[Openvas-commits] r11602 - in trunk/openvas-plugins: . scripts

scm-commit@wald.intevation.org scm-commit at wald.intevation.org
Mon Sep 12 16:29:54 CEST 2011


Author: veerendragg
Date: 2011-09-12 16:29:49 +0200 (Mon, 12 Sep 2011)
New Revision: 11602

Added:
   trunk/openvas-plugins/scripts/gb_CESA-2011_1264_gstreamer-plugins_centos4_i386.nasl
   trunk/openvas-plugins/scripts/gb_CESA-2011_1266_seamonkey_centos4_i386.nasl
   trunk/openvas-plugins/scripts/gb_CESA-2011_1267_thunderbird_centos4_i386.nasl
   trunk/openvas-plugins/scripts/gb_CESA-2011_1268_firefox_centos4_i386.nasl
   trunk/openvas-plugins/scripts/gb_RHSA-2011_1212-01_kernel.nasl
   trunk/openvas-plugins/scripts/gb_RHSA-2011_1264-01_gstreamer-plugins.nasl
   trunk/openvas-plugins/scripts/gb_RHSA-2011_1266-01_seamonkey.nasl
   trunk/openvas-plugins/scripts/gb_RHSA-2011_1267-01_thunderbird.nasl
   trunk/openvas-plugins/scripts/gb_RHSA-2011_1268-01_firefox.nasl
   trunk/openvas-plugins/scripts/gb_fedora_2011_10705_dhcp_fc14.nasl
   trunk/openvas-plugins/scripts/gb_fedora_2011_11199_hplip_fc14.nasl
   trunk/openvas-plugins/scripts/gb_fedora_2011_11221_cups_fc14.nasl
   trunk/openvas-plugins/scripts/gb_fedora_2011_11305_pl_fc15.nasl
   trunk/openvas-plugins/scripts/gb_fedora_2011_11318_pl_fc14.nasl
   trunk/openvas-plugins/scripts/gb_fedora_2011_11567_rubygem-actionpack_fc14.nasl
   trunk/openvas-plugins/scripts/gb_fedora_2011_11572_rubygem-actionpack_fc15.nasl
   trunk/openvas-plugins/scripts/gb_fedora_2011_11579_rubygem-activesupport_fc15.nasl
   trunk/openvas-plugins/scripts/gb_fedora_2011_11588_avahi_fc14.nasl
   trunk/openvas-plugins/scripts/gb_fedora_2011_11595_pidgin_fc14.nasl
   trunk/openvas-plugins/scripts/gb_fedora_2011_11600_rubygem-activesupport_fc14.nasl
   trunk/openvas-plugins/scripts/gb_fedora_2011_11756_perl-Data-FormValidator_fc15.nasl
   trunk/openvas-plugins/scripts/gb_fedora_2011_11805_perl-Data-FormValidator_fc14.nasl
   trunk/openvas-plugins/scripts/gb_fedora_2011_11817_squid_fc15.nasl
   trunk/openvas-plugins/scripts/gb_fedora_2011_11823_mongoose_fc15.nasl
   trunk/openvas-plugins/scripts/gb_fedora_2011_11825_mongoose_fc14.nasl
   trunk/openvas-plugins/scripts/gb_fedora_2011_11854_squid_fc14.nasl
   trunk/openvas-plugins/scripts/gb_fedora_2011_11951_ca-certificates_fc14.nasl
   trunk/openvas-plugins/scripts/gb_fedora_2011_12271_librsvg2_fc15.nasl
   trunk/openvas-plugins/scripts/gb_fedora_2011_12280_firefox_fc15.nasl
   trunk/openvas-plugins/scripts/gb_fedora_2011_12280_gnome-python2-extras_fc15.nasl
   trunk/openvas-plugins/scripts/gb_fedora_2011_12280_mozvoikko_fc15.nasl
   trunk/openvas-plugins/scripts/gb_fedora_2011_12280_perl-Gtk2-MozEmbed_fc15.nasl
   trunk/openvas-plugins/scripts/gb_fedora_2011_12280_thunderbird_fc15.nasl
   trunk/openvas-plugins/scripts/gb_fedora_2011_12280_xulrunner_fc15.nasl
   trunk/openvas-plugins/scripts/gb_fedora_2011_12281_openssl_fc14.nasl
   trunk/openvas-plugins/scripts/gb_fedora_2011_12350_audacious-plugins_fc15.nasl
   trunk/openvas-plugins/scripts/gb_fedora_2011_9319_libsndfile_fc14.nasl
   trunk/openvas-plugins/scripts/gb_mandriva_MDVA_2011_032.nasl
   trunk/openvas-plugins/scripts/gb_mandriva_MDVSA_2011_132.nasl
   trunk/openvas-plugins/scripts/gb_mandriva_MDVSA_2011_133.nasl
   trunk/openvas-plugins/scripts/gb_mandriva_MDVSA_2011_134.nasl
   trunk/openvas-plugins/scripts/gb_ubuntu_USN_1197_3.nasl
   trunk/openvas-plugins/scripts/gb_ubuntu_USN_1197_4.nasl
   trunk/openvas-plugins/scripts/gb_ubuntu_USN_1197_5.nasl
   trunk/openvas-plugins/scripts/gb_ubuntu_USN_1200_1.nasl
Modified:
   trunk/openvas-plugins/ChangeLog
Log:
Added new LSC plugins.

Modified: trunk/openvas-plugins/ChangeLog
===================================================================
--- trunk/openvas-plugins/ChangeLog	2011-09-12 13:54:55 UTC (rev 11601)
+++ trunk/openvas-plugins/ChangeLog	2011-09-12 14:29:49 UTC (rev 11602)
@@ -1,3 +1,52 @@
+2011-09-12  Veerendra G.G <veerendragg at secpod.com>
+
+	* scripts/gb_ubuntu_USN_1197_4.nasl,
+	scripts/gb_RHSA-2011_1268-01_firefox.nasl,
+	scripts/gb_RHSA-2011_1212-01_kernel.nasl,
+	scripts/gb_fedora_2011_11199_hplip_fc14.nasl,
+	scripts/gb_fedora_2011_9319_libsndfile_fc14.nasl,
+	scripts/gb_fedora_2011_11595_pidgin_fc14.nasl,
+	scripts/gb_RHSA-2011_1266-01_seamonkey.nasl,
+	scripts/gb_RHSA-2011_1267-01_thunderbird.nasl,
+	scripts/gb_fedora_2011_11579_rubygem-activesupport_fc15.nasl,
+	scripts/gb_fedora_2011_12281_openssl_fc14.nasl,
+	scripts/gb_fedora_2011_12280_perl-Gtk2-MozEmbed_fc15.nasl,
+	scripts/gb_fedora_2011_11318_pl_fc14.nasl,
+	scripts/gb_mandriva_MDVSA_2011_134.nasl,
+	scripts/gb_fedora_2011_10705_dhcp_fc14.nasl,
+	scripts/gb_fedora_2011_11572_rubygem-actionpack_fc15.nasl,
+	scripts/gb_ubuntu_USN_1197_5.nasl,
+	scripts/gb_fedora_2011_11221_cups_fc14.nasl,
+	scripts/gb_fedora_2011_11854_squid_fc14.nasl,
+	scripts/gb_CESA-2011_1268_firefox_centos4_i386.nasl,
+	scripts/gb_fedora_2011_11305_pl_fc15.nasl,
+	scripts/gb_CESA-2011_1266_seamonkey_centos4_i386.nasl,
+	scripts/gb_fedora_2011_11588_avahi_fc14.nasl,
+	scripts/gb_fedora_2011_11823_mongoose_fc15.nasl,
+	scripts/gb_CESA-2011_1267_thunderbird_centos4_i386.nasl,
+	scripts/gb_ubuntu_USN_1200_1.nasl,
+	scripts/gb_mandriva_MDVSA_2011_132.nasl,
+	scripts/gb_RHSA-2011_1264-01_gstreamer-plugins.nasl,
+	scripts/gb_fedora_2011_12271_librsvg2_fc15.nasl,
+	scripts/gb_fedora_2011_12280_gnome-python2-extras_fc15.nasl,
+	scripts/gb_fedora_2011_11805_perl-Data-FormValidator_fc14.nasl,
+	scripts/gb_ubuntu_USN_1197_3.nasl,
+	scripts/gb_mandriva_MDVA_2011_032.nasl,
+	scripts/gb_CESA-2011_1264_gstreamer-plugins_centos4_i386.nasl,
+	scripts/gb_fedora_2011_11600_rubygem-activesupport_fc14.nasl,
+	scripts/gb_fedora_2011_11817_squid_fc15.nasl,
+	scripts/gb_fedora_2011_11825_mongoose_fc14.nasl,
+	scripts/gb_fedora_2011_12280_firefox_fc15.nasl,
+	scripts/gb_mandriva_MDVSA_2011_133.nasl,
+	scripts/gb_fedora_2011_12280_thunderbird_fc15.nasl,
+	scripts/gb_fedora_2011_11951_ca-certificates_fc14.nasl,
+	scripts/gb_fedora_2011_11567_rubygem-actionpack_fc14.nasl,
+	scripts/gb_fedora_2011_12280_xulrunner_fc15.nasl,
+	scripts/gb_fedora_2011_12350_audacious-plugins_fc15.nasl,
+	scripts/gb_fedora_2011_11756_perl-Data-FormValidator_fc15.nasl,
+	scripts/gb_fedora_2011_12280_mozvoikko_fc15.nasl:
+	Added new LSC plugins.
+
 2011-09-12  Michael Meyer <michael.meyer at greenbone.net>
 
 	* scripts/os_fingerprint.nasl:

Added: trunk/openvas-plugins/scripts/gb_CESA-2011_1264_gstreamer-plugins_centos4_i386.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_CESA-2011_1264_gstreamer-plugins_centos4_i386.nasl	2011-09-12 13:54:55 UTC (rev 11601)
+++ trunk/openvas-plugins/scripts/gb_CESA-2011_1264_gstreamer-plugins_centos4_i386.nasl	2011-09-12 14:29:49 UTC (rev 11602)
@@ -0,0 +1,99 @@
+###############################################################################
+# OpenVAS Vulnerability Test
+#
+# CentOS Update for gstreamer-plugins CESA-2011:1264 centos4 i386
+#
+# Authors:
+# System Generated Check
+#
+# Copyright:
+# Copyright (c) 2011 Greenbone Networks GmbH, http://www.greenbone.net
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2
+# (or any later version), as published by the Free Software Foundation.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+###############################################################################
+
+if(description)
+{
+  script_id(880974);
+  script_version("$Revision$: 1.0");
+  script_tag(name:"risk_factor", value:"High");
+  script_xref(name: "CESA", value: "2011:1264");
+  script_cve_id("CVE-2011-2911", "CVE-2011-2912", "CVE-2011-2913", "CVE-2011-2914", "CVE-2011-2915");
+  script_name("CentOS Update for gstreamer-plugins CESA-2011:1264 centos4 i386");
+  desc = "
+
+  Vulnerability Insight:
+  The gstreamer-plugins packages contain plug-ins used by the GStreamer
+  streaming-media framework to support a wide variety of media formats.
+  
+  An integer overflow flaw, a boundary error, and multiple off-by-one flaws
+  were found in various ModPlug music file format library (libmodplug)
+  modules, embedded in GStreamer. An attacker could create specially-crafted
+  music files that, when played by a victim, would cause applications using
+  GStreamer to crash or, potentially, execute arbitrary code. (CVE-2011-2911,
+  CVE-2011-2912, CVE-2011-2913, CVE-2011-2914, CVE-2011-2915)
+  
+  All users of gstreamer-plugins are advised to upgrade to these updated
+  packages, which contain backported patches to correct these issues. After
+  installing the update, all applications using GStreamer (such as Rhythmbox)
+  must be restarted for the changes to take effect.
+
+
+  Affected Software/OS:
+  gstreamer-plugins on CentOS 4
+
+  Fix: Please Install the Updated Packages.
+
+  References:
+  http://lists.centos.org/pipermail/centos-announce/2011-September/017719.html
+
+  ";
+
+  script_description(desc);
+  script_summary("Check for the Version of gstreamer-plugins");
+  script_category(ACT_GATHER_INFO);
+  script_copyright("Copyright (c) 2011 Greenbone Networks GmbH");
+  script_family("CentOS Local Security Checks");
+  script_dependencies("gather-package-list.nasl");
+  script_require_keys("ssh/login/release");
+  exit(0);
+}
+
+
+include("pkg-lib-rpm.inc");
+include("revisions-lib.inc");
+
+release = get_kb_item("ssh/login/release");
+
+if(release == NULL){
+  exit(0);
+}
+
+if(release == "CentOS4")
+{
+
+  if(isrpmvuln(pkg:"gstreamer-plugins", rpm:"gstreamer-plugins~0.8.5~1.EL.4", rls:"CentOS4"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"gstreamer-plugins-devel", rpm:"gstreamer-plugins-devel~0.8.5~1.EL.4", rls:"CentOS4"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
\ No newline at end of file

