================================
--- trunk/openvas-plugins/scripts/trillian_installed.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/trillian_installed.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -31,8 +31,8 @@
  # no cve_id
  
  script_version("$Revision$");
- script_tag(name:"cvss_base", value:"7.5");
- script_tag(name:"risk_factor", value:"High");
+ script_tag(name:"cvss_base", value:"4.6");
+ script_tag(name:"risk_factor", value:"Medium");
 
  name = "Trillian is installed";
 
@@ -43,7 +43,7 @@
 which may not be suitable for a business environment. 
 
 Solution : Uninstall this software
-Risk factor : Low";
+Risk factor : Medium";
 
 
 

Modified: trunk/openvas-plugins/scripts/ubuntu_698_1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/ubuntu_698_1.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/ubuntu_698_1.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,8 +30,8 @@
  script_id(64163);
  script_cve_id("CVE-2008-5027", "CVE-2008-5302", "CVE-2008-5303", "CVE-2008-2435", "CVE-2008-1102", "CVE-2008-4863", "CVE-2008-5028", "CVE-2007-3555", "CVE-2008-1502", "CVE-2008-3325", "CVE-2008-3326", "CVE-2008-4796", "CVE-2008-4810", "CVE-2008-4811", "CVE-2008-5432", "CVE-2008-5619", "CVE-2008-2426", "CVE-2008-2434", "CVE-2008-4242", "CVE-2007-3372", "CVE-2008-5081", "CVE-2008-4577", "CVE-2008-4870", "CVE-2008-5140", "CVE-2008-5312", "CVE-2008-5313", "CVE-2008-4844", "CVE-2008-2237", "CVE-2008-2238", "CVE-2008-4937");
  script_version ("$");
- script_tag(name:"cvss_base", value:"10.0");
- script_tag(name:"risk_factor", value:"Critical");
+ script_tag(name:"cvss_base", value:"6.5");
+ script_tag(name:"risk_factor", value:"High");
  name = "Ubuntu USN-698-1 (nagios)";
  script_name(name);
 

Modified: trunk/openvas-plugins/scripts/ubuntu_698_2.nasl
===================================================================
--- trunk/openvas-plugins/scripts/ubuntu_698_2.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/ubuntu_698_2.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -29,8 +29,8 @@
  script_id(63072);
  script_cve_id("CVE-2008-5027", "CVE-2008-5028", "CVE-2007-3555", "CVE-2008-1502", "CVE-2008-3325", "CVE-2008-3326", "CVE-2008-4796", "CVE-2008-4810", "CVE-2008-4811", "CVE-2008-5432", "CVE-2008-5619", "CVE-2008-2426", "CVE-2008-2434", "CVE-2008-4242", "CVE-2007-3372", "CVE-2008-5081", "CVE-2008-4577", "CVE-2008-4870", "CVE-2008-5140", "CVE-2008-5312", "CVE-2008-5313", "CVE-2008-4844", "CVE-2008-2237", "CVE-2008-2238", "CVE-2008-4937");
  script_version ("$");
- script_tag(name:"cvss_base", value:"10.0");
- script_tag(name:"risk_factor", value:"Critical");
+ script_tag(name:"cvss_base", value:"6.5");
+ script_tag(name:"risk_factor", value:"High");
  name = "Ubuntu USN-698-2 (nagios3)";
  script_name(name);
 

Modified: trunk/openvas-plugins/scripts/ubuntu_698_3.nasl
===================================================================
--- trunk/openvas-plugins/scripts/ubuntu_698_3.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/ubuntu_698_3.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,8 +30,8 @@
  script_id(64164);
  script_cve_id("CVE-2008-5027", "CVE-2008-5028", "CVE-2007-2739", "CVE-2008-5033", "CVE-2008-4933", "CVE-2008-5025", "CVE-2007-2865", "CVE-2007-5728", "CVE-2008-5587", "CVE-2008-2383", "CVE-2008-3443", "CVE-2008-5029", "CVE-2009-0022", "CVE-2006-7236", "CVE-2008-2382");
  script_version ("$");
- script_tag(name:"cvss_base", value:"9.3");
- script_tag(name:"risk_factor", value:"Critical");
+ script_tag(name:"cvss_base", value:"6.5");
+ script_tag(name:"risk_factor", value:"High");
  name = "Ubuntu USN-698-3 (nagios2)";
  script_name(name);
 

Modified: trunk/openvas-plugins/scripts/ubuntu_699_1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/ubuntu_699_1.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/ubuntu_699_1.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -29,8 +29,8 @@
  script_id(63071);
  script_cve_id("CVE-2008-1102", "CVE-2008-4863", "CVE-2008-5027", "CVE-2008-5028", "CVE-2007-3555", "CVE-2008-1502", "CVE-2008-3325", "CVE-2008-3326", "CVE-2008-4796", "CVE-2008-4810", "CVE-2008-4811", "CVE-2008-5432", "CVE-2008-5619", "CVE-2008-2426", "CVE-2008-2434", "CVE-2008-4242", "CVE-2007-3372", "CVE-2008-5081", "CVE-2008-4577", "CVE-2008-4870", "CVE-2008-5140", "CVE-2008-5312", "CVE-2008-5313", "CVE-2008-4844", "CVE-2008-2237", "CVE-2008-2238", "CVE-2008-4937");
  script_version ("$");
- script_tag(name:"cvss_base", value:"10.0");
- script_tag(name:"risk_factor", value:"Critical");
+ script_tag(name:"cvss_base", value:"6.8");
+ script_tag(name:"risk_factor", value:"High");
  name = "Ubuntu USN-699-1 (blender)";
  script_name(name);
 

Modified: trunk/openvas-plugins/scripts/ubuntu_700_1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/ubuntu_700_1.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/ubuntu_700_1.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -29,7 +29,7 @@
  script_id(63075);
  script_cve_id("CVE-2007-4829", "CVE-2008-1927", "CVE-2008-5302", "CVE-2008-5303");
  script_version ("$");
- script_tag(name:"cvss_base", value:"6.9");
+ script_tag(name:"cvss_base", value:"6.8");
  script_tag(name:"risk_factor", value:"High");
  name = "Ubuntu USN-700-1 (perl)";
  script_name(name);

Modified: trunk/openvas-plugins/scripts/ubuntu_700_2.nasl
===================================================================
--- trunk/openvas-plugins/scripts/ubuntu_700_2.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/ubuntu_700_2.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,7 +30,7 @@
  script_id(63235);
  script_cve_id("CVE-2007-4829", "CVE-2008-1927", "CVE-2008-5302", "CVE-2008-5303");
  script_version ("$");
- script_tag(name:"cvss_base", value:"6.9");
+ script_tag(name:"cvss_base", value:"6.8");
  script_tag(name:"risk_factor", value:"High");
  name = "Ubuntu USN-700-2 (perl)";
  script_name(name);

Modified: trunk/openvas-plugins/scripts/ubuntu_702_1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/ubuntu_702_1.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/ubuntu_702_1.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,8 +30,8 @@
  script_id(63102);
  script_cve_id("CVE-2009-0022", "CVE-2006-7236", "CVE-2008-2383", "CVE-2008-2382");
  script_version ("$");
- script_tag(name:"cvss_base", value:"9.3");
- script_tag(name:"risk_factor", value:"Critical");
+ script_tag(name:"cvss_base", value:"6.3");
+ script_tag(name:"risk_factor", value:"High");
  name = "Ubuntu USN-702-1 (samba)";
  script_name(name);
 

Modified: trunk/openvas-plugins/scripts/ubuntu_707_1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/ubuntu_707_1.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/ubuntu_707_1.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,8 +30,8 @@
  script_id(64165);
  script_cve_id("CVE-2008-5183", "CVE-2008-5184", "CVE-2008-5286", "CVE-2008-5377", "CVE-2009-0050", "CVE-2008-2383", "CVE-2007-4349", "CVE-2008-5077", "CVE-2009-0021", "CVE-2009-0025", "CVE-2008-5262", "CVE-2008-2237", "CVE-2008-2238", "CVE-2008-4314", "CVE-2008-5517", "CVE-2008-5516", "CVE-2008-3825", "CVE-2008-3997", "CVE-2008-4444", "CVE-2008-4006", "CVE-2008-5449", "CVE-2008-3979", "CVE-2008-3821", "CVE-2008-2382", "CVE-2008-5714", "CVE-2008-3818", "CVE-2009-0053", "CVE-2009-0054", "CVE-2009-0055", "CVE-2009-0056", "CVE-2008-5500", "CVE-2008-5503", "CVE-2008-5506", "CVE-2008-5507", "CVE-2008-5508", "CVE-2008-5511", "CVE-2008-5512", "CVE-2008-5256", "CVE-2008-5448", "CVE-2008-5718", "CVE-2007-4476");
  script_version ("$");
- script_tag(name:"cvss_base", value:"10.0");
- script_tag(name:"risk_factor", value:"Critical");
+ script_tag(name:"cvss_base", value:"4.3");
+ script_tag(name:"risk_factor", value:"Medium");
  name = "Ubuntu USN-707-1 (cupsys)";
  script_name(name);
 
@@ -82,7 +82,7 @@
 
 https://secure1.securityspace.com/smysecure/catid.html?in=USN-707-1
 
-Risk factor : High";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/ubuntu_708_1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/ubuntu_708_1.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/ubuntu_708_1.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,8 +30,8 @@
  script_id(63233);
  script_cve_id("CVE-2008-3997", "CVE-2008-4444", "CVE-2008-4006", "CVE-2008-5449", "CVE-2008-3979", "CVE-2009-0021", "CVE-2008-3821", "CVE-2008-2382", "CVE-2008-5714", "CVE-2008-3818", "CVE-2009-0053", "CVE-2009-0054", "CVE-2009-0055", "CVE-2009-0056", "CVE-2008-5500", "CVE-2008-5503", "CVE-2008-5506", "CVE-2008-5507", "CVE-2008-5508", "CVE-2008-5511", "CVE-2008-5512", "CVE-2008-5256", "CVE-2008-5448", "CVE-2008-5718", "CVE-2007-4476");
  script_version ("$");
- script_tag(name:"cvss_base", value:"10.0");
- script_tag(name:"risk_factor", value:"Critical");
+ script_tag(name:"cvss_base", value:"4.0");
+ script_tag(name:"risk_factor", value:"Medium");
  name = "Ubuntu USN-708-1 (hplip)";
  script_name(name);
 
@@ -57,7 +57,7 @@
 
 https://secure1.securityspace.com/smysecure/catid.html?in=USN-708-1
 
-Risk factor : High";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/ubuntu_710_1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/ubuntu_710_1.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/ubuntu_710_1.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,8 +30,8 @@
  script_id(63305);
  script_cve_id("CVE-2008-3231", "CVE-2008-5233", "CVE-2008-5234", "CVE-2008-5236", "CVE-2008-5237", "CVE-2008-5238", "CVE-2008-5239", "CVE-2008-5240", "CVE-2008-5241", "CVE-2008-5242", "CVE-2008-5243", "CVE-2008-5244", "CVE-2008-5246", "CVE-2008-5248", "CVE-2008-5905", "CVE-2008-5906", "CVE-2008-2712", "CVE-2008-4101", "CVE-2005-2090", "CVE-2005-3510", "CVE-2006-3835", "CVE-2006-7195", "CVE-2006-7196", "CVE-2007-0450", "CVE-2007-1355", "CVE-2007-1358", "CVE-2007-1858", "CVE-2007-2449", "CVE-2007-2450", "CVE-2007-3382", "CVE-2007-3385", "CVE-2007-3386", "CVE-2008-0128", "CVE-2008-3358", "CVE-2009-0042", "CVE-2009-0135", "CVE-2009-0136", "CVE-2008-5347", "CVE-2008-5348", "CVE-2008-5349", "CVE-2008-5350", "CVE-2008-5351", "CVE-2008-5352", "CVE-2008-5353", "CVE-2008-5354", "CVE-2008-5358", "CVE-2008-5359", "CVE-2008-5360");
  script_version ("$");
- script_tag(name:"cvss_base", value:"10.0");
- script_tag(name:"risk_factor", value:"Critical");
+ script_tag(name:"cvss_base", value:"4.3");
+ script_tag(name:"risk_factor", value:"Medium");
  name = "Ubuntu USN-710-1 (xine-lib)";
  script_name(name);
 