Added: trunk/openvas-plugins/scripts/gb_CESA-2011_1266_seamonkey_centos4_i386.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_CESA-2011_1266_seamonkey_centos4_i386.nasl	2011-09-12 13:54:55 UTC (rev 11601)
+++ trunk/openvas-plugins/scripts/gb_CESA-2011_1266_seamonkey_centos4_i386.nasl	2011-09-12 14:29:49 UTC (rev 11602)
@@ -0,0 +1,119 @@
+###############################################################################
+# OpenVAS Vulnerability Test
+#
+# CentOS Update for seamonkey CESA-2011:1266 centos4 i386
+#
+# Authors:
+# System Generated Check
+#
+# Copyright:
+# Copyright (c) 2011 Greenbone Networks GmbH, http://www.greenbone.net
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2
+# (or any later version), as published by the Free Software Foundation.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+###############################################################################
+
+if(description)
+{
+  script_id(880977);
+  script_version("$Revision$: 1.0");
+  script_tag(name:"risk_factor", value:"High");
+  script_xref(name: "CESA", value: "2011:1266");
+  script_name("CentOS Update for seamonkey CESA-2011:1266 centos4 i386");
+  desc = "
+
+  Vulnerability Insight:
+  SeaMonkey is an open source web browser, email and newsgroup client, IRC
+  chat client, and HTML editor.
+  
+  The RHSA-2011:1244 SeaMonkey update rendered HTTPS certificates signed by a
+  certain Certificate Authority (CA) as untrusted, but made an exception for
+  a select few. This update removes that exception, rendering every HTTPS
+  certificate signed by that CA as untrusted. (BZ#735483)
+  
+  All SeaMonkey users should upgrade to these updated packages, which correct
+  this issue. After installing the update, SeaMonkey must be restarted for
+  the changes to take effect.
+
+
+  Affected Software/OS:
+  seamonkey on CentOS 4
+
+  Fix: Please Install the Updated Packages.
+
+  References:
+  http://lists.centos.org/pipermail/centos-announce/2011-September/017723.html
+
+  ";
+
+  script_description(desc);
+  script_summary("Check for the Version of seamonkey");
+  script_category(ACT_GATHER_INFO);
+  script_copyright("Copyright (c) 2011 Greenbone Networks GmbH");
+  script_family("CentOS Local Security Checks");
+  script_dependencies("gather-package-list.nasl");
+  script_require_keys("ssh/login/release");
+  exit(0);
+}
+
+
+include("pkg-lib-rpm.inc");
+include("revisions-lib.inc");
+
+release = get_kb_item("ssh/login/release");
+
+if(release == NULL){
+  exit(0);
+}
+
+if(release == "CentOS4")
+{
+
+  if(isrpmvuln(pkg:"seamonkey", rpm:"seamonkey~1.0.9~75.el4.centos", rls:"CentOS4"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"seamonkey-chat", rpm:"seamonkey-chat~1.0.9~75.el4.centos", rls:"CentOS4"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"seamonkey-devel", rpm:"seamonkey-devel~1.0.9~75.el4.centos", rls:"CentOS4"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"seamonkey-dom-inspector", rpm:"seamonkey-dom-inspector~1.0.9~75.el4.centos", rls:"CentOS4"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"seamonkey-js-debugger", rpm:"seamonkey-js-debugger~1.0.9~75.el4.centos", rls:"CentOS4"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"seamonkey-mail", rpm:"seamonkey-mail~1.0.9~75.el4.centos", rls:"CentOS4"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
\ No newline at end of file

Added: trunk/openvas-plugins/scripts/gb_CESA-2011_1267_thunderbird_centos4_i386.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_CESA-2011_1267_thunderbird_centos4_i386.nasl	2011-09-12 13:54:55 UTC (rev 11601)
+++ trunk/openvas-plugins/scripts/gb_CESA-2011_1267_thunderbird_centos4_i386.nasl	2011-09-12 14:29:49 UTC (rev 11602)
@@ -0,0 +1,88 @@
+###############################################################################
+# OpenVAS Vulnerability Test
+#
+# CentOS Update for thunderbird CESA-2011:1267 centos4 i386
+#
+# Authors:
+# System Generated Check
+#
+# Copyright:
+# Copyright (c) 2011 Greenbone Networks GmbH, http://www.greenbone.net
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2
+# (or any later version), as published by the Free Software Foundation.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+###############################################################################
+
+if(description)
+{
+  script_id(880975);
+  script_version("$Revision$: 1.0");
+  script_tag(name:"risk_factor", value:"High");
+  script_xref(name: "CESA", value: "2011:1267");
+  script_name("CentOS Update for thunderbird CESA-2011:1267 centos4 i386");
+  desc = "
+
+  Vulnerability Insight:
+  Mozilla Thunderbird is a standalone mail and newsgroup client.
+  
+  The RHSA-2011:1243 Thunderbird update rendered HTTPS certificates signed by
+  a certain Certificate Authority (CA) as untrusted, but made an exception
+  for a select few. This update removes that exception, rendering every HTTPS
+  certificate signed by that CA as untrusted. (BZ#735483)
+  
+  All Thunderbird users should upgrade to this updated package, which
+  resolves this issue. All running instances of Thunderbird must be
+  restarted for the update to take effect.
+
+
+  Affected Software/OS:
+  thunderbird on CentOS 4
+
+  Fix: Please Install the Updated Packages.
+
+  References:
+  http://lists.centos.org/pipermail/centos-announce/2011-September/017721.html
+
+  ";
+
+  script_description(desc);
+  script_summary("Check for the Version of thunderbird");
+  script_category(ACT_GATHER_INFO);
+  script_copyright("Copyright (c) 2011 Greenbone Networks GmbH");
+  script_family("CentOS Local Security Checks");
+  script_dependencies("gather-package-list.nasl");
+  script_require_keys("ssh/login/release");
+  exit(0);
+}
+
+
+include("pkg-lib-rpm.inc");
+include("revisions-lib.inc");
+
+release = get_kb_item("ssh/login/release");
+
+if(release == NULL){
+  exit(0);
+}
+
+if(release == "CentOS4")
+{
+
+  if(isrpmvuln(pkg:"thunderbird", rpm:"thunderbird~1.5.0.12~43.el4.centos", rls:"CentOS4"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
\ No newline at end of file

Added: trunk/openvas-plugins/scripts/gb_CESA-2011_1268_firefox_centos4_i386.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_CESA-2011_1268_firefox_centos4_i386.nasl	2011-09-12 13:54:55 UTC (rev 11601)
+++ trunk/openvas-plugins/scripts/gb_CESA-2011_1268_firefox_centos4_i386.nasl	2011-09-12 14:29:49 UTC (rev 11602)
@@ -0,0 +1,89 @@
+###############################################################################
+# OpenVAS Vulnerability Test
+#
+# CentOS Update for firefox CESA-2011:1268 centos4 i386
+#
+# Authors:
+# System Generated Check
+#
+# Copyright:
+# Copyright (c) 2011 Greenbone Networks GmbH, http://www.greenbone.net
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2
+# (or any later version), as published by the Free Software Foundation.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+###############################################################################
+
+if(description)
+{
+  script_id(880976);
+  script_version("$Revision$: 1.0");
+  script_tag(name:"risk_factor", value:"High");
+  script_xref(name: "CESA", value: "2011:1268");
+  script_name("CentOS Update for firefox CESA-2011:1268 centos4 i386");
+  desc = "
+
+  Vulnerability Insight:
+  Mozilla Firefox is an open source web browser. XULRunner provides the XUL
+  Runtime environment for Mozilla Firefox.
+  
+  The RHSA-2011:1242 Firefox update rendered HTTPS certificates signed by a
+  certain Certificate Authority (CA) as untrusted, but made an exception for
+  a select few. This update removes that exception, rendering every HTTPS
+  certificate signed by that CA as untrusted. (BZ#735483)
+  
+  All Firefox users should upgrade to these updated packages, which contain
+  Firefox version 3.6.22. After installing the update, Firefox must be
+  restarted for the changes to take effect.
+
+
+  Affected Software/OS:
+  firefox on CentOS 4
+
+  Fix: Please Install the Updated Packages.
+
+  References:
+  http://lists.centos.org/pipermail/centos-announce/2011-September/017725.html
+
+  ";
+
+  script_description(desc);
+  script_summary("Check for the Version of firefox");
+  script_category(ACT_GATHER_INFO);
+  script_copyright("Copyright (c) 2011 Greenbone Networks GmbH");
+  script_family("CentOS Local Security Checks");
+  script_dependencies("gather-package-list.nasl");
+  script_require_keys("ssh/login/release");
+  exit(0);
+}
+
+
+include("pkg-lib-rpm.inc");
+include("revisions-lib.inc");
+
+release = get_kb_item("ssh/login/release");
+
+if(release == NULL){
+  exit(0);
+}
+
+if(release == "CentOS4")
+{
+
+  if(isrpmvuln(pkg:"firefox", rpm:"firefox~3.6.22~1.el4.centos", rls:"CentOS4"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
\ No newline at end of file