@@ -62,7 +62,7 @@
 
 https://secure1.securityspace.com/smysecure/catid.html?in=USN-710-1
 
-Risk factor : High";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/ubuntu_711_1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/ubuntu_711_1.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/ubuntu_711_1.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,8 +30,8 @@
  script_id(63306);
  script_cve_id("CVE-2008-5905", "CVE-2008-5906", "CVE-2008-2712", "CVE-2008-4101", "CVE-2005-2090", "CVE-2005-3510", "CVE-2006-3835", "CVE-2006-7195", "CVE-2006-7196", "CVE-2007-0450", "CVE-2007-1355", "CVE-2007-1358", "CVE-2007-1858", "CVE-2007-2449", "CVE-2007-2450", "CVE-2007-3382", "CVE-2007-3385", "CVE-2007-3386", "CVE-2008-0128", "CVE-2008-3358", "CVE-2009-0042", "CVE-2009-0135", "CVE-2009-0136", "CVE-2008-5347", "CVE-2008-5348", "CVE-2008-5349", "CVE-2008-5350", "CVE-2008-5351", "CVE-2008-5352", "CVE-2008-5353", "CVE-2008-5354", "CVE-2008-5358", "CVE-2008-5359", "CVE-2008-5360");
  script_version ("$");
- script_tag(name:"cvss_base", value:"10.0");
- script_tag(name:"risk_factor", value:"Critical");
+ script_tag(name:"cvss_base", value:"4.3");
+ script_tag(name:"risk_factor", value:"Medium");
  name = "Ubuntu USN-711-1 (ktorrent)";
  script_name(name);
 
@@ -67,7 +67,7 @@
 
 https://secure1.securityspace.com/smysecure/catid.html?in=USN-711-1
 
-Risk factor : High";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/ubuntu_712_1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/ubuntu_712_1.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/ubuntu_712_1.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,7 +30,7 @@
  script_id(63307);
  script_cve_id("CVE-2008-2712", "CVE-2008-4101", "CVE-2005-2090", "CVE-2005-3510", "CVE-2006-3835", "CVE-2006-7195", "CVE-2006-7196", "CVE-2007-0450", "CVE-2007-1355", "CVE-2007-1358", "CVE-2007-1858", "CVE-2007-2449", "CVE-2007-2450", "CVE-2007-3382", "CVE-2007-3385", "CVE-2007-3386", "CVE-2008-0128", "CVE-2008-3358", "CVE-2009-0042", "CVE-2009-0135", "CVE-2009-0136", "CVE-2008-5347", "CVE-2008-5348", "CVE-2008-5349", "CVE-2008-5350", "CVE-2008-5351", "CVE-2008-5352", "CVE-2008-5353", "CVE-2008-5354", "CVE-2008-5358", "CVE-2008-5359", "CVE-2008-5360");
  script_version ("$");
- script_tag(name:"cvss_base", value:"10.0");
+ script_tag(name:"cvss_base", value:"9.3");
  script_tag(name:"risk_factor", value:"Critical");
  name = "Ubuntu USN-712-1 (vim)";
  script_name(name);
@@ -76,7 +76,7 @@
 
 https://secure1.securityspace.com/smysecure/catid.html?in=USN-712-1
 
-Risk factor : High";
+Risk factor : Critical";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/ubuntu_713_1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/ubuntu_713_1.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/ubuntu_713_1.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,8 +30,8 @@
  script_id(63308);
  script_cve_id("CVE-2008-5347", "CVE-2008-5348", "CVE-2008-5349", "CVE-2008-5350", "CVE-2008-5351", "CVE-2008-5352", "CVE-2008-5353", "CVE-2008-5354", "CVE-2008-5358", "CVE-2008-5359", "CVE-2008-5360");
  script_version ("$");
- script_tag(name:"cvss_base", value:"10.0");
- script_tag(name:"risk_factor", value:"Critical");
+ script_tag(name:"cvss_base", value:"7.5");
+ script_tag(name:"risk_factor", value:"High");
  name = "Ubuntu USN-713-1 (openjdk-6)";
  script_name(name);
 

Modified: trunk/openvas-plugins/scripts/ubuntu_715_1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/ubuntu_715_1.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/ubuntu_715_1.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,8 +30,8 @@
  script_id(63309);
  script_cve_id("CVE-2008-5079", "CVE-2008-5182", "CVE-2008-5300", "CVE-2008-5395", "CVE-2008-5700", "CVE-2008-5702");
  script_version ("$");
- script_tag(name:"cvss_base", value:"7.2");
- script_tag(name:"risk_factor", value:"High");
+ script_tag(name:"cvss_base", value:"4.9");
+ script_tag(name:"risk_factor", value:"Medium");
  name = "Ubuntu USN-715-1 (linux)";
  script_name(name);
 
@@ -91,7 +91,7 @@
 
 https://secure1.securityspace.com/smysecure/catid.html?in=USN-715-1
 
-Risk factor : High";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/ubuntu_716_1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/ubuntu_716_1.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/ubuntu_716_1.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,7 +30,7 @@
  script_id(63310);
  script_cve_id("CVE-2008-0780", "CVE-2008-0781", "CVE-2008-0782", "CVE-2008-1098", "CVE-2008-1099", "CVE-2009-0260", "CVE-2009-0312");
  script_version ("$");
- script_tag(name:"cvss_base", value:"5.0");
+ script_tag(name:"cvss_base", value:"4.3");
  script_tag(name:"risk_factor", value:"Medium");
  name = "Ubuntu USN-716-1 (moin)";
  script_name(name);
@@ -94,7 +94,7 @@
 
 https://secure1.securityspace.com/smysecure/catid.html?in=USN-716-1
 
-Risk factor : High";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/ubuntu_719_1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/ubuntu_719_1.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/ubuntu_719_1.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,8 +30,8 @@
  script_id(64166);
  script_cve_id("CVE-2009-0360", "CVE-2009-0361", "CVE-2007-3996", "CVE-2007-5900", "CVE-2008-3658", "CVE-2008-3659", "CVE-2008-3660", "CVE-2008-5557", "CVE-2008-5624", "CVE-2008-5625", "CVE-2008-5658", "CVE-2007-5625", "CVE-2007-6420", "CVE-2008-1232", "CVE-2008-1947", "CVE-2008-2364", "CVE-2008-2370", "CVE-2008-2938", "CVE-2008-2939");
  script_version ("$");
- script_tag(name:"cvss_base", value:"10.0");
- script_tag(name:"risk_factor", value:"Critical");
+ script_tag(name:"cvss_base", value:"6.2");
+ script_tag(name:"risk_factor", value:"High");
  name = "Ubuntu USN-719-1 (libpam-krb5)";
  script_name(name);
 

Modified: trunk/openvas-plugins/scripts/ubuntu_720_1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/ubuntu_720_1.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/ubuntu_720_1.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,8 +30,8 @@
  script_id(64167);
  script_cve_id("CVE-2007-3996", "CVE-2007-5900", "CVE-2008-3658", "CVE-2008-3659", "CVE-2008-3660", "CVE-2008-5557", "CVE-2008-5624", "CVE-2008-5625", "CVE-2008-5658", "CVE-2007-5625", "CVE-2007-6420", "CVE-2008-1232", "CVE-2008-1947", "CVE-2008-2364", "CVE-2008-2370", "CVE-2008-2938", "CVE-2008-2939");
  script_version ("$");
- script_tag(name:"cvss_base", value:"10.0");
- script_tag(name:"risk_factor", value:"Critical");
+ script_tag(name:"cvss_base", value:"6.8");
+ script_tag(name:"risk_factor", value:"High");
  name = "Ubuntu USN-720-1 (php5)";
  script_name(name);
 

Modified: trunk/openvas-plugins/scripts/ubuntu_723_1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/ubuntu_723_1.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/ubuntu_723_1.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,8 +30,8 @@
  script_id(64168);
  script_cve_id("CVE-2008-3546", "CVE-2008-5516", "CVE-2008-5517", "CVE-2008-5916", "CVE-2008-3974", "CVE-2009-0318", "CVE-2008-5984", "CVE-2009-0352", "CVE-2009-0353", "CVE-2009-0354", "CVE-2009-0355", "CVE-2009-0356", "CVE-2009-0357", "CVE-2009-0358", "CVE-2009-0316", "CVE-2008-5557", "CVE-2008-5658", "CVE-2008-5624", "CVE-2008-5625", "CVE-2008-5985", "CVE-2009-0544", "CVE-2008-3964", "CVE-2008-5907", "CVE-2009-0040", "CVE-2008-1232", "CVE-2008-1947", "CVE-2008-2370", "CVE-2009-0520", "CVE-2008-4810", "CVE-2008-3663", "CVE-2007-5624", "CVE-2008-1360", "CVE-2007-5803", "CVE-2009-0187", "CVE-2007-3698", "CVE-2007-3922", "CVE-2008-5263", "CVE-2009-0615", "CVE-2009-0616", "CVE-2009-0617", "CVE-2009-0618", "CVE-2009-0620", "CVE-2009-0621", "CVE-2009-0622", "CVE-2009-0623", "CVE-2009-0624", "CVE-2009-0625", "CVE-2009-0490", "CVE-2009-0614", "CVE-2009-0542", "CVE-2009-0543", "CVE-2009-0478");
  script_version ("$");
- script_tag(name:"cvss_base", value:"10.0");
- script_tag(name:"risk_factor", value:"Critical");
+ script_tag(name:"cvss_base", value:"7.5");
+ script_tag(name:"risk_factor", value:"High");
  name = "Ubuntu USN-723-1 (git-core)";
  script_name(name);
 

Modified: trunk/openvas-plugins/scripts/ubuntu_726_1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/ubuntu_726_1.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/ubuntu_726_1.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,8 +30,8 @@
  script_id(63506);
  script_cve_id("CVE-2009-0037", "CVE-2008-5005", "CVE-2009-0365", "CVE-2009-0619", "CVE-2009-0537", "CVE-2009-0775", "CVE-2007-4850", "CVE-2008-5557", "CVE-2009-0754", "CVE-2009-0544");
  script_version ("$");
- script_tag(name:"cvss_base", value:"10.0");
- script_tag(name:"risk_factor", value:"Critical");
+ script_tag(name:"cvss_base", value:"6.8");
+ script_tag(name:"risk_factor", value:"High");
  name = "Ubuntu USN-726-1 (curl)";
  script_name(name);
 

Modified: trunk/openvas-plugins/scripts/ubuntu_726_2.nasl
===================================================================
--- trunk/openvas-plugins/scripts/ubuntu_726_2.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/ubuntu_726_2.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,8 +30,8 @@
  script_id(63508);
  script_cve_id("CVE-2009-0619", "CVE-2009-0537", "CVE-2009-0775", "CVE-2007-4850", "CVE-2008-5557", "CVE-2009-0754", "CVE-2009-0544");
  script_version ("$");
- script_tag(name:"cvss_base", value:"10.0");
- script_tag(name:"risk_factor", value:"Critical");
+ script_tag(name:"cvss_base", value:"7.8");
+ script_tag(name:"risk_factor", value:"High");
  name = "Ubuntu USN-726-2 (curl)";
  script_name(name);
 

Modified: trunk/openvas-plugins/scripts/ubuntu_727_1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/ubuntu_727_1.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/ubuntu_727_1.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,8 +30,8 @@
  script_id(63505);
  script_cve_id("CVE-2009-0365", "CVE-2009-0578", "CVE-2009-0037", "CVE-2008-5005", "CVE-2009-0619", "CVE-2009-0537", "CVE-2009-0775", "CVE-2007-4850", "CVE-2008-5557", "CVE-2009-0754", "CVE-2009-0544");
  script_version ("$");
- script_tag(name:"cvss_base", value:"10.0");
- script_tag(name:"risk_factor", value:"Critical");
+ script_tag(name:"cvss_base", value:"4.6");
+ script_tag(name:"risk_factor", value:"Medium");
  name = "Ubuntu USN-727-1 (network-manager-applet)";
  script_name(name);
 