Added: trunk/openvas-plugins/scripts/gb_RHSA-2011_1212-01_kernel.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_RHSA-2011_1212-01_kernel.nasl	2011-09-12 13:54:55 UTC (rev 11601)
+++ trunk/openvas-plugins/scripts/gb_RHSA-2011_1212-01_kernel.nasl	2011-09-12 14:29:49 UTC (rev 11602)
@@ -0,0 +1,213 @@
+###############################################################################
+# OpenVAS Vulnerability Test
+#
+# RedHat Update for kernel RHSA-2011:1212-01
+#
+# Authors:
+# System Generated Check
+#
+# Copyright:
+# Copyright (c) 2011 Greenbone Networks GmbH, http://www.greenbone.net
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2
+# (or any later version), as published by the Free Software Foundation.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+###############################################################################
+
+if(description)
+{
+  script_id(870482);
+  script_version("$Revision$: 1.0");
+  script_tag(name:"risk_factor", value:"High");
+  script_xref(name: "RHSA", value: "2011:1212-01");
+  script_cve_id("CVE-2011-2482", "CVE-2011-2491", "CVE-2011-2495", "CVE-2011-2517", "CVE-2011-2519", "CVE-2011-2901");
+  script_name("RedHat Update for kernel RHSA-2011:1212-01");
+  desc = "
+
+  Vulnerability Insight:
+  The kernel packages contain the Linux kernel, the core of any Linux
+  operating system.
+  
+  This update fixes the following security issues:
+  
+  * A NULL pointer dereference flaw was found in the Linux kernel's Stream
+  Control Transmission Protocol (SCTP) implementation. A remote attacker
+  could send a specially-crafted SCTP packet to a target system, resulting in
+  a denial of service. (CVE-2011-2482, Important)
+  
+  * A flaw in the Linux kernel's client-side NFS Lock Manager (NLM)
+  implementation could allow a local, unprivileged user to cause a denial of
+  service. (CVE-2011-2491, Important)
+  
+  * Buffer overflow flaws in the Linux kernel's netlink-based wireless
+  configuration interface implementation could allow a local user, who has
+  the CAP_NET_ADMIN capability, to cause a denial of service or escalate
+  their privileges on systems that have an active wireless interface.
+  (CVE-2011-2517, Important)
+  
+  * A flaw was found in the way the Linux kernel's Xen hypervisor
+  implementation emulated the SAHF instruction. When using a
+  fully-virtualized guest on a host that does not use hardware assisted
+  paging (HAP), such as those running CPUs that do not have support for (or
+  those that have it disabled) Intel Extended Page Tables (EPT) or AMD
+  Virtualization (AMD-V) Rapid Virtualization Indexing (RVI), a privileged
+  guest user could trigger this flaw to cause the hypervisor to crash.
+  (CVE-2011-2519, Moderate)
+  
+  * An off-by-one flaw was found in the __addr_ok() macro in the Linux
+  kernel's Xen hypervisor implementation when running on 64-bit systems. A
+  privileged guest user could trigger this flaw to cause the hypervisor to
+  crash. (CVE-2011-2901, Moderate)
+  
+  * /proc/[PID]/io is world-readable by default. Previously, these files
+  could be read without any further restrictions. A local, unprivileged user
+  could read these files, belonging to other, possibly privileged processes
+  to gather confidential information, such as the length of a password used
+  in a process. (CVE-2011-2495, Low)
+  
+  Red Hat would like to thank Vasily Averin for reporting CVE-2011-2491, and
+  Vasiliy Kulikov of Openwall for reporting CVE-2011-2495.
+  
+  This update also fixes several bugs. Documentation for these bug fixes will
+  be available shortly from the Technical Notes document linked to in the
+  References section.
+  
+  Users should upgrade to these updated packages, which contain backported
+  patches to correct these issues, and fix the bugs noted in the Technical
+  Notes. The system must be rebooted for this update to take effect.
+
+
+  Affected Software/OS:
+  kernel on Red Hat Enterprise Linux (v. 5 server)
+
+  Fix: Please Install the Updated Packages.
+
+  References:
+  https://www.redhat.com/archives/rhsa-announce/2011-September/msg00003.html
+
+  ";
+
+  script_description(desc);
+  script_summary("Check for the Version of kernel");
+  script_category(ACT_GATHER_INFO);
+  script_copyright("Copyright (c) 2011 Greenbone Networks GmbH");
+  script_family("Red Hat Local Security Checks");
+  script_dependencies("gather-package-list.nasl");
+  script_require_keys("ssh/login/release");
+  exit(0);
+}
+
+
+include("pkg-lib-rpm.inc");
+include("revisions-lib.inc");
+
+release = get_kb_item("ssh/login/release");
+
+if(release == NULL){
+  exit(0);
+}
+
+if(release == "RHENT_5")
+{
+
+  if(isrpmvuln(pkg:"kernel", rpm:"kernel~2.6.18~274.3.1.el5", rls:"RHENT_5"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"kernel-PAE", rpm:"kernel-PAE~2.6.18~274.3.1.el5", rls:"RHENT_5"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"kernel-PAE-debuginfo", rpm:"kernel-PAE-debuginfo~2.6.18~274.3.1.el5", rls:"RHENT_5"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"kernel-PAE-devel", rpm:"kernel-PAE-devel~2.6.18~274.3.1.el5", rls:"RHENT_5"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"kernel-debug", rpm:"kernel-debug~2.6.18~274.3.1.el5", rls:"RHENT_5"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"kernel-debug-debuginfo", rpm:"kernel-debug-debuginfo~2.6.18~274.3.1.el5", rls:"RHENT_5"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"kernel-debug-devel", rpm:"kernel-debug-devel~2.6.18~274.3.1.el5", rls:"RHENT_5"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"kernel-debuginfo", rpm:"kernel-debuginfo~2.6.18~274.3.1.el5", rls:"RHENT_5"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"kernel-debuginfo-common", rpm:"kernel-debuginfo-common~2.6.18~274.3.1.el5", rls:"RHENT_5"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"kernel-devel", rpm:"kernel-devel~2.6.18~274.3.1.el5", rls:"RHENT_5"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"kernel-headers", rpm:"kernel-headers~2.6.18~274.3.1.el5", rls:"RHENT_5"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"kernel-xen", rpm:"kernel-xen~2.6.18~274.3.1.el5", rls:"RHENT_5"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"kernel-xen-debuginfo", rpm:"kernel-xen-debuginfo~2.6.18~274.3.1.el5", rls:"RHENT_5"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"kernel-xen-devel", rpm:"kernel-xen-devel~2.6.18~274.3.1.el5", rls:"RHENT_5"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"kernel-doc", rpm:"kernel-doc~2.6.18~274.3.1.el5", rls:"RHENT_5"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
\ No newline at end of file

Added: trunk/openvas-plugins/scripts/gb_RHSA-2011_1264-01_gstreamer-plugins.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_RHSA-2011_1264-01_gstreamer-plugins.nasl	2011-09-12 13:54:55 UTC (rev 11601)
+++ trunk/openvas-plugins/scripts/gb_RHSA-2011_1264-01_gstreamer-plugins.nasl	2011-09-12 14:29:49 UTC (rev 11602)
@@ -0,0 +1,107 @@
+###############################################################################
+# OpenVAS Vulnerability Test
+#
+# RedHat Update for gstreamer-plugins RHSA-2011:1264-01
+#
+# Authors:
+# System Generated Check
+#
+# Copyright:
+# Copyright (c) 2011 Greenbone Networks GmbH, http://www.greenbone.net
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2
+# (or any later version), as published by the Free Software Foundation.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+###############################################################################
+
+if(description)
+{
+  script_id(870483);
+  script_version("$Revision$: 1.0");
+  script_tag(name:"risk_factor", value:"High");
+  script_xref(name: "RHSA", value: "2011:1264-01");
+  script_cve_id("CVE-2011-2911", "CVE-2011-2912", "CVE-2011-2913", "CVE-2011-2914", "CVE-2011-2915");
+  script_name("RedHat Update for gstreamer-plugins RHSA-2011:1264-01");
+  desc = "
+
+  Vulnerability Insight:
+  The gstreamer-plugins packages contain plug-ins used by the GStreamer
+  streaming-media framework to support a wide variety of media formats.
+  
+  An integer overflow flaw, a boundary error, and multiple off-by-one flaws
+  were found in various ModPlug music file format library (libmodplug)
+  modules, embedded in GStreamer. An attacker could create specially-crafted
+  music files that, when played by a victim, would cause applications using
+  GStreamer to crash or, potentially, execute arbitrary code. (CVE-2011-2911,
+  CVE-2011-2912, CVE-2011-2913, CVE-2011-2914, CVE-2011-2915)
+  
+  All users of gstreamer-plugins are advised to upgrade to these updated
+  packages, which contain backported patches to correct these issues. After
+  installing the update, all applications using GStreamer (such as Rhythmbox)
+  must be restarted for the changes to take effect.
+
+
+  Affected Software/OS:
+  gstreamer-plugins on Red Hat Enterprise Linux AS version 4,
+  Red Hat Enterprise Linux ES version 4,
+  Red Hat Enterprise Linux WS version 4
+
+  Fix: Please Install the Updated Packages.
+
+  References:
+  https://www.redhat.com/archives/rhsa-announce/2011-September/msg00004.html
+
+  ";
+
+  script_description(desc);
+  script_summary("Check for the Version of gstreamer-plugins");
+  script_category(ACT_GATHER_INFO);
+  script_copyright("Copyright (c) 2011 Greenbone Networks GmbH");
+  script_family("Red Hat Local Security Checks");
+  script_dependencies("gather-package-list.nasl");
+  script_require_keys("ssh/login/release");
+  exit(0);
+}
+
+
+include("pkg-lib-rpm.inc");
+include("revisions-lib.inc");
+
+release = get_kb_item("ssh/login/release");
+
+if(release == NULL){
+  exit(0);
+}
+
+if(release == "RHENT_4")
+{
+
+  if(isrpmvuln(pkg:"gstreamer-plugins", rpm:"gstreamer-plugins~0.8.5~1.EL.4", rls:"RHENT_4"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"gstreamer-plugins-debuginfo", rpm:"gstreamer-plugins-debuginfo~0.8.5~1.EL.4", rls:"RHENT_4"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"gstreamer-plugins-devel", rpm:"gstreamer-plugins-devel~0.8.5~1.EL.4", rls:"RHENT_4"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
\ No newline at end of file

Added: trunk/openvas-plugins/scripts/gb_RHSA-2011_1266-01_seamonkey.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_RHSA-2011_1266-01_seamonkey.nasl	2011-09-12 13:54:55 UTC (rev 11601)
+++ trunk/openvas-plugins/scripts/gb_RHSA-2011_1266-01_seamonkey.nasl	2011-09-12 14:29:49 UTC (rev 11602)
@@ -0,0 +1,127 @@
+###############################################################################
+# OpenVAS Vulnerability Test
+#
+# RedHat Update for seamonkey RHSA-2011:1266-01
+#
+# Authors:
+# System Generated Check
+#
+# Copyright:
+# Copyright (c) 2011 Greenbone Networks GmbH, http://www.greenbone.net
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2
+# (or any later version), as published by the Free Software Foundation.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+###############################################################################
+
+if(description)
+{
+  script_id(870484);
+  script_version("$Revision$: 1.0");
+  script_tag(name:"risk_factor", value:"High");
+  script_xref(name: "RHSA", value: "2011:1266-01");
+  script_name("RedHat Update for seamonkey RHSA-2011:1266-01");
+  desc = "
+
+  Vulnerability Insight:
+  SeaMonkey is an open source web browser, email and newsgroup client, IRC
+  chat client, and HTML editor.
+  
+  The RHSA-2011:1244 SeaMonkey update rendered HTTPS certificates signed by a
+  certain Certificate Authority (CA) as untrusted, but made an exception for
+  a select few. This update removes that exception, rendering every HTTPS
+  certificate signed by that CA as untrusted. (BZ#735483)
+  
+  All SeaMonkey users should upgrade to these updated packages, which correct
+  this issue. After installing the update, SeaMonkey must be restarted for
+  the changes to take effect.
+
+
+  Affected Software/OS:
+  seamonkey on Red Hat Enterprise Linux AS version 4,
+  Red Hat Enterprise Linux ES version 4,
+  Red Hat Enterprise Linux WS version 4
+
+  Fix: Please Install the Updated Packages.
+
+  References:
+  https://www.redhat.com/archives/rhsa-announce/2011-September/msg00006.html
+
+  ";
+
+  script_description(desc);
+  script_summary("Check for the Version of seamonkey");
+  script_category(ACT_GATHER_INFO);
+  script_copyright("Copyright (c) 2011 Greenbone Networks GmbH");
+  script_family("Red Hat Local Security Checks");
+  script_dependencies("gather-package-list.nasl");
+  script_require_keys("ssh/login/release");
+  exit(0);
+}
+
+
+include("pkg-lib-rpm.inc");
+include("revisions-lib.inc");
+
+release = get_kb_item("ssh/login/release");
+
+if(release == NULL){
+  exit(0);
+}
+
+if(release == "RHENT_4")
+{
+
+  if(isrpmvuln(pkg:"seamonkey", rpm:"seamonkey~1.0.9~75.el4", rls:"RHENT_4"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"seamonkey-chat", rpm:"seamonkey-chat~1.0.9~75.el4", rls:"RHENT_4"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"seamonkey-debuginfo", rpm:"seamonkey-debuginfo~1.0.9~75.el4", rls:"RHENT_4"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"seamonkey-devel", rpm:"seamonkey-devel~1.0.9~75.el4", rls:"RHENT_4"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"seamonkey-dom-inspector", rpm:"seamonkey-dom-inspector~1.0.9~75.el4", rls:"RHENT_4"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"seamonkey-js-debugger", rpm:"seamonkey-js-debugger~1.0.9~75.el4", rls:"RHENT_4"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"seamonkey-mail", rpm:"seamonkey-mail~1.0.9~75.el4", rls:"RHENT_4"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
\ No newline at end of file

Added: trunk/openvas-plugins/scripts/gb_RHSA-2011_1267-01_thunderbird.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_RHSA-2011_1267-01_thunderbird.nasl	2011-09-12 13:54:55 UTC (rev 11601)
+++ trunk/openvas-plugins/scripts/gb_RHSA-2011_1267-01_thunderbird.nasl	2011-09-12 14:29:49 UTC (rev 11602)
@@ -0,0 +1,96 @@
+###############################################################################
+# OpenVAS Vulnerability Test
+#
+# RedHat Update for thunderbird RHSA-2011:1267-01
+#
+# Authors:
+# System Generated Check
+#
+# Copyright:
+# Copyright (c) 2011 Greenbone Networks GmbH, http://www.greenbone.net
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2
+# (or any later version), as published by the Free Software Foundation.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+###############################################################################
+
+if(description)
+{
+  script_id(870485);
+  script_version("$Revision$: 1.0");
+  script_tag(name:"risk_factor", value:"High");
+  script_xref(name: "RHSA", value: "2011:1267-01");
+  script_name("RedHat Update for thunderbird RHSA-2011:1267-01");
+  desc = "
+
+  Vulnerability Insight:
+  Mozilla Thunderbird is a standalone mail and newsgroup client.
+  
+  The RHSA-2011:1243 Thunderbird update rendered HTTPS certificates signed by
+  a certain Certificate Authority (CA) as untrusted, but made an exception
+  for a select few. This update removes that exception, rendering every HTTPS
+  certificate signed by that CA as untrusted. (BZ#735483)
+  
+  All Thunderbird users should upgrade to this updated package, which
+  resolves this issue. All running instances of Thunderbird must be
+  restarted for the update to take effect.
+
+
+  Affected Software/OS:
+  thunderbird on Red Hat Enterprise Linux AS version 4,
+  Red Hat Enterprise Linux ES version 4,
+  Red Hat Enterprise Linux WS version 4
+
+  Fix: Please Install the Updated Packages.
+
+  References:
+  https://www.redhat.com/archives/rhsa-announce/2011-September/msg00007.html
+
+  ";
+
+  script_description(desc);
+  script_summary("Check for the Version of thunderbird");
+  script_category(ACT_GATHER_INFO);
+  script_copyright("Copyright (c) 2011 Greenbone Networks GmbH");
+  script_family("Red Hat Local Security Checks");
+  script_dependencies("gather-package-list.nasl");
+  script_require_keys("ssh/login/release");
+  exit(0);
+}
+
+
+include("pkg-lib-rpm.inc");
+include("revisions-lib.inc");
+
+release = get_kb_item("ssh/login/release");
+
+if(release == NULL){
+  exit(0);
+}
+
+if(release == "RHENT_4")
+{
+
+  if(isrpmvuln(pkg:"thunderbird", rpm:"thunderbird~1.5.0.12~43.el4", rls:"RHENT_4"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"thunderbird-debuginfo", rpm:"thunderbird-debuginfo~1.5.0.12~43.el4", rls:"RHENT_4"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
\ No newline at end of file

Added: trunk/openvas-plugins/scripts/gb_RHSA-2011_1268-01_firefox.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_RHSA-2011_1268-01_firefox.nasl	2011-09-12 13:54:55 UTC (rev 11601)
+++ trunk/openvas-plugins/scripts/gb_RHSA-2011_1268-01_firefox.nasl	2011-09-12 14:29:49 UTC (rev 11602)
@@ -0,0 +1,135 @@
+###############################################################################
+# OpenVAS Vulnerability Test
+#
+# RedHat Update for firefox RHSA-2011:1268-01
+#
+# Authors:
+# System Generated Check
+#
+# Copyright:
+# Copyright (c) 2011 Greenbone Networks GmbH, http://www.greenbone.net
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2
+# (or any later version), as published by the Free Software Foundation.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+###############################################################################
+
+if(description)
+{
+  script_id(870481);
+  script_version("$Revision$: 1.0");
+  script_tag(name:"risk_factor", value:"High");
+  script_xref(name: "RHSA", value: "2011:1268-01");
+  script_name("RedHat Update for firefox RHSA-2011:1268-01");
+  desc = "
+
+  Vulnerability Insight:
+  Mozilla Firefox is an open source web browser. XULRunner provides the XUL
+  Runtime environment for Mozilla Firefox.
+  
+  The RHSA-2011:1242 Firefox update rendered HTTPS certificates signed by a
+  certain Certificate Authority (CA) as untrusted, but made an exception for
+  a select few. This update removes that exception, rendering every HTTPS
+  certificate signed by that CA as untrusted. (BZ#735483)
+  
+  All Firefox users should upgrade to these updated packages, which contain
+  Firefox version 3.6.22. After installing the update, Firefox must be
+  restarted for the changes to take effect.
+
+
+  Affected Software/OS:
+  firefox on Red Hat Enterprise Linux (v. 5 server),
+  Red Hat Enterprise Linux AS version 4,
+  Red Hat Enterprise Linux ES version 4,
+  Red Hat Enterprise Linux WS version 4
+
+  Fix: Please Install the Updated Packages.
+
+  References:
+  https://www.redhat.com/archives/rhsa-announce/2011-September/msg00008.html
+
+  ";
+
+  script_description(desc);
+  script_summary("Check for the Version of firefox");
+  script_category(ACT_GATHER_INFO);
+  script_copyright("Copyright (c) 2011 Greenbone Networks GmbH");
+  script_family("Red Hat Local Security Checks");
+  script_dependencies("gather-package-list.nasl");
+  script_require_keys("ssh/login/release");
+  exit(0);
+}
+
+
+include("pkg-lib-rpm.inc");
+include("revisions-lib.inc");
+
+release = get_kb_item("ssh/login/release");
+
+if(release == NULL){
+  exit(0);
+}
+
+if(release == "RHENT_5")
+{
+
+  if(isrpmvuln(pkg:"firefox", rpm:"firefox~3.6.22~1.el5_7", rls:"RHENT_5"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"firefox-debuginfo", rpm:"firefox-debuginfo~3.6.22~1.el5_7", rls:"RHENT_5"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"xulrunner", rpm:"xulrunner~1.9.2.22~1.el5_7", rls:"RHENT_5"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"xulrunner-debuginfo", rpm:"xulrunner-debuginfo~1.9.2.22~1.el5_7", rls:"RHENT_5"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"xulrunner-devel", rpm:"xulrunner-devel~1.9.2.22~1.el5_7", rls:"RHENT_5"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "RHENT_4")
+{
+
+  if(isrpmvuln(pkg:"firefox", rpm:"firefox~3.6.22~1.el4", rls:"RHENT_4"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"firefox-debuginfo", rpm:"firefox-debuginfo~3.6.22~1.el4", rls:"RHENT_4"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
\ No newline at end of file

Added: trunk/openvas-plugins/scripts/gb_fedora_2011_10705_dhcp_fc14.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_fedora_2011_10705_dhcp_fc14.nasl	2011-09-12 13:54:55 UTC (rev 11601)
+++ trunk/openvas-plugins/scripts/gb_fedora_2011_10705_dhcp_fc14.nasl	2011-09-12 14:29:49 UTC (rev 11602)
@@ -0,0 +1,90 @@
+###############################################################################
+# OpenVAS Vulnerability Test
+#
+# Fedora Update for dhcp FEDORA-2011-10705
+#
+# Authors:
+# System Generated Check
+#
+# Copyright:
+# Copyright (c) 2011 Greenbone Networks GmbH, http://www.greenbone.net
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2
+# (or any later version), as published by the Free Software Foundation.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+###############################################################################
+
+if(description)
+{
+  script_id(863484);
+  script_version("$Revision$: 1.0");
+  script_tag(name:"cvss_base", value:"7.8");
+  script_tag(name:"risk_factor", value:"High");
+  script_xref(name: "FEDORA", value: "2011-10705");
+  script_cve_id("CVE-2011-2748", "CVE-2011-2749", "CVE-2011-0997", "CVE-2011-0413", "CVE-2010-3616", "CVE-2010-3611");
+  script_name("Fedora Update for dhcp FEDORA-2011-10705");
+  desc = "
+
+  Vulnerability Insight:
+  DHCP (Dynamic Host Configuration Protocol) is a protocol which allows
+  individual devices on an IP network to get their own network
+  configuration information (IP address, subnetmask, broadcast address,
+  etc.) from a DHCP server. The overall purpose of DHCP is to make it
+  easier to administer a large network.  The dhcp package includes the
+  ISC DHCP service and relay agent.
+  
+  To use DHCP on your network, install a DHCP service (or relay agent),
+  and on clients run a DHCP client daemon.  The dhcp package provides
+  the ISC DHCP service and relay agent.
+
+
+  Affected Software/OS:
+  dhcp on Fedora 14
+
+  Fix: Please Install the Updated Packages.
+
+  References:
+  http://lists.fedoraproject.org/pipermail/package-announce/2011-September/065176.html
+
+  ";
+
+  script_description(desc);
+  script_summary("Check for the Version of dhcp");
+  script_category(ACT_GATHER_INFO);
+  script_copyright("Copyright (c) 2011 Greenbone Networks GmbH");
+  script_family("Fedora Local Security Checks");
+  script_dependencies("gather-package-list.nasl");
+  script_require_keys("ssh/login/release");
+  exit(0);
+}
+
+
+include("pkg-lib-rpm.inc");
+include("revisions-lib.inc");
+
+release = get_kb_item("ssh/login/release");
+
+if(release == NULL){
+  exit(0);
+}
+
+if(release == "FC14")
+{
+
+  if(isrpmvuln(pkg:"dhcp", rpm:"dhcp~4.2.0~23.P2.fc14", rls:"FC14"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
\ No newline at end of file