@@ -68,7 +68,7 @@
 
 https://secure1.securityspace.com/smysecure/catid.html?in=USN-727-1
 
-Risk factor : High";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/ubuntu_727_2.nasl
===================================================================
--- trunk/openvas-plugins/scripts/ubuntu_727_2.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/ubuntu_727_2.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,8 +30,8 @@
  script_id(63507);
  script_cve_id("CVE-2009-0365", "CVE-2009-0619", "CVE-2009-0537", "CVE-2009-0775", "CVE-2007-4850", "CVE-2008-5557", "CVE-2009-0754", "CVE-2009-0544");
  script_version ("$");
- script_tag(name:"cvss_base", value:"10.0");
- script_tag(name:"risk_factor", value:"Critical");
+ script_tag(name:"cvss_base", value:"4.6");
+ script_tag(name:"risk_factor", value:"Medium");
  name = "Ubuntu USN-727-2 (network-manager)";
  script_name(name);
 
@@ -62,7 +62,7 @@
 
 https://secure1.securityspace.com/smysecure/catid.html?in=USN-727-2
 
-Risk factor : High";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/ubuntu_728_1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/ubuntu_728_1.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/ubuntu_728_1.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,8 +30,8 @@
  script_id(63510);
  script_cve_id("CVE-2009-0040", "CVE-2009-0771", "CVE-2009-0772", "CVE-2009-0773", "CVE-2009-0774", "CVE-2009-0775", "CVE-2009-0776", "CVE-2009-0777");
  script_version ("$");
- script_tag(name:"cvss_base", value:"10.0");
- script_tag(name:"risk_factor", value:"Critical");
+ script_tag(name:"cvss_base", value:"6.8");
+ script_tag(name:"risk_factor", value:"High");
  name = "Ubuntu USN-728-1 (xulrunner-1.9)";
  script_name(name);
 

Modified: trunk/openvas-plugins/scripts/ubuntu_730_1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/ubuntu_730_1.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/ubuntu_730_1.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,8 +30,8 @@
  script_id(63513);
  script_cve_id("CVE-2007-5268", "CVE-2007-5269", "CVE-2008-1382", "CVE-2008-3964", "CVE-2008-5907", "CVE-2009-0040");
  script_version ("$");
- script_tag(name:"cvss_base", value:"7.5");
- script_tag(name:"risk_factor", value:"High");
+ script_tag(name:"cvss_base", value:"4.3");
+ script_tag(name:"risk_factor", value:"Medium");
  name = "Ubuntu USN-730-1 (libpng)";
  script_name(name);
 
@@ -84,7 +84,7 @@
 
 https://secure1.securityspace.com/smysecure/catid.html?in=USN-730-1
 
-Risk factor : High";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/ubuntu_731_1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/ubuntu_731_1.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/ubuntu_731_1.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,8 +30,8 @@
  script_id(63562);
  script_cve_id("CVE-2007-6203", "CVE-2007-6420", "CVE-2008-1678", "CVE-2008-2168", "CVE-2008-2364", "CVE-2008-2939", "CVE-2009-0854", "CVE-2009-0675", "CVE-2009-0676", "CVE-2009-0759", "CVE-2009-0660", "CVE-2008-2086", "CVE-2008-5339", "CVE-2008-5340", "CVE-2008-5341", "CVE-2008-5342", "CVE-2008-5343", "CVE-2008-5344", "CVE-2008-5345", "CVE-2008-5347", "CVE-2008-5348", "CVE-2008-5350", "CVE-2008-5351", "CVE-2008-5353", "CVE-2008-5354", "CVE-2008-5356", "CVE-2008-5357", "CVE-2008-5358", "CVE-2008-5359", "CVE-2008-5360", "CVE-2009-0712", "CVE-2009-0713", "CVE-2008-4546", "CVE-2009-0037", "CVE-2009-0632", "CVE-2008-1922", "CVE-2009-0478");
  script_version ("$");
- script_tag(name:"cvss_base", value:"10.0");
- script_tag(name:"risk_factor", value:"Critical");
+ script_tag(name:"cvss_base", value:"4.3");
+ script_tag(name:"risk_factor", value:"Medium");
  name = "Ubuntu USN-731-1 (apache2)";
  script_name(name);
 
@@ -69,7 +69,7 @@
 
 https://secure1.securityspace.com/smysecure/catid.html?in=USN-731-1
 
-Risk factor : High";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/ubuntu_732_1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/ubuntu_732_1.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/ubuntu_732_1.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,8 +30,8 @@
  script_id(63563);
  script_cve_id("CVE-2009-0854", "CVE-2009-0675", "CVE-2009-0676", "CVE-2009-0759", "CVE-2009-0660", "CVE-2008-2086", "CVE-2008-5339", "CVE-2008-5340", "CVE-2008-5341", "CVE-2008-5342", "CVE-2008-5343", "CVE-2008-5344", "CVE-2008-5345", "CVE-2008-5347", "CVE-2008-5348", "CVE-2008-5350", "CVE-2008-5351", "CVE-2008-5353", "CVE-2008-5354", "CVE-2008-5356", "CVE-2008-5357", "CVE-2008-5358", "CVE-2008-5359", "CVE-2008-5360", "CVE-2009-0712", "CVE-2009-0713", "CVE-2008-4546", "CVE-2009-0037", "CVE-2009-0632", "CVE-2008-1922", "CVE-2009-0478");
  script_version ("$");
- script_tag(name:"cvss_base", value:"10.0");
- script_tag(name:"risk_factor", value:"Critical");
+ script_tag(name:"cvss_base", value:"6.9");
+ script_tag(name:"risk_factor", value:"High");
  name = "Ubuntu USN-732-1 (dash)";
  script_name(name);
 

Modified: trunk/openvas-plugins/scripts/ubuntu_734_1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/ubuntu_734_1.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/ubuntu_734_1.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,8 +30,8 @@
  script_id(63617);
  script_cve_id("CVE-2008-4610", "CVE-2008-4866", "CVE-2008-4867", "CVE-2009-0385", "CVE-2009-0587", "CVE-2008-4316");
  script_version ("$");
- script_tag(name:"cvss_base", value:"10.0");
- script_tag(name:"risk_factor", value:"Critical");
+ script_tag(name:"cvss_base", value:"5.0");
+ script_tag(name:"risk_factor", value:"Medium");
  name = "Ubuntu USN-734-1 (ffmpeg-debian)";
  script_name(name);
 
@@ -83,7 +83,7 @@
 
 https://secure1.securityspace.com/smysecure/catid.html?in=USN-734-1
 
-Risk factor : High";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/ubuntu_735_1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/ubuntu_735_1.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/ubuntu_735_1.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,8 +30,8 @@
  script_id(63621);
  script_cve_id("CVE-2009-0586", "CVE-2009-0585", "CVE-2009-0135", "CVE-2009-0136", "CVE-2008-4564", "CVE-2009-0538", "CVE-2004-2761");
  script_version ("$");
- script_tag(name:"cvss_base", value:"9.3");
- script_tag(name:"risk_factor", value:"Critical");
+ script_tag(name:"cvss_base", value:"7.5");
+ script_tag(name:"risk_factor", value:"High");
  name = "Ubuntu USN-735-1 (gst-plugins-base0.10)";
  script_name(name);
 

Modified: trunk/openvas-plugins/scripts/ubuntu_737_1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/ubuntu_737_1.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/ubuntu_737_1.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,8 +30,8 @@
  script_id(63622);
  script_cve_id("CVE-2009-0585", "CVE-2009-0135", "CVE-2009-0136", "CVE-2008-4564", "CVE-2009-0538", "CVE-2004-2761");
  script_version ("$");
- script_tag(name:"cvss_base", value:"9.3");
- script_tag(name:"risk_factor", value:"Critical");
+ script_tag(name:"cvss_base", value:"7.5");
+ script_tag(name:"risk_factor", value:"High");
  name = "Ubuntu USN-737-1 (libsoup)";
  script_name(name);
 

Modified: trunk/openvas-plugins/scripts/ubuntu_742_1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/ubuntu_742_1.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/ubuntu_742_1.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,7 +30,7 @@
  script_id(63698);
  script_cve_id("CVE-2008-3520", "CVE-2008-3521", "CVE-2008-3522", "CVE-2009-0583", "CVE-2009-0584", "CVE-2008-4552", "CVE-2009-0352", "CVE-2009-0772", "CVE-2009-0774", "CVE-2009-0776");
  script_version ("$");
- script_tag(name:"cvss_base", value:"10.0");
+ script_tag(name:"cvss_base", value:"9.3");
  script_tag(name:"risk_factor", value:"Critical");
  name = "Ubuntu USN-742-1 (jasper)";
  script_name(name);
@@ -76,7 +76,7 @@
 
 https://secure1.securityspace.com/smysecure/catid.html?in=USN-742-1
 
-Risk factor : High";
+Risk factor : Critical";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/ubuntu_743_1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/ubuntu_743_1.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/ubuntu_743_1.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,7 +30,7 @@
  script_id(64169);
  script_cve_id("CVE-2009-0583", "CVE-2009-0584", "CVE-2009-0581", "CVE-2009-0723", "CVE-2009-0733", "CVE-2009-0920", "CVE-2009-0921", "CVE-2009-0927", "CVE-2009-0207", "CVE-2009-0928", "CVE-2009-0193", "CVE-2009-0629", "CVE-2009-0626", "CVE-2009-0628", "CVE-2009-0635", "CVE-2009-0633", "CVE-2009-0634", "CVE-2009-0637", "CVE-2009-0784", "CVE-2009-0698", "CVE-2008-5239", "CVE-2008-1036", "CVE-2008-4316", "CVE-2006-2426", "CVE-2009-1093", "CVE-2009-1094", "CVE-2009-1095", "CVE-2009-1096", "CVE-2009-1097", "CVE-2009-1098", "CVE-2009-1100", "CVE-2009-1101", "CVE-2009-1102");
  script_version ("$");
- script_tag(name:"cvss_base", value:"10.0");
+ script_tag(name:"cvss_base", value:"9.3");
  script_tag(name:"risk_factor", value:"Critical");
  name = "Ubuntu USN-743-1 (gs-gpl)";
  script_name(name);
@@ -73,7 +73,7 @@
 
 https://secure1.securityspace.com/smysecure/catid.html?in=USN-743-1
 
-Risk factor : High";
+Risk factor : Critical";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/ubuntu_744_1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/ubuntu_744_1.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/ubuntu_744_1.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,8 +30,8 @@
  script_id(64170);
  script_cve_id("CVE-2009-0581", "CVE-2009-0723", "CVE-2009-0733", "CVE-2009-0920", "CVE-2009-0921", "CVE-2009-0927", "CVE-2009-0207", "CVE-2009-0928", "CVE-2009-0193", "CVE-2009-0629", "CVE-2009-0626", "CVE-2009-0628", "CVE-2009-0635", "CVE-2009-0633", "CVE-2009-0634", "CVE-2009-0637", "CVE-2009-0784", "CVE-2009-0698", "CVE-2008-5239", "CVE-2008-1036", "CVE-2008-4316", "CVE-2006-2426", "CVE-2009-1093", "CVE-2009-1094", "CVE-2009-1095", "CVE-2009-1096", "CVE-2009-1097", "CVE-2009-1098", "CVE-2009-1100", "CVE-2009-1101", "CVE-2009-1102");
  script_version ("$");
- script_tag(name:"cvss_base", value:"10.0");
- script_tag(name:"risk_factor", value:"Critical");
+ script_tag(name:"cvss_base", value:"4.3");
+ script_tag(name:"risk_factor", value:"Medium");
  name = "Ubuntu USN-744-1 (lcms)";
  script_name(name);
 
@@ -80,7 +80,7 @@
 
 https://secure1.securityspace.com/smysecure/catid.html?in=USN-744-1
 
-Risk factor : High";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/ubuntu_746_1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/ubuntu_746_1.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/ubuntu_746_1.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,8 +30,8 @@
  script_id(63746);
  script_cve_id("CVE-2009-0698", "CVE-2008-5239", "CVE-2008-1036", "CVE-2008-4316", "CVE-2006-2426", "CVE-2009-1093", "CVE-2009-1094", "CVE-2009-1095", "CVE-2009-1096", "CVE-2009-1097", "CVE-2009-1098", "CVE-2009-1100", "CVE-2009-1101", "CVE-2009-1102");
  script_version ("$");
- script_tag(name:"cvss_base", value:"10.0");
- script_tag(name:"risk_factor", value:"Critical");
+ script_tag(name:"cvss_base", value:"7.5");
+ script_tag(name:"risk_factor", value:"High");
  name = "Ubuntu USN-746-1 (xine-lib)";
  script_name(name);
 