Added: trunk/openvas-plugins/scripts/gb_fedora_2011_11199_hplip_fc14.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_fedora_2011_11199_hplip_fc14.nasl	2011-09-12 13:54:55 UTC (rev 11601)
+++ trunk/openvas-plugins/scripts/gb_fedora_2011_11199_hplip_fc14.nasl	2011-09-12 14:29:49 UTC (rev 11602)
@@ -0,0 +1,82 @@
+###############################################################################
+# OpenVAS Vulnerability Test
+#
+# Fedora Update for hplip FEDORA-2011-11199
+#
+# Authors:
+# System Generated Check
+#
+# Copyright:
+# Copyright (c) 2011 Greenbone Networks GmbH, http://www.greenbone.net
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2
+# (or any later version), as published by the Free Software Foundation.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+###############################################################################
+
+if(description)
+{
+  script_id(863494);
+  script_version("$Revision$: 1.0");
+  script_tag(name:"cvss_base", value:"7.5");
+  script_tag(name:"risk_factor", value:"High");
+  script_xref(name: "FEDORA", value: "2011-11199");
+  script_cve_id("CVE-2011-2722", "CVE-2010-4267");
+  script_name("Fedora Update for hplip FEDORA-2011-11199");
+  desc = "
+
+  Vulnerability Insight:
+  The Hewlett-Packard Linux Imaging and Printing Project provides
+  drivers for HP printers and multi-function peripherals.
+
+
+  Affected Software/OS:
+  hplip on Fedora 14
+
+  Fix: Please Install the Updated Packages.
+
+  References:
+  http://lists.fedoraproject.org/pipermail/package-announce/2011-September/065727.html
+
+  ";
+
+  script_description(desc);
+  script_summary("Check for the Version of hplip");
+  script_category(ACT_GATHER_INFO);
+  script_copyright("Copyright (c) 2011 Greenbone Networks GmbH");
+  script_family("Fedora Local Security Checks");
+  script_dependencies("gather-package-list.nasl");
+  script_require_keys("ssh/login/release");
+  exit(0);
+}
+
+
+include("pkg-lib-rpm.inc");
+include("revisions-lib.inc");
+
+release = get_kb_item("ssh/login/release");
+
+if(release == NULL){
+  exit(0);
+}
+
+if(release == "FC14")
+{
+
+  if(isrpmvuln(pkg:"hplip", rpm:"hplip~3.11.7~2.fc14", rls:"FC14"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
\ No newline at end of file

Added: trunk/openvas-plugins/scripts/gb_fedora_2011_11221_cups_fc14.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_fedora_2011_11221_cups_fc14.nasl	2011-09-12 13:54:55 UTC (rev 11601)
+++ trunk/openvas-plugins/scripts/gb_fedora_2011_11221_cups_fc14.nasl	2011-09-12 14:29:49 UTC (rev 11602)
@@ -0,0 +1,84 @@
+###############################################################################
+# OpenVAS Vulnerability Test
+#
+# Fedora Update for cups FEDORA-2011-11221
+#
+# Authors:
+# System Generated Check
+#
+# Copyright:
+# Copyright (c) 2011 Greenbone Networks GmbH, http://www.greenbone.net
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2
+# (or any later version), as published by the Free Software Foundation.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+###############################################################################
+
+if(description)
+{
+  script_id(863474);
+  script_version("$Revision$: 1.0");
+  script_tag(name:"cvss_base", value:"7.9");
+  script_tag(name:"risk_factor", value:"High");
+  script_xref(name: "FEDORA", value: "2011-11221");
+  script_cve_id("CVE-2011-2896", "CVE-2010-2941");
+  script_name("Fedora Update for cups FEDORA-2011-11221");
+  desc = "
+
+  Vulnerability Insight:
+  The Common UNIX Printing System provides a portable printing layer for
+  UNIX&#174; operating systems. It has been developed by Easy Software Products
+  to promote a standard printing solution for all UNIX vendors and users.
+  CUPS provides the System V and Berkeley command-line interfaces.
+
+
+  Affected Software/OS:
+  cups on Fedora 14
+
+  Fix: Please Install the Updated Packages.
+
+  References:
+  http://lists.fedoraproject.org/pipermail/package-announce/2011-September/065550.html
+
+  ";
+
+  script_description(desc);
+  script_summary("Check for the Version of cups");
+  script_category(ACT_GATHER_INFO);
+  script_copyright("Copyright (c) 2011 Greenbone Networks GmbH");
+  script_family("Fedora Local Security Checks");
+  script_dependencies("gather-package-list.nasl");
+  script_require_keys("ssh/login/release");
+  exit(0);
+}
+
+
+include("pkg-lib-rpm.inc");
+include("revisions-lib.inc");
+
+release = get_kb_item("ssh/login/release");
+
+if(release == NULL){
+  exit(0);
+}
+
+if(release == "FC14")
+{
+
+  if(isrpmvuln(pkg:"cups", rpm:"cups~1.4.8~2.fc14", rls:"FC14"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
\ No newline at end of file

Added: trunk/openvas-plugins/scripts/gb_fedora_2011_11305_pl_fc15.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_fedora_2011_11305_pl_fc15.nasl	2011-09-12 13:54:55 UTC (rev 11601)
+++ trunk/openvas-plugins/scripts/gb_fedora_2011_11305_pl_fc15.nasl	2011-09-12 14:29:49 UTC (rev 11602)
@@ -0,0 +1,86 @@
+###############################################################################
+# OpenVAS Vulnerability Test
+#
+# Fedora Update for pl FEDORA-2011-11305
+#
+# Authors:
+# System Generated Check
+#
+# Copyright:
+# Copyright (c) 2011 Greenbone Networks GmbH, http://www.greenbone.net
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2
+# (or any later version), as published by the Free Software Foundation.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+###############################################################################
+
+if(description)
+{
+  script_id(863485);
+  script_version("$Revision$: 1.0");
+  script_tag(name:"cvss_base", value:"5.1");
+  script_tag(name:"risk_factor", value:"High");
+  script_xref(name: "FEDORA", value: "2011-11305");
+  script_cve_id("CVE-2011-2896");
+  script_name("Fedora Update for pl FEDORA-2011-11305");
+  desc = "
+
+  Vulnerability Insight:
+  ISO/Edinburgh-style Prolog compiler including modules, auto-load,
+  libraries, Garbage-collector, stack-expandor, C/C++-interface,
+  GNU-readline interface, very fast compiler.  Including packages clib
+  (Unix process control and sockets), cpp (C++ interface), sgml (reading
+  XML/SGML), sgml/RDF (reading RDF into triples) and XPCE (Graphics UI
+  toolkit, integrated editor (Emacs-clone) and source-level debugger).
+
+
+  Affected Software/OS:
+  pl on Fedora 15
+
+  Fix: Please Install the Updated Packages.
+
+  References:
+  http://lists.fedoraproject.org/pipermail/package-announce/2011-September/065527.html
+
+  ";
+
+  script_description(desc);
+  script_summary("Check for the Version of pl");
+  script_category(ACT_GATHER_INFO);
+  script_copyright("Copyright (c) 2011 Greenbone Networks GmbH");
+  script_family("Fedora Local Security Checks");
+  script_dependencies("gather-package-list.nasl");
+  script_require_keys("ssh/login/release");
+  exit(0);
+}
+
+
+include("pkg-lib-rpm.inc");
+include("revisions-lib.inc");
+
+release = get_kb_item("ssh/login/release");
+
+if(release == NULL){
+  exit(0);
+}
+
+if(release == "FC15")
+{
+
+  if(isrpmvuln(pkg:"pl", rpm:"pl~5.10.2~5.fc15", rls:"FC15"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
\ No newline at end of file

Added: trunk/openvas-plugins/scripts/gb_fedora_2011_11318_pl_fc14.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_fedora_2011_11318_pl_fc14.nasl	2011-09-12 13:54:55 UTC (rev 11601)
+++ trunk/openvas-plugins/scripts/gb_fedora_2011_11318_pl_fc14.nasl	2011-09-12 14:29:49 UTC (rev 11602)
@@ -0,0 +1,86 @@
+###############################################################################
+# OpenVAS Vulnerability Test
+#
+# Fedora Update for pl FEDORA-2011-11318
+#
+# Authors:
+# System Generated Check
+#
+# Copyright:
+# Copyright (c) 2011 Greenbone Networks GmbH, http://www.greenbone.net
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2
+# (or any later version), as published by the Free Software Foundation.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+###############################################################################
+
+if(description)
+{
+  script_id(863486);
+  script_version("$Revision$: 1.0");
+  script_tag(name:"cvss_base", value:"5.1");
+  script_tag(name:"risk_factor", value:"High");
+  script_xref(name: "FEDORA", value: "2011-11318");
+  script_cve_id("CVE-2011-2896");
+  script_name("Fedora Update for pl FEDORA-2011-11318");
+  desc = "
+
+  Vulnerability Insight:
+  ISO/Edinburgh-style Prolog compiler including modules, autoload,
+  libraries, Garbage-collector, stack-expandor, C/C++-interface,
+  GNU-readline interface, very fast compiler.  Including packages clib
+  (Unix process control and sockets), cpp (C++ interface), sgml (reading
+  XML/SGML), sgml/RDF (reading RDF into triples) and XPCE (Graphics UI
+  toolkit, integrated editor (Emacs-clone) and source-level debugger).
+
+
+  Affected Software/OS:
+  pl on Fedora 14
+
+  Fix: Please Install the Updated Packages.
+
+  References:
+  http://lists.fedoraproject.org/pipermail/package-announce/2011-September/065539.html
+
+  ";
+
+  script_description(desc);
+  script_summary("Check for the Version of pl");
+  script_category(ACT_GATHER_INFO);
+  script_copyright("Copyright (c) 2011 Greenbone Networks GmbH");
+  script_family("Fedora Local Security Checks");
+  script_dependencies("gather-package-list.nasl");
+  script_require_keys("ssh/login/release");
+  exit(0);
+}
+
+
+include("pkg-lib-rpm.inc");
+include("revisions-lib.inc");
+
+release = get_kb_item("ssh/login/release");
+
+if(release == NULL){
+  exit(0);
+}
+
+if(release == "FC14")
+{
+
+  if(isrpmvuln(pkg:"pl", rpm:"pl~5.7.11~7.fc14", rls:"FC14"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
\ No newline at end of file