Modified: trunk/openvas-plugins/scripts/ubuntu_747_1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/ubuntu_747_1.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/ubuntu_747_1.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,8 +30,8 @@
  script_id(63747);
  script_cve_id("CVE-2008-1036", "CVE-2008-4316", "CVE-2006-2426", "CVE-2009-1093", "CVE-2009-1094", "CVE-2009-1095", "CVE-2009-1096", "CVE-2009-1097", "CVE-2009-1098", "CVE-2009-1100", "CVE-2009-1101", "CVE-2009-1102");
  script_version ("$");
- script_tag(name:"cvss_base", value:"10.0");
- script_tag(name:"risk_factor", value:"Critical");
+ script_tag(name:"cvss_base", value:"4.3");
+ script_tag(name:"risk_factor", value:"Medium");
  name = "Ubuntu USN-747-1 (icu)";
  script_name(name);
 
@@ -66,7 +66,7 @@
 
 https://secure1.securityspace.com/smysecure/catid.html?in=USN-747-1
 
-Risk factor : High";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/ubuntu_748_1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/ubuntu_748_1.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/ubuntu_748_1.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,8 +30,8 @@
  script_id(63748);
  script_cve_id("CVE-2006-2426", "CVE-2009-1093", "CVE-2009-1094", "CVE-2009-1095", "CVE-2009-1096", "CVE-2009-1097", "CVE-2009-1098", "CVE-2009-1100", "CVE-2009-1101", "CVE-2009-1102");
  script_version ("$");
- script_tag(name:"cvss_base", value:"10.0");
- script_tag(name:"risk_factor", value:"Critical");
+ script_tag(name:"cvss_base", value:"6.4");
+ script_tag(name:"risk_factor", value:"High");
  name = "Ubuntu USN-748-1 (openjdk-6)";
  script_name(name);
 

Modified: trunk/openvas-plugins/scripts/ubuntu_752_1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/ubuntu_752_1.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/ubuntu_752_1.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,8 +30,8 @@
  script_id(63812);
  script_cve_id("CVE-2008-4307", "CVE-2008-6107", "CVE-2009-0028", "CVE-2009-0029", "CVE-2009-0065", "CVE-2009-0322", "CVE-2009-0675", "CVE-2009-0676", "CVE-2009-0834", "CVE-2009-0835", "CVE-2009-0859");
  script_version ("$");
- script_tag(name:"cvss_base", value:"10.0");
- script_tag(name:"risk_factor", value:"Critical");
+ script_tag(name:"cvss_base", value:"4.0");
+ script_tag(name:"risk_factor", value:"Medium");
  name = "Ubuntu USN-752-1 (linux-source-2.6.15)";
  script_name(name);
 
@@ -83,7 +83,7 @@
 
 https://secure1.securityspace.com/smysecure/catid.html?in=USN-752-1
 
-Risk factor : High";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/ubuntu_753_1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/ubuntu_753_1.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/ubuntu_753_1.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,8 +30,8 @@
  script_id(63811);
  script_cve_id("CVE-2009-0922", "CVE-2008-4307", "CVE-2008-6107", "CVE-2009-0028", "CVE-2009-0029", "CVE-2009-0065", "CVE-2009-0322", "CVE-2009-0675", "CVE-2009-0676", "CVE-2009-0834", "CVE-2009-0835", "CVE-2009-0859");
  script_version ("$");
- script_tag(name:"cvss_base", value:"10.0");
- script_tag(name:"risk_factor", value:"Critical");
+ script_tag(name:"cvss_base", value:"4.0");
+ script_tag(name:"risk_factor", value:"Medium");
  name = "Ubuntu USN-753-1 (postgresql-8.3)";
  script_name(name);
 
@@ -63,7 +63,7 @@
 
 https://secure1.securityspace.com/smysecure/catid.html?in=USN-753-1
 
-Risk factor : High";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/ubuntu_755_1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/ubuntu_755_1.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/ubuntu_755_1.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,8 +30,8 @@
  script_id(63814);
  script_cve_id("CVE-2009-0844", "CVE-2009-0845", "CVE-2009-0846", "CVE-2009-0847");
  script_version ("$");
- script_tag(name:"cvss_base", value:"10.0");
- script_tag(name:"risk_factor", value:"Critical");
+ script_tag(name:"cvss_base", value:"5.8");
+ script_tag(name:"risk_factor", value:"High");
  name = "Ubuntu USN-755-1 (krb5)";
  script_name(name);
 

Modified: trunk/openvas-plugins/scripts/ubuntu_757_1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/ubuntu_757_1.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/ubuntu_757_1.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,8 +30,8 @@
  script_id(63856);
  script_cve_id("CVE-2007-6725", "CVE-2008-6679", "CVE-2009-0196", "CVE-2009-0583", "CVE-2009-0584", "CVE-2009-0792", "CVE-2009-0189", "CVE-2008-5259", "CVE-2009-0190", "CVE-2009-0796", "CVE-2009-1185", "CVE-2009-1186");
  script_version ("$");
- script_tag(name:"cvss_base", value:"9.3");
- script_tag(name:"risk_factor", value:"Critical");
+ script_tag(name:"cvss_base", value:"7.5");
+ script_tag(name:"risk_factor", value:"High");
  name = "Ubuntu USN-757-1 (gs-gpl)";
  script_name(name);
 

Modified: trunk/openvas-plugins/scripts/ubuntu_759_1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/ubuntu_759_1.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/ubuntu_759_1.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,8 +30,8 @@
  script_id(63858);
  script_cve_id("CVE-2009-0146", "CVE-2009-0147", "CVE-2009-0166", "CVE-2009-0799", "CVE-2009-0800", "CVE-2009-1179", "CVE-2009-1180", "CVE-2009-1181", "CVE-2009-1182", "CVE-2009-1183", "CVE-2009-1187", "CVE-2009-1188", "CVE-2009-1210", "CVE-2009-1266", "CVE-2009-1267", "CVE-2009-1268", "CVE-2009-1269", "CVE-2009-0163", "CVE-2009-0164", "CVE-2009-1185", "CVE-2009-1186");
  script_version ("$");
- script_tag(name:"cvss_base", value:"10.0");
- script_tag(name:"risk_factor", value:"Critical");
+ script_tag(name:"cvss_base", value:"4.3");
+ script_tag(name:"risk_factor", value:"Medium");
  name = "Ubuntu USN-759-1 (poppler)";
  script_name(name);
 
@@ -67,7 +67,7 @@
 
 https://secure1.securityspace.com/smysecure/catid.html?in=USN-759-1
 
-Risk factor : High";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/ubuntu_761_1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/ubuntu_761_1.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/ubuntu_761_1.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,8 +30,8 @@
  script_id(63896);
  script_cve_id("CVE-2008-5814", "CVE-2009-0754", "CVE-2009-1271", "CVE-2009-1300");
  script_version ("$");
- script_tag(name:"cvss_base", value:"10.0");
- script_tag(name:"risk_factor", value:"Critical");
+ script_tag(name:"cvss_base", value:"2.6");
+ script_tag(name:"risk_factor", value:"Medium");
  name = "Ubuntu USN-761-1 (php5)";
  script_name(name);
 
@@ -83,7 +83,7 @@
 
 https://secure1.securityspace.com/smysecure/catid.html?in=USN-761-1
 
-Risk factor : High";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/ubuntu_761_2.nasl
===================================================================
--- trunk/openvas-plugins/scripts/ubuntu_761_2.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/ubuntu_761_2.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,8 +30,8 @@
  script_id(64148);
  script_cve_id("CVE-2008-5814", "CVE-2009-1271", "CVE-2009-0798", "CVE-2009-1313");
  script_version ("$");
- script_tag(name:"cvss_base", value:"9.3");
- script_tag(name:"risk_factor", value:"Critical");
+ script_tag(name:"cvss_base", value:"2.6");
+ script_tag(name:"risk_factor", value:"Medium");
  name = "Ubuntu USN-761-2 (php5)";
  script_name(name);
 
@@ -73,7 +73,7 @@
 
 https://secure1.securityspace.com/smysecure/catid.html?in=USN-761-2
 
-Risk factor : High";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/ubuntu_763_1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/ubuntu_763_1.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/ubuntu_763_1.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,8 +30,8 @@
  script_id(64143);
  script_cve_id("CVE-2009-0698", "CVE-2009-1274", "CVE-2009-0991", "CVE-2009-1357", "CVE-2009-1301", "CVE-2009-0664", "CVE-2008-3963", "CVE-2008-2079", "CVE-2008-4097", "CVE-2008-4098", "CVE-2008-4456", "CVE-2009-0652", "CVE-2009-1302", "CVE-2009-1303", "CVE-2009-1304", "CVE-2009-1305", "CVE-2009-1306", "CVE-2009-1307", "CVE-2009-1308", "CVE-2009-1309", "CVE-2009-1310", "CVE-2009-1311", "CVE-2009-1312");
  script_version ("$");
- script_tag(name:"cvss_base", value:"10.0");
- script_tag(name:"risk_factor", value:"Critical");
+ script_tag(name:"cvss_base", value:"7.5");
+ script_tag(name:"risk_factor", value:"High");
  name = "Ubuntu USN-763-1 (xine-lib)";
  script_name(name);
 

Modified: trunk/openvas-plugins/scripts/ubuntu_764_1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/ubuntu_764_1.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/ubuntu_764_1.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,7 +30,7 @@
  script_id(64144);
  script_cve_id("CVE-2009-0652", "CVE-2009-1302", "CVE-2009-1303", "CVE-2009-1304", "CVE-2009-1305", "CVE-2009-1306", "CVE-2009-1307", "CVE-2009-1308", "CVE-2009-1309", "CVE-2009-1310", "CVE-2009-1311", "CVE-2009-1312");
  script_version ("$");
- script_tag(name:"cvss_base", value:"6.8");
+ script_tag(name:"cvss_base", value:"5.8");
  script_tag(name:"risk_factor", value:"High");
  name = "Ubuntu USN-764-1 (xulrunner-1.9)";
  script_name(name);

Modified: trunk/openvas-plugins/scripts/ubuntu_766_1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/ubuntu_766_1.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/ubuntu_766_1.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,8 +30,8 @@
  script_id(64149);
  script_cve_id("CVE-2009-0798", "CVE-2009-1313");
  script_version ("$");
- script_tag(name:"cvss_base", value:"9.3");
- script_tag(name:"risk_factor", value:"Critical");
+ script_tag(name:"cvss_base", value:"5.0");
+ script_tag(name:"risk_factor", value:"Medium");
  name = "Ubuntu USN-766-1 (acpid)";
  script_name(name);
 
@@ -65,7 +65,7 @@
 
 https://secure1.securityspace.com/smysecure/catid.html?in=USN-766-1
 
-Risk factor : High";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/ubuntu_769_1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/ubuntu_769_1.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/ubuntu_769_1.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,8 +30,8 @@
  script_id(64171);
  script_cve_id("CVE-2009-1364", "CVE-2009-0720", "CVE-2008-3545", "CVE-2008-2107", "CVE-2008-2108", "CVE-2008-5557", "CVE-2008-5624", "CVE-2008-5658", "CVE-2008-5814", "CVE-2009-0754", "CVE-2009-1271", "CVE-2009-1469", "CVE-2009-1467");
  script_version ("$");
- script_tag(name:"cvss_base", value:"10.0");
- script_tag(name:"risk_factor", value:"Critical");
+ script_tag(name:"cvss_base", value:"7.5");
+ script_tag(name:"risk_factor", value:"High");
  name = "Ubuntu USN-769-1 (libwmf)";
  script_name(name);
 

Modified: trunk/openvas-plugins/scripts/ubuntu_771_1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/ubuntu_771_1.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/ubuntu_771_1.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,8 +30,8 @@
  script_id(64172);
  script_cve_id("CVE-2009-1438", "CVE-2009-1513", "CVE-2009-0757", "CVE-2009-1194", "CVE-2009-1364", "CVE-2009-0719", "CVE-2009-0652", "CVE-2009-1302", "CVE-2009-1303", "CVE-2009-1304", "CVE-2009-1305", "CVE-2009-1306", "CVE-2009-1307", "CVE-2009-1308", "CVE-2009-1309", "CVE-2009-1311", "CVE-2009-1312", "CVE-2009-1572", "CVE-2009-1482", "CVE-2008-0068", "CVE-2008-1697", "CVE-2008-0928", "CVE-2008-4539", "CVE-2008-1945", "CVE-2009-1464", "CVE-2009-1465", "CVE-2009-1466", "CVE-2009-0042", "CVE-2009-1131", "CVE-2009-0556", "CVE-2009-1130", "CVE-2009-0227", "CVE-2009-0223", "CVE-2009-0220", "CVE-2009-1128");
  script_version ("$");
- script_tag(name:"cvss_base", value:"10.0");
- script_tag(name:"risk_factor", value:"Critical");
+ script_tag(name:"cvss_base", value:"7.5");
+ script_tag(name:"risk_factor", value:"High");
  name = "Ubuntu USN-771-1 (libmodplug)";
  script_name(name);
 