Added: trunk/openvas-plugins/scripts/gb_fedora_2011_11567_rubygem-actionpack_fc14.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_fedora_2011_11567_rubygem-actionpack_fc14.nasl	2011-09-12 13:54:55 UTC (rev 11601)
+++ trunk/openvas-plugins/scripts/gb_fedora_2011_11567_rubygem-actionpack_fc14.nasl	2011-09-12 14:29:49 UTC (rev 11602)
@@ -0,0 +1,83 @@
+###############################################################################
+# OpenVAS Vulnerability Test
+#
+# Fedora Update for rubygem-actionpack FEDORA-2011-11567
+#
+# Authors:
+# System Generated Check
+#
+# Copyright:
+# Copyright (c) 2011 Greenbone Networks GmbH, http://www.greenbone.net
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2
+# (or any later version), as published by the Free Software Foundation.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+###############################################################################
+
+if(description)
+{
+  script_id(863490);
+  script_version("$Revision$: 1.0");
+  script_tag(name:"cvss_base", value:"6.8");
+  script_tag(name:"risk_factor", value:"High");
+  script_xref(name: "FEDORA", value: "2011-11567");
+  script_cve_id("CVE-2011-0446", "CVE-2011-0447", "CVE-2011-2931", "CVE-2011-3186");
+  script_name("Fedora Update for rubygem-actionpack FEDORA-2011-11567");
+  desc = "
+
+  Vulnerability Insight:
+  Eases web-request routing, handling, and response as a half-way front,
+  half-way page controller. Implemented with specific emphasis on enabling easy
+  unit/integration testing that doesn't require a browser.
+
+
+  Affected Software/OS:
+  rubygem-actionpack on Fedora 14
+
+  Fix: Please Install the Updated Packages.
+
+  References:
+  http://lists.fedoraproject.org/pipermail/package-announce/2011-September/065137.html
+
+  ";
+
+  script_description(desc);
+  script_summary("Check for the Version of rubygem-actionpack");
+  script_category(ACT_GATHER_INFO);
+  script_copyright("Copyright (c) 2011 Greenbone Networks GmbH");
+  script_family("Fedora Local Security Checks");
+  script_dependencies("gather-package-list.nasl");
+  script_require_keys("ssh/login/release");
+  exit(0);
+}
+
+
+include("pkg-lib-rpm.inc");
+include("revisions-lib.inc");
+
+release = get_kb_item("ssh/login/release");
+
+if(release == NULL){
+  exit(0);
+}
+
+if(release == "FC14")
+{
+
+  if(isrpmvuln(pkg:"rubygem-actionpack", rpm:"rubygem-actionpack~2.3.8~4.fc14", rls:"FC14"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
\ No newline at end of file

Added: trunk/openvas-plugins/scripts/gb_fedora_2011_11572_rubygem-actionpack_fc15.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_fedora_2011_11572_rubygem-actionpack_fc15.nasl	2011-09-12 13:54:55 UTC (rev 11601)
+++ trunk/openvas-plugins/scripts/gb_fedora_2011_11572_rubygem-actionpack_fc15.nasl	2011-09-12 14:29:49 UTC (rev 11602)
@@ -0,0 +1,83 @@
+###############################################################################
+# OpenVAS Vulnerability Test
+#
+# Fedora Update for rubygem-actionpack FEDORA-2011-11572
+#
+# Authors:
+# System Generated Check
+#
+# Copyright:
+# Copyright (c) 2011 Greenbone Networks GmbH, http://www.greenbone.net
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2
+# (or any later version), as published by the Free Software Foundation.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+###############################################################################
+
+if(description)
+{
+  script_id(863475);
+  script_version("$Revision$: 1.0");
+  script_tag(name:"cvss_base", value:"5.0");
+  script_tag(name:"risk_factor", value:"Medium");
+  script_xref(name: "FEDORA", value: "2011-11572");
+  script_cve_id("CVE-2011-2197", "CVE-2011-2929", "CVE-2011-2931");
+  script_name("Fedora Update for rubygem-actionpack FEDORA-2011-11572");
+  desc = "
+
+  Vulnerability Insight:
+  Eases web-request routing, handling, and response as a half-way front,
+  half-way page controller. Implemented with specific emphasis on enabling easy
+  unit/integration testing that doesn't require a browser.
+
+
+  Affected Software/OS:
+  rubygem-actionpack on Fedora 15
+
+  Fix: Please Install the Updated Packages.
+
+  References:
+  http://lists.fedoraproject.org/pipermail/package-announce/2011-September/065109.html
+
+  ";
+
+  script_description(desc);
+  script_summary("Check for the Version of rubygem-actionpack");
+  script_category(ACT_GATHER_INFO);
+  script_copyright("Copyright (c) 2011 Greenbone Networks GmbH");
+  script_family("Fedora Local Security Checks");
+  script_dependencies("gather-package-list.nasl");
+  script_require_keys("ssh/login/release");
+  exit(0);
+}
+
+
+include("pkg-lib-rpm.inc");
+include("revisions-lib.inc");
+
+release = get_kb_item("ssh/login/release");
+
+if(release == NULL){
+  exit(0);
+}
+
+if(release == "FC15")
+{
+
+  if(isrpmvuln(pkg:"rubygem-actionpack", rpm:"rubygem-actionpack~3.0.5~4.fc15", rls:"FC15"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
\ No newline at end of file

Added: trunk/openvas-plugins/scripts/gb_fedora_2011_11579_rubygem-activesupport_fc15.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_fedora_2011_11579_rubygem-activesupport_fc15.nasl	2011-09-12 13:54:55 UTC (rev 11601)
+++ trunk/openvas-plugins/scripts/gb_fedora_2011_11579_rubygem-activesupport_fc15.nasl	2011-09-12 14:29:49 UTC (rev 11602)
@@ -0,0 +1,82 @@
+###############################################################################
+# OpenVAS Vulnerability Test
+#
+# Fedora Update for rubygem-activesupport FEDORA-2011-11579
+#
+# Authors:
+# System Generated Check
+#
+# Copyright:
+# Copyright (c) 2011 Greenbone Networks GmbH, http://www.greenbone.net
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2
+# (or any later version), as published by the Free Software Foundation.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+###############################################################################
+
+if(description)
+{
+  script_id(863478);
+  script_version("$Revision$: 1.0");
+  script_tag(name:"cvss_base", value:"4.3");
+  script_tag(name:"risk_factor", value:"Medium");
+  script_xref(name: "FEDORA", value: "2011-11579");
+  script_cve_id("CVE-2011-2197", "CVE-2011-2932");
+  script_name("Fedora Update for rubygem-activesupport FEDORA-2011-11579");
+  desc = "
+
+  Vulnerability Insight:
+  Utility library which carries commonly used classes and
+  goodies from the Rails framework
+
+
+  Affected Software/OS:
+  rubygem-activesupport on Fedora 15
+
+  Fix: Please Install the Updated Packages.
+
+  References:
+  http://lists.fedoraproject.org/pipermail/package-announce/2011-September/065114.html
+
+  ";
+
+  script_description(desc);
+  script_summary("Check for the Version of rubygem-activesupport");
+  script_category(ACT_GATHER_INFO);
+  script_copyright("Copyright (c) 2011 Greenbone Networks GmbH");
+  script_family("Fedora Local Security Checks");
+  script_dependencies("gather-package-list.nasl");
+  script_require_keys("ssh/login/release");
+  exit(0);
+}
+
+
+include("pkg-lib-rpm.inc");
+include("revisions-lib.inc");
+
+release = get_kb_item("ssh/login/release");
+
+if(release == NULL){
+  exit(0);
+}
+
+if(release == "FC15")
+{
+
+  if(isrpmvuln(pkg:"rubygem-activesupport", rpm:"rubygem-activesupport~3.0.5~4.fc15", rls:"FC15"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
\ No newline at end of file

Added: trunk/openvas-plugins/scripts/gb_fedora_2011_11588_avahi_fc14.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_fedora_2011_11588_avahi_fc14.nasl	2011-09-12 13:54:55 UTC (rev 11601)
+++ trunk/openvas-plugins/scripts/gb_fedora_2011_11588_avahi_fc14.nasl	2011-09-12 14:29:49 UTC (rev 11602)
@@ -0,0 +1,87 @@
+###############################################################################
+# OpenVAS Vulnerability Test
+#
+# Fedora Update for avahi FEDORA-2011-11588
+#
+# Authors:
+# System Generated Check
+#
+# Copyright:
+# Copyright (c) 2011 Greenbone Networks GmbH, http://www.greenbone.net
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2
+# (or any later version), as published by the Free Software Foundation.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+###############################################################################
+
+if(description)
+{
+  script_id(863496);
+  script_version("$Revision$: 1.0");
+  script_tag(name:"cvss_base", value:"5.0");
+  script_tag(name:"risk_factor", value:"Medium");
+  script_xref(name: "FEDORA", value: "2011-11588");
+  script_cve_id("CVE-2011-1002", "CVE-2010-2244");
+  script_name("Fedora Update for avahi FEDORA-2011-11588");
+  desc = "
+
+  Vulnerability Insight:
+  Avahi is a system which facilitates service discovery on
+  a local network -- this means that you can plug your laptop or
+  computer into a network and instantly be able to view other people who
+  you can chat with, find printers to print to or find files being
+  shared. This kind of technology is already found in MacOS X (branded
+  'Rendezvous', 'Bonjour' and sometimes 'ZeroConf') and is very
+  convenient.
+
+
+  Affected Software/OS:
+  avahi on Fedora 14
+
+  Fix: Please Install the Updated Packages.
+
+  References:
+  http://lists.fedoraproject.org/pipermail/package-announce/2011-September/065686.html
+
+  ";
+
+  script_description(desc);
+  script_summary("Check for the Version of avahi");
+  script_category(ACT_GATHER_INFO);
+  script_copyright("Copyright (c) 2011 Greenbone Networks GmbH");
+  script_family("Fedora Local Security Checks");
+  script_dependencies("gather-package-list.nasl");
+  script_require_keys("ssh/login/release");
+  exit(0);
+}
+
+
+include("pkg-lib-rpm.inc");
+include("revisions-lib.inc");
+
+release = get_kb_item("ssh/login/release");
+
+if(release == NULL){
+  exit(0);
+}
+
+if(release == "FC14")
+{
+
+  if(isrpmvuln(pkg:"avahi", rpm:"avahi~0.6.27~8.fc14", rls:"FC14"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
\ No newline at end of file

Added: trunk/openvas-plugins/scripts/gb_fedora_2011_11595_pidgin_fc14.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_fedora_2011_11595_pidgin_fc14.nasl	2011-09-12 13:54:55 UTC (rev 11601)
+++ trunk/openvas-plugins/scripts/gb_fedora_2011_11595_pidgin_fc14.nasl	2011-09-12 14:29:49 UTC (rev 11602)
@@ -0,0 +1,92 @@
+###############################################################################
+# OpenVAS Vulnerability Test
+#
+# Fedora Update for pidgin FEDORA-2011-11595
+#
+# Authors:
+# System Generated Check
+#
+# Copyright:
+# Copyright (c) 2011 Greenbone Networks GmbH, http://www.greenbone.net
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2
+# (or any later version), as published by the Free Software Foundation.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+###############################################################################
+
+if(description)
+{
+  script_id(863479);
+  script_version("$Revision$: 1.0");
+  script_tag(name:"cvss_base", value:"4.3");
+  script_tag(name:"risk_factor", value:"Medium");
+  script_xref(name: "FEDORA", value: "2011-11595");
+  script_cve_id("CVE-2011-2485", "CVE-2011-1091", "CVE-2010-3711", "CVE-2011-3184");
+  script_name("Fedora Update for pidgin FEDORA-2011-11595");
+  desc = "
+
+  Vulnerability Insight:
+  Pidgin allows you to talk to anyone using a variety of messaging
+  protocols including AIM, MSN, Yahoo!, Jabber, Bonjour, Gadu-Gadu,
+  ICQ, IRC, Novell Groupwise, QQ, Lotus Sametime, SILC, Simple and
+  Zephyr.  These protocols are implemented using a modular, easy to
+  use design.  To use a protocol, just add an account using the
+  account editor.
+  
+  Pidgin supports many common features of other clients, as well as many
+  unique features, such as perl scripting, TCL scripting and C plugins.
+  
+  Pidgin is not affiliated with or endorsed by America Online, Inc.,
+  Microsoft Corporation, Yahoo! Inc., or ICQ Inc.
+
+
+  Affected Software/OS:
+  pidgin on Fedora 14
+
+  Fix: Please Install the Updated Packages.
+
+  References:
+  http://lists.fedoraproject.org/pipermail/package-announce/2011-September/065190.html
+
+  ";
+
+  script_description(desc);
+  script_summary("Check for the Version of pidgin");
+  script_category(ACT_GATHER_INFO);
+  script_copyright("Copyright (c) 2011 Greenbone Networks GmbH");
+  script_family("Fedora Local Security Checks");
+  script_dependencies("gather-package-list.nasl");
+  script_require_keys("ssh/login/release");
+  exit(0);
+}
+
+
+include("pkg-lib-rpm.inc");
+include("revisions-lib.inc");
+
+release = get_kb_item("ssh/login/release");
+
+if(release == NULL){
+  exit(0);
+}
+
+if(release == "FC14")
+{
+
+  if(isrpmvuln(pkg:"pidgin", rpm:"pidgin~2.10.0~1.fc14", rls:"FC14"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
\ No newline at end of file