Modified: trunk/openvas-plugins/scripts/ubuntu_772_1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/ubuntu_772_1.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/ubuntu_772_1.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,8 +30,8 @@
  script_id(64173);
  script_cve_id("CVE-2009-0757", "CVE-2009-1194", "CVE-2009-1364", "CVE-2009-0719", "CVE-2009-0652", "CVE-2009-1302", "CVE-2009-1303", "CVE-2009-1304", "CVE-2009-1305", "CVE-2009-1306", "CVE-2009-1307", "CVE-2009-1308", "CVE-2009-1309", "CVE-2009-1311", "CVE-2009-1312", "CVE-2009-1572", "CVE-2009-1482", "CVE-2008-0068", "CVE-2008-1697", "CVE-2008-0928", "CVE-2008-4539", "CVE-2008-1945", "CVE-2009-1464", "CVE-2009-1465", "CVE-2009-1466", "CVE-2009-0042", "CVE-2009-1131", "CVE-2009-0556", "CVE-2009-1130", "CVE-2009-0227", "CVE-2009-0223", "CVE-2009-0220", "CVE-2009-1128");
  script_version ("$");
- script_tag(name:"cvss_base", value:"10.0");
- script_tag(name:"risk_factor", value:"Critical");
+ script_tag(name:"cvss_base", value:"7.5");
+ script_tag(name:"risk_factor", value:"High");
  name = "Ubuntu USN-772-1 (mpfr)";
  script_name(name);
 

Modified: trunk/openvas-plugins/scripts/ubuntu_773_1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/ubuntu_773_1.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/ubuntu_773_1.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,8 +30,8 @@
  script_id(64174);
  script_cve_id("CVE-2009-1194", "CVE-2009-1364", "CVE-2009-0719", "CVE-2009-0652", "CVE-2009-1302", "CVE-2009-1303", "CVE-2009-1304", "CVE-2009-1305", "CVE-2009-1306", "CVE-2009-1307", "CVE-2009-1308", "CVE-2009-1309", "CVE-2009-1311", "CVE-2009-1312", "CVE-2009-1572", "CVE-2009-1482", "CVE-2008-0068", "CVE-2008-1697", "CVE-2008-0928", "CVE-2008-4539", "CVE-2008-1945", "CVE-2009-1464", "CVE-2009-1465", "CVE-2009-1466", "CVE-2009-0042", "CVE-2009-1131", "CVE-2009-0556", "CVE-2009-1130", "CVE-2009-0227", "CVE-2009-0223", "CVE-2009-0220", "CVE-2009-1128");
  script_version ("$");
- script_tag(name:"cvss_base", value:"10.0");
- script_tag(name:"risk_factor", value:"Critical");
+ script_tag(name:"cvss_base", value:"6.8");
+ script_tag(name:"risk_factor", value:"High");
  name = "Ubuntu USN-773-1 (pango1.0)";
  script_name(name);
 

Modified: trunk/openvas-plugins/scripts/ubuntu_774_1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/ubuntu_774_1.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/ubuntu_774_1.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,8 +30,8 @@
  script_id(64151);
  script_cve_id("CVE-2009-1482", "CVE-2008-0068", "CVE-2008-1697", "CVE-2008-0928", "CVE-2008-4539", "CVE-2008-1945", "CVE-2009-1464", "CVE-2009-1465", "CVE-2009-1466", "CVE-2009-0042", "CVE-2009-1131", "CVE-2009-0556", "CVE-2009-1130", "CVE-2009-0227", "CVE-2009-0223", "CVE-2009-0220", "CVE-2009-1128", "CVE-2009-1572");
  script_version ("$");
- script_tag(name:"cvss_base", value:"10.0");
- script_tag(name:"risk_factor", value:"Critical");
+ script_tag(name:"cvss_base", value:"4.3");
+ script_tag(name:"risk_factor", value:"Medium");
  name = "Ubuntu USN-774-1 (moin)";
  script_name(name);
 
@@ -62,7 +62,7 @@
 
 https://secure1.securityspace.com/smysecure/catid.html?in=USN-774-1
 
-Risk factor : High";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/ubuntu_776_1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/ubuntu_776_1.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/ubuntu_776_1.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,8 +30,8 @@
  script_id(63998);
  script_cve_id("CVE-2008-1945", "CVE-2008-2004", "CVE-2008-2382", "CVE-2008-4539", "CVE-2008-5714");
  script_version ("$");
- script_tag(name:"cvss_base", value:"7.8");
- script_tag(name:"risk_factor", value:"High");
+ script_tag(name:"cvss_base", value:"4.9");
+ script_tag(name:"risk_factor", value:"Medium");
  name = "Ubuntu USN-776-1 (kvm)";
  script_name(name);
 
@@ -74,7 +74,7 @@
 
 https://secure1.securityspace.com/smysecure/catid.html?in=USN-776-1
 
-Risk factor : High";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/ubuntu_776_2.nasl
===================================================================
--- trunk/openvas-plugins/scripts/ubuntu_776_2.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/ubuntu_776_2.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,8 +30,8 @@
  script_id(64175);
  script_cve_id("CVE-2008-1945", "CVE-2008-2004", "CVE-2008-2382", "CVE-2008-4539", "CVE-2008-5714", "CVE-2009-1130", "CVE-2009-1574", "CVE-2009-0714", "CVE-2008-1517", "CVE-2007-2807", "CVE-2009-0159", "CVE-2009-1252", "CVE-2009-1578", "CVE-2009-1579", "CVE-2009-1580", "CVE-2009-1581", "CVE-2009-1418", "CVE-2009-0028", "CVE-2009-0269", "CVE-2009-0342", "CVE-2009-0343", "CVE-2009-0834", "CVE-2009-0835", "CVE-2009-1184", "CVE-2009-1415", "CVE-2009-1416", "CVE-2009-1417", "CVE-2009-0154", "CVE-2009-1150", "CVE-2009-1151", "CVE-2009-0922", "CVE-2009-1632", "CVE-2009-0945", "CVE-2009-0688", "CVE-2009-1527", "CVE-2009-1338", "CVE-2009-1242", "CVE-2009-1192", "CVE-2009-1439", "CVE-2009-1337", "CVE-2009-0157", "CVE-2008-5077", "CVE-2008-5814", "CVE-2009-0721", "CVE-2009-0859", "CVE-2009-1046", "CVE-2009-1072", "CVE-2009-1265", "CVE-2009-1011", "CVE-2009-1010", "CVE-2009-1009", "CVE-2009-1161");
  script_version ("$");
- script_tag(name:"cvss_base", value:"10.0");
- script_tag(name:"risk_factor", value:"Critical");
+ script_tag(name:"cvss_base", value:"4.9");
+ script_tag(name:"risk_factor", value:"Medium");
  name = "Ubuntu USN-776-2 (kvm)";
  script_name(name);
 
@@ -78,7 +78,7 @@
 
 https://secure1.securityspace.com/smysecure/catid.html?in=USN-776-2
 
-Risk factor : High";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/ubuntu_781_1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/ubuntu_781_1.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/ubuntu_781_1.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,8 +30,8 @@
  script_id(64177);
  script_cve_id("CVE-2009-1373", "CVE-2009-1374", "CVE-2009-1375", "CVE-2009-1376");
  script_version ("$");
- script_tag(name:"cvss_base", value:"9.3");
- script_tag(name:"risk_factor", value:"Critical");
+ script_tag(name:"cvss_base", value:"7.1");
+ script_tag(name:"risk_factor", value:"High");
  name = "Ubuntu USN-781-1 (pidgin)";
  script_name(name);
 

Modified: trunk/openvas-plugins/scripts/ubuntu_781_2.nasl
===================================================================
--- trunk/openvas-plugins/scripts/ubuntu_781_2.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/ubuntu_781_2.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,8 +30,8 @@
  script_id(64176);
  script_cve_id("CVE-2009-1373", "CVE-2009-1376");
  script_version ("$");
- script_tag(name:"cvss_base", value:"9.3");
- script_tag(name:"risk_factor", value:"Critical");
+ script_tag(name:"cvss_base", value:"7.1");
+ script_tag(name:"risk_factor", value:"High");
  name = "Ubuntu USN-781-2 (gaim)";
  script_name(name);
 

Modified: trunk/openvas-plugins/scripts/ubuntu_782_1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/ubuntu_782_1.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/ubuntu_782_1.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,8 +30,8 @@
  script_id(64324);
  script_cve_id("CVE-2009-1303", "CVE-2009-1305", "CVE-2009-1306", "CVE-2009-1307", "CVE-2009-1308", "CVE-2009-1309", "CVE-2009-1392", "CVE-2009-1833", "CVE-2009-1836", "CVE-2009-1838", "CVE-2009-1841");
  script_version ("$");
- script_tag(name:"cvss_base", value:"9.3");
- script_tag(name:"risk_factor", value:"Critical");
+ script_tag(name:"cvss_base", value:"5.0");
+ script_tag(name:"risk_factor", value:"Medium");
  name = "Ubuntu USN-782-1 (thunderbird)";
  script_name(name);
 
@@ -90,7 +90,7 @@
 
 https://secure1.securityspace.com/smysecure/catid.html?in=USN-782-1
 
-Risk factor : High";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/ubuntu_785_1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/ubuntu_785_1.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/ubuntu_785_1.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,8 +30,8 @@
  script_id(64198);
  script_cve_id("CVE-2009-1574", "CVE-2009-1632", "CVE-2009-0558", "CVE-2009-0561", "CVE-2009-1151", "CVE-2009-2011", "CVE-2009-1140", "CVE-2007-3091", "CVE-2008-2321", "CVE-2009-1684");
  script_version ("$");
- script_tag(name:"cvss_base", value:"9.3");
- script_tag(name:"risk_factor", value:"Critical");
+ script_tag(name:"cvss_base", value:"5.0");
+ script_tag(name:"risk_factor", value:"Medium");
  name = "Ubuntu USN-785-1 (ipsec-tools)";
  script_name(name);
 
@@ -71,7 +71,7 @@
 
 https://secure1.securityspace.com/smysecure/catid.html?in=USN-785-1
 
-Risk factor : High";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/ubuntu_786_1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/ubuntu_786_1.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/ubuntu_786_1.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,8 +30,8 @@
  script_id(64200);
  script_cve_id("CVE-2009-0023", "CVE-2009-1955", "CVE-2009-1956");
  script_version ("$");
- script_tag(name:"cvss_base", value:"7.8");
- script_tag(name:"risk_factor", value:"High");
+ script_tag(name:"cvss_base", value:"4.3");
+ script_tag(name:"risk_factor", value:"Medium");
  name = "Ubuntu USN-786-1 (apr-util)";
  script_name(name);
 
@@ -74,7 +74,7 @@
 
 https://secure1.securityspace.com/smysecure/catid.html?in=USN-786-1
 
-Risk factor : High";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/ubuntu_787_1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/ubuntu_787_1.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/ubuntu_787_1.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,8 +30,8 @@
  script_id(64201);
  script_cve_id("CVE-2009-0023", "CVE-2009-1191", "CVE-2009-1195", "CVE-2009-1955", "CVE-2009-1956");
  script_version ("$");
- script_tag(name:"cvss_base", value:"7.8");
- script_tag(name:"risk_factor", value:"High");
+ script_tag(name:"cvss_base", value:"4.3");
+ script_tag(name:"risk_factor", value:"Medium");
  name = "Ubuntu USN-787-1 (apache2)";
  script_name(name);
 
@@ -104,7 +104,7 @@
 
 https://secure1.securityspace.com/smysecure/catid.html?in=USN-787-1
 
-Risk factor : High";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/ubuntu_789_1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/ubuntu_789_1.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/ubuntu_789_1.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,7 +30,7 @@
  script_id(64318);
  script_cve_id("CVE-2009-1932", "CVE-2008-5515", "CVE-2009-0033", "CVE-2009-0580", "CVE-2009-0781", "CVE-2009-0783", "CVE-2009-1440", "CVE-2009-1201", "CVE-2009-1202", "CVE-2009-1203", "CVE-2009-1760", "CVE-2009-1163", "CVE-2009-2045", "CVE-2009-2046", "CVE-2009-0688");
  script_version ("$");
- script_tag(name:"cvss_base", value:"7.8");
+ script_tag(name:"cvss_base", value:"6.8");
  script_tag(name:"risk_factor", value:"High");
  name = "Ubuntu USN-789-1 (gst-plugins-good0.10)";
  script_name(name);

Modified: trunk/openvas-plugins/scripts/ubuntu_791_1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/ubuntu_791_1.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/ubuntu_791_1.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,8 +30,8 @@
  script_id(64320);
  script_cve_id("CVE-2007-3215", "CVE-2008-4796", "CVE-2008-4810", "CVE-2008-4811", "CVE-2008-5153", "CVE-2008-5432", "CVE-2008-5619", "CVE-2008-6124", "CVE-2009-0499", "CVE-2009-0500", "CVE-2009-0501", "CVE-2009-0502", "CVE-2009-1171", "CVE-2009-1669");
  script_version ("$");
- script_tag(name:"cvss_base", value:"10.0");
- script_tag(name:"risk_factor", value:"Critical");
+ script_tag(name:"cvss_base", value:"6.8");
+ script_tag(name:"risk_factor", value:"High");
  name = "Ubuntu USN-791-1 (moodle)";
  script_name(name);
 

Modified: trunk/openvas-plugins/scripts/ubuntu_792_1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/ubuntu_792_1.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/ubuntu_792_1.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,8 +30,8 @@
  script_id(64323);
  script_cve_id("CVE-2009-1377", "CVE-2009-1378", "CVE-2009-1379", "CVE-2009-1386", "CVE-2009-1387", "CVE-2009-1628", "CVE-2009-1886", "CVE-2009-1888", "CVE-2009-1394", "CVE-2009-1150", "CVE-2009-1151", "CVE-2009-1303", "CVE-2009-1305", "CVE-2009-1306", "CVE-2009-1307", "CVE-2009-1308", "CVE-2009-1309", "CVE-2009-1392", "CVE-2009-1833", "CVE-2009-1836", "CVE-2009-1838", "CVE-2009-1841");
  script_version ("$");
- script_tag(name:"cvss_base", value:"10.0");
- script_tag(name:"risk_factor", value:"Critical");
+ script_tag(name:"cvss_base", value:"5.0");
+ script_tag(name:"risk_factor", value:"Medium");
  name = "Ubuntu USN-792-1 (openssl)";
  script_name(name);
 
@@ -85,7 +85,7 @@
 
 https://secure1.securityspace.com/smysecure/catid.html?in=USN-792-1
 
-Risk factor : High";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/ubuntu_799_1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/ubuntu_799_1.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/ubuntu_799_1.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,8 +30,8 @@
  script_id(64441);
  script_cve_id("CVE-2009-1189", "CVE-2009-2347", "CVE-2009-1890", "CVE-2009-1891", "CVE-2008-2327", "CVE-2009-2285", "CVE-2009-2295", "CVE-2009-0858", "CVE-2009-2334", "CVE-2009-2335", "CVE-2009-2336", "CVE-2008-0196", "CVE-2009-2360", "CVE-2009-0040", "CVE-2009-0352", "CVE-2009-0353", "CVE-2009-0652", "CVE-2009-0771", "CVE-2009-0772", "CVE-2009-0773", "CVE-2009-0774", "CVE-2009-0776", "CVE-2009-1302", "CVE-2009-1303", "CVE-2009-1307", "CVE-2009-1832", "CVE-2009-1392", "CVE-2009-1836", "CVE-2009-1838", "CVE-2009-1841", "CVE-2009-1185", "CVE-2009-0034", "CVE-2009-0037", "CVE-2009-1422", "CVE-2009-1423", "CVE-2009-1424", "CVE-2009-1425", "CVE-2009-1959");
  script_version ("$");
- script_tag(name:"cvss_base", value:"10.0");
- script_tag(name:"risk_factor", value:"Critical");
+ script_tag(name:"cvss_base", value:"3.6");
+ script_tag(name:"risk_factor", value:"Medium");
  name = "Ubuntu USN-799-1 (dbus)";
  script_name(name);
 
@@ -65,7 +65,7 @@
 
 https://secure1.securityspace.com/smysecure/catid.html?in=USN-799-1
 
-Risk factor : High";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/ubuntu_801_1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/ubuntu_801_1.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/ubuntu_801_1.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,7 +30,7 @@
  script_id(64442);
  script_cve_id("CVE-2009-2347", "CVE-2009-1890", "CVE-2009-1891", "CVE-2008-2327", "CVE-2009-2285", "CVE-2009-2295", "CVE-2009-0858", "CVE-2009-2334", "CVE-2009-2335", "CVE-2009-2336", "CVE-2008-0196", "CVE-2009-2360", "CVE-2009-0040", "CVE-2009-0352", "CVE-2009-0353", "CVE-2009-0652", "CVE-2009-0771", "CVE-2009-0772", "CVE-2009-0773", "CVE-2009-0774", "CVE-2009-0776", "CVE-2009-1302", "CVE-2009-1303", "CVE-2009-1307", "CVE-2009-1832", "CVE-2009-1392", "CVE-2009-1836", "CVE-2009-1838", "CVE-2009-1841", "CVE-2009-1185", "CVE-2009-0034", "CVE-2009-0037", "CVE-2009-1422", "CVE-2009-1423", "CVE-2009-1424", "CVE-2009-1425", "CVE-2009-1959");
  script_version ("$");
- script_tag(name:"cvss_base", value:"10.0");
+ script_tag(name:"cvss_base", value:"9.3");
  script_tag(name:"risk_factor", value:"Critical");
  name = "Ubuntu USN-801-1 (tiff)";
  script_name(name);
@@ -66,7 +66,7 @@
 
 https://secure1.securityspace.com/smysecure/catid.html?in=USN-801-1
 
-Risk factor : High";
+Risk factor : Critical";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/ubuntu_802_1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/ubuntu_802_1.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/ubuntu_802_1.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,8 +30,8 @@
  script_id(64443);
  script_cve_id("CVE-2009-1890", "CVE-2009-1891", "CVE-2008-2327", "CVE-2009-2285", "CVE-2009-2347", "CVE-2009-2295", "CVE-2009-0858", "CVE-2009-2334", "CVE-2009-2335", "CVE-2009-2336", "CVE-2008-0196", "CVE-2009-2360", "CVE-2009-0040", "CVE-2009-0352", "CVE-2009-0353", "CVE-2009-0652", "CVE-2009-0771", "CVE-2009-0772", "CVE-2009-0773", "CVE-2009-0774", "CVE-2009-0776", "CVE-2009-1302", "CVE-2009-1303", "CVE-2009-1307", "CVE-2009-1832", "CVE-2009-1392", "CVE-2009-1836", "CVE-2009-1838", "CVE-2009-1841", "CVE-2009-1185", "CVE-2009-0034", "CVE-2009-0037", "CVE-2009-1422", "CVE-2009-1423", "CVE-2009-1424", "CVE-2009-1425", "CVE-2009-1959");
  script_version ("$");
- script_tag(name:"cvss_base", value:"10.0");
- script_tag(name:"risk_factor", value:"Critical");
+ script_tag(name:"cvss_base", value:"7.1");
+ script_tag(name:"risk_factor", value:"High");
  name = "Ubuntu USN-802-1 (apache2)";
  script_name(name);
 

Modified: trunk/openvas-plugins/scripts/ubuntu_802_2.nasl
===================================================================
--- trunk/openvas-plugins/scripts/ubuntu_802_2.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/ubuntu_802_2.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,8 +30,8 @@
  script_id(64774);
  script_cve_id("CVE-2009-1891", "CVE-2009-1890");
  script_version ("$");
- script_tag(name:"cvss_base", value:"5.0");
- script_tag(name:"risk_factor", value:"Medium");
+ script_tag(name:"cvss_base", value:"7.1");
+ script_tag(name:"risk_factor", value:"High");
  script_name("Ubuntu USN-802-2 (apache2)");
 
  desc = "The remote host is missing an update to apache2

Modified: trunk/openvas-plugins/scripts/ubuntu_805_1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/ubuntu_805_1.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/ubuntu_805_1.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,8 +30,8 @@
  script_id(64486);
  script_cve_id("CVE-2009-0642", "CVE-2009-1904", "CVE-2009-1892", "CVE-2009-1391", "CVE-2009-1189", "CVE-2007-0062", "CVE-2008-5616", "CVE-2009-0159", "CVE-2009-1252", "CVE-2009-2462", "CVE-2009-2463", "CVE-2009-2464", "CVE-2009-2465", "CVE-2009-2466", "CVE-2009-2467", "CVE-2009-2469", "CVE-2009-2472");
  script_version ("$");
- script_tag(name:"cvss_base", value:"10.0");
- script_tag(name:"risk_factor", value:"Critical");
+ script_tag(name:"cvss_base", value:"6.8");
+ script_tag(name:"risk_factor", value:"High");
  script_name("Ubuntu USN-805-1 (ruby1.9)");
 
  desc = "The remote host is missing an update to ruby1.9

Modified: trunk/openvas-plugins/scripts/ubuntu_806_1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/ubuntu_806_1.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/ubuntu_806_1.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,8 +30,8 @@
  script_id(64488);
  script_cve_id("CVE-2008-4864", "CVE-2008-5031");
  script_version ("$");
- script_tag(name:"cvss_base", value:"10.0");
- script_tag(name:"risk_factor", value:"Critical");
+ script_tag(name:"cvss_base", value:"7.5");
+ script_tag(name:"risk_factor", value:"High");
  script_name("Ubuntu USN-806-1 (python2.5)");
 
  desc = "The remote host is missing an update to python2.5

Modified: trunk/openvas-plugins/scripts/ubuntu_809_1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/ubuntu_809_1.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/ubuntu_809_1.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,7 +30,7 @@
  script_id(64775);
  script_cve_id("CVE-2009-2409", "CVE-2009-2730", "CVE-2008-4989");
  script_version ("$");
- script_tag(name:"cvss_base", value:"7.5");
+ script_tag(name:"cvss_base", value:"5.1");
  script_tag(name:"risk_factor", value:"High");
  script_name("Ubuntu USN-809-1 (gnutls26)");
 

Modified: trunk/openvas-plugins/scripts/ubuntu_814_1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/ubuntu_814_1.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/ubuntu_814_1.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,8 +30,8 @@
  script_id(64654);
  script_cve_id("CVE-2009-0217", "CVE-2009-2475", "CVE-2009-2476", "CVE-2009-2625", "CVE-2009-2670", "CVE-2009-2671", "CVE-2009-2672", "CVE-2009-2673", "CVE-2009-2674", "CVE-2009-2675", "CVE-2009-2676", "CVE-2009-2690", "CVE-2009-2689");
  script_version ("$Revision$");
- script_tag(name:"cvss_base", value:"10.0");
- script_tag(name:"risk_factor", value:"Critical");
+ script_tag(name:"cvss_base", value:"5.0");
+ script_tag(name:"risk_factor", value:"Medium");
  script_name("Ubuntu USN-814-1 (openjdk-6)");
 
  desc = "The remote host is missing an update to openjdk-6
@@ -93,7 +93,7 @@
 
 https://secure1.securityspace.com/smysecure/catid.html?in=USN-814-1
 
-Risk factor : High";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/ubuntu_825_1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/ubuntu_825_1.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/ubuntu_825_1.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,8 +30,8 @@
  script_id(64781);
  script_cve_id("CVE-2008-1420", "CVE-2009-2663");
  script_version ("$");
- script_tag(name:"cvss_base", value:"9.3");
- script_tag(name:"risk_factor", value:"Critical");
+ script_tag(name:"cvss_base", value:"6.8");
+ script_tag(name:"risk_factor", value:"High");
  script_name("Ubuntu USN-825-1 (libvorbis)");
 
  desc = "The remote host is missing an update to libvorbis

Modified: trunk/openvas-plugins/scripts/ubuntu_826_1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/ubuntu_826_1.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/ubuntu_826_1.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,7 +30,7 @@
  script_id(64782);
  script_cve_id("CVE-2008-3422", "CVE-2008-3906", "CVE-2009-0217");
  script_version ("$");
- script_tag(name:"cvss_base", value:"5.0");
+ script_tag(name:"cvss_base", value:"4.3");
  script_tag(name:"risk_factor", value:"Medium");
  script_name("Ubuntu USN-826-1 (mono)");
 