Added: trunk/openvas-plugins/scripts/gb_fedora_2011_11600_rubygem-activesupport_fc14.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_fedora_2011_11600_rubygem-activesupport_fc14.nasl	2011-09-12 13:54:55 UTC (rev 11601)
+++ trunk/openvas-plugins/scripts/gb_fedora_2011_11600_rubygem-activesupport_fc14.nasl	2011-09-12 14:29:49 UTC (rev 11602)
@@ -0,0 +1,82 @@
+###############################################################################
+# OpenVAS Vulnerability Test
+#
+# Fedora Update for rubygem-activesupport FEDORA-2011-11600
+#
+# Authors:
+# System Generated Check
+#
+# Copyright:
+# Copyright (c) 2011 Greenbone Networks GmbH, http://www.greenbone.net
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2
+# (or any later version), as published by the Free Software Foundation.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+###############################################################################
+
+if(description)
+{
+  script_id(863488);
+  script_version("$Revision$: 1.0");
+  script_tag(name:"cvss_base", value:"4.3");
+  script_tag(name:"risk_factor", value:"Medium");
+  script_xref(name: "FEDORA", value: "2011-11600");
+  script_cve_id("CVE-2011-2932");
+  script_name("Fedora Update for rubygem-activesupport FEDORA-2011-11600");
+  desc = "
+
+  Vulnerability Insight:
+  Utility library which carries commonly used classes and
+  goodies from the Rails framework
+
+
+  Affected Software/OS:
+  rubygem-activesupport on Fedora 14
+
+  Fix: Please Install the Updated Packages.
+
+  References:
+  http://lists.fedoraproject.org/pipermail/package-announce/2011-September/065189.html
+
+  ";
+
+  script_description(desc);
+  script_summary("Check for the Version of rubygem-activesupport");
+  script_category(ACT_GATHER_INFO);
+  script_copyright("Copyright (c) 2011 Greenbone Networks GmbH");
+  script_family("Fedora Local Security Checks");
+  script_dependencies("gather-package-list.nasl");
+  script_require_keys("ssh/login/release");
+  exit(0);
+}
+
+
+include("pkg-lib-rpm.inc");
+include("revisions-lib.inc");
+
+release = get_kb_item("ssh/login/release");
+
+if(release == NULL){
+  exit(0);
+}
+
+if(release == "FC14")
+{
+
+  if(isrpmvuln(pkg:"rubygem-activesupport", rpm:"rubygem-activesupport~2.3.8~4.fc14", rls:"FC14"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
\ No newline at end of file

Added: trunk/openvas-plugins/scripts/gb_fedora_2011_11756_perl-Data-FormValidator_fc15.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_fedora_2011_11756_perl-Data-FormValidator_fc15.nasl	2011-09-12 13:54:55 UTC (rev 11601)
+++ trunk/openvas-plugins/scripts/gb_fedora_2011_11756_perl-Data-FormValidator_fc15.nasl	2011-09-12 14:29:49 UTC (rev 11602)
@@ -0,0 +1,81 @@
+###############################################################################
+# OpenVAS Vulnerability Test
+#
+# Fedora Update for perl-Data-FormValidator FEDORA-2011-11756
+#
+# Authors:
+# System Generated Check
+#
+# Copyright:
+# Copyright (c) 2011 Greenbone Networks GmbH, http://www.greenbone.net
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2
+# (or any later version), as published by the Free Software Foundation.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+###############################################################################
+
+if(description)
+{
+  script_id(863481);
+  script_version("$Revision$: 1.0");
+  script_tag(name:"risk_factor", value:"High");
+  script_xref(name: "FEDORA", value: "2011-11756");
+  script_cve_id("CVE-2011-2201");
+  script_name("Fedora Update for perl-Data-FormValidator FEDORA-2011-11756");
+  desc = "
+
+  Vulnerability Insight:
+  Data::FormValidator's main aim is to make input validation expressible in a
+  simple format.
+
+
+  Affected Software/OS:
+  perl-Data-FormValidator on Fedora 15
+
+  Fix: Please Install the Updated Packages.
+
+  References:
+  http://lists.fedoraproject.org/pipermail/package-announce/2011-September/065474.html
+
+  ";
+
+  script_description(desc);
+  script_summary("Check for the Version of perl-Data-FormValidator");
+  script_category(ACT_GATHER_INFO);
+  script_copyright("Copyright (c) 2011 Greenbone Networks GmbH");
+  script_family("Fedora Local Security Checks");
+  script_dependencies("gather-package-list.nasl");
+  script_require_keys("ssh/login/release");
+  exit(0);
+}
+
+
+include("pkg-lib-rpm.inc");
+include("revisions-lib.inc");
+
+release = get_kb_item("ssh/login/release");
+
+if(release == NULL){
+  exit(0);
+}
+
+if(release == "FC15")
+{
+
+  if(isrpmvuln(pkg:"perl-Data-FormValidator", rpm:"perl-Data-FormValidator~4.66~6.fc15", rls:"FC15"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
\ No newline at end of file

Added: trunk/openvas-plugins/scripts/gb_fedora_2011_11805_perl-Data-FormValidator_fc14.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_fedora_2011_11805_perl-Data-FormValidator_fc14.nasl	2011-09-12 13:54:55 UTC (rev 11601)
+++ trunk/openvas-plugins/scripts/gb_fedora_2011_11805_perl-Data-FormValidator_fc14.nasl	2011-09-12 14:29:49 UTC (rev 11602)
@@ -0,0 +1,81 @@
+###############################################################################
+# OpenVAS Vulnerability Test
+#
+# Fedora Update for perl-Data-FormValidator FEDORA-2011-11805
+#
+# Authors:
+# System Generated Check
+#
+# Copyright:
+# Copyright (c) 2011 Greenbone Networks GmbH, http://www.greenbone.net
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2
+# (or any later version), as published by the Free Software Foundation.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+###############################################################################
+
+if(description)
+{
+  script_id(863477);
+  script_version("$Revision$: 1.0");
+  script_tag(name:"risk_factor", value:"High");
+  script_xref(name: "FEDORA", value: "2011-11805");
+  script_cve_id("CVE-2011-2201");
+  script_name("Fedora Update for perl-Data-FormValidator FEDORA-2011-11805");
+  desc = "
+
+  Vulnerability Insight:
+  Data::FormValidator's main aim is to make input validation expressible in a
+  simple format.
+
+
+  Affected Software/OS:
+  perl-Data-FormValidator on Fedora 14
+
+  Fix: Please Install the Updated Packages.
+
+  References:
+  http://lists.fedoraproject.org/pipermail/package-announce/2011-September/065478.html
+
+  ";
+
+  script_description(desc);
+  script_summary("Check for the Version of perl-Data-FormValidator");
+  script_category(ACT_GATHER_INFO);
+  script_copyright("Copyright (c) 2011 Greenbone Networks GmbH");
+  script_family("Fedora Local Security Checks");
+  script_dependencies("gather-package-list.nasl");
+  script_require_keys("ssh/login/release");
+  exit(0);
+}
+
+
+include("pkg-lib-rpm.inc");
+include("revisions-lib.inc");
+
+release = get_kb_item("ssh/login/release");
+
+if(release == NULL){
+  exit(0);
+}
+
+if(release == "FC14")
+{
+
+  if(isrpmvuln(pkg:"perl-Data-FormValidator", rpm:"perl-Data-FormValidator~4.66~6.fc14", rls:"FC14"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
\ No newline at end of file

Added: trunk/openvas-plugins/scripts/gb_fedora_2011_11817_squid_fc15.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_fedora_2011_11817_squid_fc15.nasl	2011-09-12 13:54:55 UTC (rev 11601)
+++ trunk/openvas-plugins/scripts/gb_fedora_2011_11817_squid_fc15.nasl	2011-09-12 14:29:49 UTC (rev 11602)
@@ -0,0 +1,88 @@
+###############################################################################
+# OpenVAS Vulnerability Test
+#
+# Fedora Update for squid FEDORA-2011-11817
+#
+# Authors:
+# System Generated Check
+#
+# Copyright:
+# Copyright (c) 2011 Greenbone Networks GmbH, http://www.greenbone.net
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2
+# (or any later version), as published by the Free Software Foundation.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+###############################################################################
+
+if(description)
+{
+  script_id(863483);
+  script_version("$Revision$: 1.0");
+  script_tag(name:"risk_factor", value:"High");
+  script_xref(name: "FEDORA", value: "2011-11817");
+  script_name("Fedora Update for squid FEDORA-2011-11817");
+  desc = "
+
+  Vulnerability Insight:
+  Squid is a high-performance proxy caching server for Web clients,
+  supporting FTP, gopher, and HTTP data objects. Unlike traditional
+  caching software, Squid handles all requests in a single,
+  non-blocking, I/O-driven process. Squid keeps meta data and especially
+  hot objects cached in RAM, caches DNS lookups, supports non-blocking
+  DNS lookups, and implements negative caching of failed requests.
+  
+  Squid consists of a main server program squid, a Domain Name System
+  lookup program (dnsserver), a program for retrieving FTP data
+  (ftpget), and some management and client tools.
+
+
+  Affected Software/OS:
+  squid on Fedora 15
+
+  Fix: Please Install the Updated Packages.
+
+  References:
+  http://lists.fedoraproject.org/pipermail/package-announce/2011-September/065515.html
+
+  ";
+
+  script_description(desc);
+  script_summary("Check for the Version of squid");
+  script_category(ACT_GATHER_INFO);
+  script_copyright("Copyright (c) 2011 Greenbone Networks GmbH");
+  script_family("Fedora Local Security Checks");
+  script_dependencies("gather-package-list.nasl");
+  script_require_keys("ssh/login/release");
+  exit(0);
+}
+
+
+include("pkg-lib-rpm.inc");
+include("revisions-lib.inc");
+
+release = get_kb_item("ssh/login/release");
+
+if(release == NULL){
+  exit(0);
+}
+
+if(release == "FC15")
+{
+
+  if(isrpmvuln(pkg:"squid", rpm:"squid~3.1.15~1.fc15", rls:"FC15"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
\ No newline at end of file