@@ -87,7 +87,7 @@
 
 https://secure1.securityspace.com/smysecure/catid.html?in=USN-826-1
 
-Risk factor : High";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/ubuntu_830_1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/ubuntu_830_1.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/ubuntu_830_1.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,7 +30,7 @@
  script_id(64892);
  script_cve_id("CVE-2009-2409");
  script_version ("$");
- script_tag(name:"cvss_base", value:"6.4");
+ script_tag(name:"cvss_base", value:"5.1");
  script_tag(name:"risk_factor", value:"High");
  script_name("Ubuntu USN-830-1 (openssl)");
 

Modified: trunk/openvas-plugins/scripts/ubuntu_834_1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/ubuntu_834_1.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/ubuntu_834_1.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,8 +30,8 @@
  script_id(64982);
  script_cve_id("CVE-2009-3229", "CVE-2009-3230", "CVE-2009-3231", "CVE-2007-6600");
  script_version ("$");
- script_tag(name:"cvss_base", value:"6.8");
- script_tag(name:"risk_factor", value:"High");
+ script_tag(name:"cvss_base", value:"4.0");
+ script_tag(name:"risk_factor", value:"Medium");
  script_name("Ubuntu USN-834-1 (postgresql-8.3)");
 
  desc = "The remote host is missing an update to postgresql-8.3
@@ -76,7 +76,7 @@
 
 https://secure1.securityspace.com/smysecure/catid.html?in=USN-834-1
 
-Risk factor : High";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/ubuntu_838_1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/ubuntu_838_1.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/ubuntu_838_1.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,7 +30,7 @@
  script_id(65010);
  script_cve_id("CVE-2008-4577", "CVE-2008-5301", "CVE-2009-2632", "CVE-2009-3235");
  script_version ("$");
- script_tag(name:"cvss_base", value:"7.5");
+ script_tag(name:"cvss_base", value:"6.4");
  script_tag(name:"risk_factor", value:"High");
  script_name("Ubuntu USN-838-1 (dovecot)");
 

Modified: trunk/openvas-plugins/scripts/ubuntu_848_1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/ubuntu_848_1.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/ubuntu_848_1.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,7 +30,7 @@
  script_id(66062);
  script_cve_id("CVE-2009-0668", "CVE-2009-0669");
  script_version ("$Revision$");
- script_tag(name:"cvss_base", value:"7.5");
+ script_tag(name:"cvss_base", value:"6.5");
  script_tag(name:"risk_factor", value:"High");
  script_name("Ubuntu USN-848-1 (zope3)");
 

Modified: trunk/openvas-plugins/scripts/ubuntu_850_1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/ubuntu_850_1.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/ubuntu_850_1.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,8 +30,8 @@
  script_id(66111);
  script_cve_id("CVE-2009-0755", "CVE-2009-3603", "CVE-2009-3604", "CVE-2009-3605", "CVE-2009-3607", "CVE-2009-3608", "CVE-2009-3609");
  script_version ("$Revision$");
- script_tag(name:"cvss_base", value:"9.3");
- script_tag(name:"risk_factor", value:"Critical");
+ script_tag(name:"cvss_base", value:"5.0");
+ script_tag(name:"risk_factor", value:"Medium");
  script_name("Ubuntu USN-850-1 (poppler)");
 
  desc = "The remote host is missing an update to poppler
@@ -70,7 +70,7 @@
 
 https://secure1.securityspace.com/smysecure/catid.html?in=USN-850-1
 
-Risk factor : High";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/ubuntu_851_1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/ubuntu_851_1.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/ubuntu_851_1.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,7 +30,7 @@
  script_id(66112);
  script_cve_id("CVE-2006-5925", "CVE-2008-7224");
  script_version ("$Revision$");
- script_tag(name:"cvss_base", value:"7.8");
+ script_tag(name:"cvss_base", value:"7.5");
  script_tag(name:"risk_factor", value:"High");
  script_name("Ubuntu USN-851-1 (elinks)");
 

Modified: trunk/openvas-plugins/scripts/ubuntu_854_1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/ubuntu_854_1.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/ubuntu_854_1.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,8 +30,8 @@
  script_id(66306);
  script_cve_id("CVE-2007-3475", "CVE-2007-3476", "CVE-2007-3477", "CVE-2009-3293", "CVE-2009-3546");
  script_version ("$Revision$");
- script_tag(name:"cvss_base", value:"7.5");
- script_tag(name:"risk_factor", value:"High");
+ script_tag(name:"cvss_base", value:"4.3");
+ script_tag(name:"risk_factor", value:"Medium");
  script_name("Ubuntu USN-854-1 (libgd2)");
 
  desc = "The remote host is missing an update to libgd2
@@ -91,7 +91,7 @@
 
 https://secure1.securityspace.com/smysecure/catid.html?in=USN-854-1
 
-Risk factor : High";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/ubuntu_861_1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/ubuntu_861_1.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/ubuntu_861_1.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,8 +30,8 @@
  script_id(66337);
  script_cve_id("CVE-2008-2009", "CVE-2009-3379");
  script_version ("$Revision$");
- script_tag(name:"cvss_base", value:"10.0");
- script_tag(name:"risk_factor", value:"Critical");
+ script_tag(name:"cvss_base", value:"4.3");
+ script_tag(name:"risk_factor", value:"Medium");
  script_name("Ubuntu USN-861-1 (libvorbis)");
 
  desc = "The remote host is missing an update to libvorbis
@@ -71,7 +71,7 @@
 
 https://secure1.securityspace.com/smysecure/catid.html?in=USN-861-1
 
-Risk factor : High";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/ubuntu_862_1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/ubuntu_862_1.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/ubuntu_862_1.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,7 +30,7 @@
  script_id(66338);
  script_cve_id("CVE-2008-7068", "CVE-2009-3291", "CVE-2009-3292", "CVE-2009-3557", "CVE-2009-3558", "CVE-2009-4017", "CVE-2009-4018");
  script_version ("$Revision$");
- script_tag(name:"cvss_base", value:"7.5");
+ script_tag(name:"cvss_base", value:"6.4");
  script_tag(name:"risk_factor", value:"High");
  script_name("Ubuntu USN-862-1 (php5)");
 

Modified: trunk/openvas-plugins/scripts/ubuntu_865_1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/ubuntu_865_1.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/ubuntu_865_1.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,7 +30,7 @@
  script_id(66463);
  script_cve_id("CVE-2009-4022");
  script_version ("$Revision$");
- script_tag(name:"cvss_base", value:"4.0");
+ script_tag(name:"cvss_base", value:"2.6");
  script_tag(name:"risk_factor", value:"Medium");
  script_name("Ubuntu USN-865-1 (bind9)");
 
@@ -68,7 +68,7 @@
 
 https://secure1.securityspace.com/smysecure/catid.html?in=USN-865-1
 
-Risk factor : High";
+Risk factor : Medium";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/ubuntu_875_1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/ubuntu_875_1.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/ubuntu_875_1.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,7 +30,7 @@
  script_id(66604);
  script_cve_id("CVE-2008-4192", "CVE-2008-4579", "CVE-2008-4580", "CVE-2008-6552", "CVE-2008-6560");
  script_version ("$Revision$");
- script_tag(name:"cvss_base", value:"7.8");
+ script_tag(name:"cvss_base", value:"6.9");
  script_tag(name:"risk_factor", value:"High");
  script_name("Ubuntu USN-875-1 (redhat-cluster-suite)");
 

Modified: trunk/openvas-plugins/scripts/upd_xss_sql_injection.nasl
===================================================================
--- trunk/openvas-plugins/scripts/upd_xss_sql_injection.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/upd_xss_sql_injection.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,7 +30,7 @@
  script_cve_id("CVE-2005-1614", "CVE-2005-1615");
  script_bugtraq_id(13621, 13622);
  script_version ("$Revision$");
- script_tag(name:"cvss_base", value:"7.5");
+ script_tag(name:"cvss_base", value:"6.8");
  script_tag(name:"risk_factor", value:"High");
  
  name = "Ultimate PHP Board ViewForum.PHP SQL injection and XSS flaws";

Modified: trunk/openvas-plugins/scripts/uploadskrip.nasl
===================================================================
--- trunk/openvas-plugins/scripts/uploadskrip.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/uploadskrip.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -26,7 +26,7 @@
 {
  script_id(11746);
  script_version ("$Revision$");
- script_tag(name:"cvss_base", value:"7.0");
+ script_tag(name:"cvss_base", value:"6.4");
  script_tag(name:"risk_factor", value:"High");
  script_cve_id("CVE-2001-0938");
  script_bugtraq_id(3608);

Modified: trunk/openvas-plugins/scripts/ventrilo_dos.nasl
===================================================================
--- trunk/openvas-plugins/scripts/ventrilo_dos.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/ventrilo_dos.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -50,7 +50,7 @@
 {
  script_id(19757);
  script_version ("$Revision$");
- script_tag(name:"cvss_base", value:"4.0");
+ script_tag(name:"cvss_base", value:"5.0");
  script_tag(name:"risk_factor", value:"Medium");
  script_bugtraq_id(14644);
  script_cve_id("CVE-2005-2719");

Modified: trunk/openvas-plugins/scripts/viewvc_37518.nasl
===================================================================
--- trunk/openvas-plugins/scripts/viewvc_37518.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/viewvc_37518.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -33,8 +33,8 @@
  script_cve_id("CVE-2010-0004", "CVE-2010-0005");
  script_bugtraq_id(37518);
  script_version ("1.0-$Revision$");
- script_tag(name:"cvss_base", value:"7.5");
- script_tag(name:"risk_factor", value:"High");
+ script_tag(name:"cvss_base", value:"5.0");
+ script_tag(name:"risk_factor", value:"Medium");
  
 
  script_name("ViewVC Versions Prior to 1.1.3 Multiple Remote Vulnerabilities");

Modified: trunk/openvas-plugins/scripts/visnetic_mailserver_flaws.nasl
===================================================================
--- trunk/openvas-plugins/scripts/visnetic_mailserver_flaws.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/visnetic_mailserver_flaws.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -28,7 +28,7 @@
 {
  script_id(20346);
  script_version ("$Revision$");
- script_tag(name:"cvss_base", value:"7.0");
+ script_tag(name:"cvss_base", value:"7.5");
  script_tag(name:"risk_factor", value:"High");
 
  script_cve_id("CVE-2005-4556", "CVE-2005-4557", "CVE-2005-4558", "CVE-2005-4559");

Modified: trunk/openvas-plugins/scripts/vtiger_flaws.nasl
===================================================================
--- trunk/openvas-plugins/scripts/vtiger_flaws.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/vtiger_flaws.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -29,8 +29,8 @@
 script_cve_id("CVE-2005-3818", "CVE-2005-3819", "CVE-2005-3820", "CVE-2005-3821", "CVE-2005-3822", "CVE-2005-3823", "CVE-2005-3824");
 script_bugtraq_id(15562, 15569);
 script_version("$Revision$");
-script_tag(name:"cvss_base", value:"7.0");
-script_tag(name:"risk_factor", value:"High");
+script_tag(name:"cvss_base", value:"4.3");
+script_tag(name:"risk_factor", value:"Medium");
 
 name = "vTiger multiple flaw";
 script_name(name);

Modified: trunk/openvas-plugins/scripts/webgui_remote_cmd_exec.nasl
===================================================================
--- trunk/openvas-plugins/scripts/webgui_remote_cmd_exec.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/webgui_remote_cmd_exec.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -55,7 +55,7 @@
 if (description) {
 script_id(20014);
 script_version("$Revision$");
- script_tag(name:"cvss_base", value:"7.0");
+ script_tag(name:"cvss_base", value:"7.5");
  script_tag(name:"risk_factor", value:"High");
 script_cve_id("CVE-2005-4694");
 script_bugtraq_id(15083);

Modified: trunk/openvas-plugins/scripts/webnews.nasl
===================================================================
--- trunk/openvas-plugins/scripts/webnews.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/webnews.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -27,8 +27,8 @@
  script_id(11732);
  script_bugtraq_id(4124);
  script_version ("$Revision$");
- script_tag(name:"cvss_base", value:"4.0");
- script_tag(name:"risk_factor", value:"Medium");
+ script_tag(name:"cvss_base", value:"7.5");
+ script_tag(name:"risk_factor", value:"High");
  script_cve_id("CVE-2002-0290");
  
  

Modified: trunk/openvas-plugins/scripts/webspirs_cgi.nasl
===================================================================
--- trunk/openvas-plugins/scripts/webspirs_cgi.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/webspirs_cgi.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -56,7 +56,7 @@
  script_id(10616);
  script_bugtraq_id(2362);
  script_version ("$Revision$");
- script_tag(name:"cvss_base", value:"4.0");
+ script_tag(name:"cvss_base", value:"5.0");
  script_tag(name:"risk_factor", value:"Medium");
  script_cve_id("CVE-2001-0211");
  

Modified: trunk/openvas-plugins/scripts/wowBB_flaws.nasl
===================================================================
--- trunk/openvas-plugins/scripts/wowBB_flaws.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/wowBB_flaws.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -29,8 +29,8 @@
   script_cve_id("CVE-2004-2180", "CVE-2004-2181");
   script_bugtraq_id(11429);
   script_version("$Revision$");
-  script_tag(name:"cvss_base", value:"2.0");
-  script_tag(name:"risk_factor", value:"Low");
+  script_tag(name:"cvss_base", value:"4.3");
+  script_tag(name:"risk_factor", value:"Medium");
   script_name("WowBB <= 1.61 multiple flaws");
  
  desc = "

Modified: trunk/openvas-plugins/scripts/wowBB_sql_injection.nasl
===================================================================
--- trunk/openvas-plugins/scripts/wowBB_sql_injection.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/wowBB_sql_injection.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -32,8 +32,8 @@
   script_xref(name:"OSVDB", value:"16543");
 
   script_version("$Revision$");
-  script_tag(name:"cvss_base", value:"4.0");
-  script_tag(name:"risk_factor", value:"Medium");
+  script_tag(name:"cvss_base", value:"7.5");
+  script_tag(name:"risk_factor", value:"High");
   script_name("WowBB view_user.php SQL Injection Flaw");
  
  desc = "

Modified: trunk/openvas-plugins/scripts/wwwboardpwd.nasl
===================================================================
--- trunk/openvas-plugins/scripts/wwwboardpwd.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/wwwboardpwd.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -27,8 +27,8 @@
  script_id(10321);
  script_bugtraq_id(649, 12453);
  script_version ("$Revision$");
- script_tag(name:"cvss_base", value:"4.0");
- script_tag(name:"risk_factor", value:"Medium");
+ script_tag(name:"cvss_base", value:"10.0");
+ script_tag(name:"risk_factor", value:"Critical");
  script_cve_id("CVE-1999-0953");
  
  name = "wwwboard passwd.txt";

Modified: trunk/openvas-plugins/scripts/xhp_cms_file_upload.nasl
===================================================================
--- trunk/openvas-plugins/scripts/xhp_cms_file_upload.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/xhp_cms_file_upload.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -64,8 +64,8 @@
 if (description) {
  script_id(200100);
  script_version("$Revision: 1.0 $");
- script_tag(name:"cvss_base", value:"7.0");
- script_tag(name:"risk_factor", value:"High");
+ script_tag(name:"cvss_base", value:"9.0");
+ script_tag(name:"risk_factor", value:"Critical");
 
  script_cve_id("CVE-2006-1371");
  script_bugtraq_id(17209);

Modified: trunk/openvas-plugins/scripts/xnews.nasl
===================================================================
--- trunk/openvas-plugins/scripts/xnews.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/xnews.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -25,8 +25,8 @@
 if(description)
 {
  script_version ("$Revision$");
- script_tag(name:"cvss_base", value:"4.0");
- script_tag(name:"risk_factor", value:"Medium");
+ script_tag(name:"cvss_base", value:"7.5");
+ script_tag(name:"risk_factor", value:"High");
  script_id(12068);
  script_cve_id("CVE-2002-1656");
  script_bugtraq_id(4283);

Modified: trunk/openvas-plugins/scripts/xoops_viewtopic_xss.nasl
===================================================================
--- trunk/openvas-plugins/scripts/xoops_viewtopic_xss.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/xoops_viewtopic_xss.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -32,8 +32,8 @@
   script_cve_id("CVE-2004-2756");
  script_bugtraq_id(9497);
   script_version("$Revision$");
-  script_tag(name:"cvss_base", value:"2.0");
-  script_tag(name:"risk_factor", value:"Low");
+  script_tag(name:"cvss_base", value:"4.3");
+  script_tag(name:"risk_factor", value:"Medium");
   name = "Xoops viewtopic.php Cross Site Scripting Vulnerability";
   script_name(name);
 

Modified: trunk/openvas-plugins/scripts/xst_http_trace.nasl
===================================================================
--- trunk/openvas-plugins/scripts/xst_http_trace.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/xst_http_trace.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -63,8 +63,8 @@
 {
  script_id(11213);
  script_version ("$Revision$");
- script_tag(name:"cvss_base", value:"2.0");
- script_tag(name:"risk_factor", value:"Low");
+ script_tag(name:"cvss_base", value:"5.8");
+ script_tag(name:"risk_factor", value:"High");
  name = "http TRACE XSS attack";
  script_name(name);
  script_cve_id("CVE-2004-2320","CVE-2003-1567 ");

Modified: trunk/openvas-plugins/scripts/yabb_xss.nasl
===================================================================
--- trunk/openvas-plugins/scripts/yabb_xss.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/yabb_xss.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -33,7 +33,7 @@
  script_cve_id("CVE-2004-2402", "CVE-2004-2403");
  script_bugtraq_id(11214, 11215);
  script_version ("$Revision$");
- script_tag(name:"cvss_base", value:"4.0");
+ script_tag(name:"cvss_base", value:"4.3");
  script_tag(name:"risk_factor", value:"Medium");
  name = "YaBB XSS and Administrator Command Execution";
  

Modified: trunk/openvas-plugins/scripts/yacy_xss.nasl
===================================================================
--- trunk/openvas-plugins/scripts/yacy_xss.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/yacy_xss.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -32,8 +32,8 @@
   script_bugtraq_id(12104);
   script_xref(name:"OSVDB", value:"12630");
   script_version("$Revision$");
-  script_tag(name:"cvss_base", value:"2.0");
-  script_tag(name:"risk_factor", value:"Low");
+  script_tag(name:"cvss_base", value:"4.3");
+  script_tag(name:"risk_factor", value:"Medium");
   
   script_name("YaCy Peer-To-Peer Search Engine XSS");
 

Modified: trunk/openvas-plugins/scripts/yapig_multiple_flaws.nasl
===================================================================
--- trunk/openvas-plugins/scripts/yapig_multiple_flaws.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/yapig_multiple_flaws.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -35,7 +35,7 @@
  script_xref(name:"OSVDB", value:"17120");
  script_xref(name:"OSVDB", value:"17121");
  script_version ("$Revision$");
- script_tag(name:"cvss_base", value:"7.0");
+ script_tag(name:"cvss_base", value:"7.5");
  script_tag(name:"risk_factor", value:"High");
  name = "YaPiG Multiple Flaws";
 

Modified: trunk/openvas-plugins/scripts/yawcam_dir_traversal.nasl
===================================================================
--- trunk/openvas-plugins/scripts/yawcam_dir_traversal.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/yawcam_dir_traversal.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,7 +30,7 @@
  script_cve_id("CVE-2005-1230");
  script_bugtraq_id(13295);
  script_version ("$Revision$");
- script_tag(name:"cvss_base", value:"4.0");
+ script_tag(name:"cvss_base", value:"5.0");
  script_tag(name:"risk_factor", value:"Medium");
 
  script_name("Yawcam Directory Traversal");

Modified: trunk/openvas-plugins/scripts/ypupdated_remote_exec.nasl
===================================================================
--- trunk/openvas-plugins/scripts/ypupdated_remote_exec.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/ypupdated_remote_exec.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -28,7 +28,7 @@
  script_bugtraq_id(1749, 28383);
  script_cve_id("CVE-1999-0208");
  script_version ("$Revision: 1.4 $");
- script_tag(name:"cvss_base", value:"9.3");
+ script_tag(name:"cvss_base", value:"10.0");
  script_tag(name:"risk_factor", value:"Critical");
  script_name("rpc.ypupdated remote execution");
  

Modified: trunk/openvas-plugins/scripts/zeroboard_flaws.nasl
===================================================================
--- trunk/openvas-plugins/scripts/zeroboard_flaws.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/zeroboard_flaws.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,7 +30,7 @@
   script_cve_id("CVE-2004-1419");
   script_bugtraq_id(12103);
   script_version("$Revision$");
-  script_tag(name:"cvss_base", value:"6.0");
+  script_tag(name:"cvss_base", value:"6.8");
   script_tag(name:"risk_factor", value:"High");
   
   script_name("Zeroboard flaws");

Modified: trunk/openvas-plugins/scripts/zeroboard_flaws2.nasl
===================================================================
--- trunk/openvas-plugins/scripts/zeroboard_flaws2.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/zeroboard_flaws2.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -31,7 +31,7 @@
   script_bugtraq_id(12258);
   script_xref(name:"OSVDB", value:"12925");
   script_version("$Revision$");
-  script_tag(name:"cvss_base", value:"6.0");
+  script_tag(name:"cvss_base", value:"7.5");
   script_tag(name:"risk_factor", value:"High");
   
   script_name("Zeroboard flaws (2)");

Modified: trunk/openvas-plugins/scripts/zeroboard_xss.nasl
===================================================================
--- trunk/openvas-plugins/scripts/zeroboard_xss.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/zeroboard_xss.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -30,8 +30,8 @@
   script_cve_id("CVE-2005-0495");
   script_bugtraq_id(12596);
   script_version("$Revision$");
-  script_tag(name:"cvss_base", value:"2.0");
-  script_tag(name:"risk_factor", value:"Low");
+  script_tag(name:"cvss_base", value:"4.3");
+  script_tag(name:"risk_factor", value:"Medium");
   
   script_name("Zeroboard XSS");
 

Modified: trunk/openvas-plugins/scripts/zml_cgi_traversal.nasl
===================================================================
--- trunk/openvas-plugins/scripts/zml_cgi_traversal.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/zml_cgi_traversal.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -29,7 +29,7 @@
  script_bugtraq_id(3759);
  script_cve_id("CVE-2001-1209");
  script_version("$Revision$");
- script_tag(name:"cvss_base", value:"4.0");
+ script_tag(name:"cvss_base", value:"5.0");
  script_tag(name:"risk_factor", value:"Medium");
 
  name = "zml.cgi Directory Traversal";

Modified: trunk/openvas-plugins/scripts/zope_zclass.nasl
===================================================================
--- trunk/openvas-plugins/scripts/zope_zclass.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/zope_zclass.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -26,7 +26,7 @@
 {
  script_id(10777);
  script_version ("$Revision$");
- script_tag(name:"cvss_base", value:"5.0");
+ script_tag(name:"cvss_base", value:"4.6");
  script_tag(name:"risk_factor", value:"Medium");
  script_cve_id("CVE-2001-0567");
  

Modified: trunk/openvas-plugins/scripts/zyxel_http_pwd.nasl
===================================================================
--- trunk/openvas-plugins/scripts/zyxel_http_pwd.nasl	2011-09-06 08:10:12 UTC (rev 11569)
+++ trunk/openvas-plugins/scripts/zyxel_http_pwd.nasl	2011-09-06 12:05:16 UTC (rev 11570)
@@ -27,8 +27,8 @@
    script_id(17304);
    script_bugtraq_id(6671);
    script_version ("$Revision$");
-   script_tag(name:"cvss_base", value:"10.0");
-   script_tag(name:"risk_factor", value:"Critical");
+   script_tag(name:"cvss_base", value:"7.5");
+   script_tag(name:"risk_factor", value:"High");
    
    script_cve_id("CVE-2001-1135", "CVE-1999-0571");
    



More information about the Openvas-commits mailing list