Added: trunk/openvas-plugins/scripts/gb_fedora_2011_11823_mongoose_fc15.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_fedora_2011_11823_mongoose_fc15.nasl	2011-09-12 13:54:55 UTC (rev 11601)
+++ trunk/openvas-plugins/scripts/gb_fedora_2011_11823_mongoose_fc15.nasl	2011-09-12 14:29:49 UTC (rev 11602)
@@ -0,0 +1,88 @@
+###############################################################################
+# OpenVAS Vulnerability Test
+#
+# Fedora Update for mongoose FEDORA-2011-11823
+#
+# Authors:
+# System Generated Check
+#
+# Copyright:
+# Copyright (c) 2011 Greenbone Networks GmbH, http://www.greenbone.net
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2
+# (or any later version), as published by the Free Software Foundation.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+###############################################################################
+
+if(description)
+{
+  script_id(863489);
+  script_version("$Revision$: 1.0");
+  script_tag(name:"cvss_base", value:"7.5");
+  script_tag(name:"risk_factor", value:"High");
+  script_xref(name: "FEDORA", value: "2011-11823");
+  script_cve_id("CVE-2011-2900");
+  script_name("Fedora Update for mongoose FEDORA-2011-11823");
+  desc = "
+
+  Vulnerability Insight:
+  Mongoose web server executable is self-sufficient, it does not depend on
+  anything to start serving requests. If it is copied to any directory and
+  executed, it starts to serve that directory on port 8080 (so to access files,
+  go to http://localhost:8080. If some additional configuration is required -
+  for example, different listening port or IP-based access control, then a
+  'mongoose.conf' file with respective options can be created in the same
+  directory where executable lives. This makes Mongoose perfect for all sorts
+  of demos, quick tests, file sharing, and Web programming.
+
+
+  Affected Software/OS:
+  mongoose on Fedora 15
+
+  Fix: Please Install the Updated Packages.
+
+  References:
+  http://lists.fedoraproject.org/pipermail/package-announce/2011-September/065505.html
+
+  ";
+
+  script_description(desc);
+  script_summary("Check for the Version of mongoose");
+  script_category(ACT_GATHER_INFO);
+  script_copyright("Copyright (c) 2011 Greenbone Networks GmbH");
+  script_family("Fedora Local Security Checks");
+  script_dependencies("gather-package-list.nasl");
+  script_require_keys("ssh/login/release");
+  exit(0);
+}
+
+
+include("pkg-lib-rpm.inc");
+include("revisions-lib.inc");
+
+release = get_kb_item("ssh/login/release");
+
+if(release == NULL){
+  exit(0);
+}
+
+if(release == "FC15")
+{
+
+  if(isrpmvuln(pkg:"mongoose", rpm:"mongoose~3.0~2.fc15", rls:"FC15"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
\ No newline at end of file

Added: trunk/openvas-plugins/scripts/gb_fedora_2011_11825_mongoose_fc14.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_fedora_2011_11825_mongoose_fc14.nasl	2011-09-12 13:54:55 UTC (rev 11601)
+++ trunk/openvas-plugins/scripts/gb_fedora_2011_11825_mongoose_fc14.nasl	2011-09-12 14:29:49 UTC (rev 11602)
@@ -0,0 +1,88 @@
+###############################################################################
+# OpenVAS Vulnerability Test
+#
+# Fedora Update for mongoose FEDORA-2011-11825
+#
+# Authors:
+# System Generated Check
+#
+# Copyright:
+# Copyright (c) 2011 Greenbone Networks GmbH, http://www.greenbone.net
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2
+# (or any later version), as published by the Free Software Foundation.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+###############################################################################
+
+if(description)
+{
+  script_id(863487);
+  script_version("$Revision$: 1.0");
+  script_tag(name:"cvss_base", value:"7.5");
+  script_tag(name:"risk_factor", value:"High");
+  script_xref(name: "FEDORA", value: "2011-11825");
+  script_cve_id("CVE-2011-2900");
+  script_name("Fedora Update for mongoose FEDORA-2011-11825");
+  desc = "
+
+  Vulnerability Insight:
+  Mongoose web server executable is self-sufficient, it does not depend on
+  anything to start serving requests. If it is copied to any directory and
+  executed, it starts to serve that directory on port 8080 (so to access files,
+  go to http://localhost:8080 If some additional configuration is required -
+  for example, different listening port or IP-based access control, then a
+  'mongoose.conf' file with respective options can be created in the same
+  directory where executable lives. This makes Mongoose perfect for all sorts
+  of demos, quick tests, file sharing, and Web programming.
+
+
+  Affected Software/OS:
+  mongoose on Fedora 14
+
+  Fix: Please Install the Updated Packages.
+
+  References:
+  http://lists.fedoraproject.org/pipermail/package-announce/2011-September/065537.html
+
+  ";
+
+  script_description(desc);
+  script_summary("Check for the Version of mongoose");
+  script_category(ACT_GATHER_INFO);
+  script_copyright("Copyright (c) 2011 Greenbone Networks GmbH");
+  script_family("Fedora Local Security Checks");
+  script_dependencies("gather-package-list.nasl");
+  script_require_keys("ssh/login/release");
+  exit(0);
+}
+
+
+include("pkg-lib-rpm.inc");
+include("revisions-lib.inc");
+
+release = get_kb_item("ssh/login/release");
+
+if(release == NULL){
+  exit(0);
+}
+
+if(release == "FC14")
+{
+
+  if(isrpmvuln(pkg:"mongoose", rpm:"mongoose~3.0~2.fc14", rls:"FC14"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
\ No newline at end of file

Added: trunk/openvas-plugins/scripts/gb_fedora_2011_11854_squid_fc14.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_fedora_2011_11854_squid_fc14.nasl	2011-09-12 13:54:55 UTC (rev 11601)
+++ trunk/openvas-plugins/scripts/gb_fedora_2011_11854_squid_fc14.nasl	2011-09-12 14:29:49 UTC (rev 11602)
@@ -0,0 +1,88 @@
+###############################################################################
+# OpenVAS Vulnerability Test
+#
+# Fedora Update for squid FEDORA-2011-11854
+#
+# Authors:
+# System Generated Check
+#
+# Copyright:
+# Copyright (c) 2011 Greenbone Networks GmbH, http://www.greenbone.net
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2
+# (or any later version), as published by the Free Software Foundation.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+###############################################################################
+
+if(description)
+{
+  script_id(863476);
+  script_version("$Revision$: 1.0");
+  script_tag(name:"risk_factor", value:"High");
+  script_xref(name: "FEDORA", value: "2011-11854");
+  script_name("Fedora Update for squid FEDORA-2011-11854");
+  desc = "
+
+  Vulnerability Insight:
+  Squid is a high-performance proxy caching server for Web clients,
+  supporting FTP, gopher, and HTTP data objects. Unlike traditional
+  caching software, Squid handles all requests in a single,
+  non-blocking, I/O-driven process. Squid keeps meta data and especially
+  hot objects cached in RAM, caches DNS lookups, supports non-blocking
+  DNS lookups, and implements negative caching of failed requests.
+  
+  Squid consists of a main server program squid, a Domain Name System
+  lookup program (dnsserver), a program for retrieving FTP data
+  (ftpget), and some management and client tools.
+
+
+  Affected Software/OS:
+  squid on Fedora 14
+
+  Fix: Please Install the Updated Packages.
+
+  References:
+  http://lists.fedoraproject.org/pipermail/package-announce/2011-September/065534.html
+
+  ";
+
+  script_description(desc);
+  script_summary("Check for the Version of squid");
+  script_category(ACT_GATHER_INFO);
+  script_copyright("Copyright (c) 2011 Greenbone Networks GmbH");
+  script_family("Fedora Local Security Checks");
+  script_dependencies("gather-package-list.nasl");
+  script_require_keys("ssh/login/release");
+  exit(0);
+}
+
+
+include("pkg-lib-rpm.inc");
+include("revisions-lib.inc");
+
+release = get_kb_item("ssh/login/release");
+
+if(release == NULL){
+  exit(0);
+}
+
+if(release == "FC14")
+{
+
+  if(isrpmvuln(pkg:"squid", rpm:"squid~3.1.15~1.fc14", rls:"FC14"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
\ No newline at end of file

Added: trunk/openvas-plugins/scripts/gb_fedora_2011_11951_ca-certificates_fc14.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_fedora_2011_11951_ca-certificates_fc14.nasl	2011-09-12 13:54:55 UTC (rev 11601)
+++ trunk/openvas-plugins/scripts/gb_fedora_2011_11951_ca-certificates_fc14.nasl	2011-09-12 14:29:49 UTC (rev 11602)
@@ -0,0 +1,80 @@
+###############################################################################
+# OpenVAS Vulnerability Test
+#
+# Fedora Update for ca-certificates FEDORA-2011-11951
+#
+# Authors:
+# System Generated Check
+#
+# Copyright:
+# Copyright (c) 2011 Greenbone Networks GmbH, http://www.greenbone.net
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2
+# (or any later version), as published by the Free Software Foundation.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+###############################################################################
+
+if(description)
+{
+  script_id(863482);
+  script_version("$Revision$: 1.0");
+  script_tag(name:"risk_factor", value:"High");
+  script_xref(name: "FEDORA", value: "2011-11951");
+  script_name("Fedora Update for ca-certificates FEDORA-2011-11951");
+  desc = "
+
+  Vulnerability Insight:
+  This package contains the set of CA certificates chosen by the
+  Mozilla Foundation for use with the Internet PKI.
+
+
+  Affected Software/OS:
+  ca-certificates on Fedora 14
+
+  Fix: Please Install the Updated Packages.
+
+  References:
+  http://lists.fedoraproject.org/pipermail/package-announce/2011-September/065156.html
+
+  ";
+
+  script_description(desc);
+  script_summary("Check for the Version of ca-certificates");
+  script_category(ACT_GATHER_INFO);
+  script_copyright("Copyright (c) 2011 Greenbone Networks GmbH");
+  script_family("Fedora Local Security Checks");
+  script_dependencies("gather-package-list.nasl");
+  script_require_keys("ssh/login/release");
+  exit(0);
+}
+
+
+include("pkg-lib-rpm.inc");
+include("revisions-lib.inc");
+
+release = get_kb_item("ssh/login/release");
+
+if(release == NULL){
+  exit(0);
+}
+
+if(release == "FC14")
+{
+
+  if(isrpmvuln(pkg:"ca-certificates", rpm:"ca-certificates~2011.78~1.fc14", rls:"FC14"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
\ No newline at end of file

Added: trunk/openvas-plugins/scripts/gb_fedora_2011_12271_librsvg2_fc15.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_fedora_2011_12271_librsvg2_fc15.nasl	2011-09-12 13:54:55 UTC (rev 11601)
+++ trunk/openvas-plugins/scripts/gb_fedora_2011_12271_librsvg2_fc15.nasl	2011-09-12 14:29:49 UTC (rev 11602)
@@ -0,0 +1,80 @@
+###############################################################################
+# OpenVAS Vulnerability Test
+#
+# Fedora Update for librsvg2 FEDORA-2011-12271
+#
+# Authors:
+# System Generated Check
+#
+# Copyright:
+# Copyright (c) 2011 Greenbone Networks GmbH, http://www.greenbone.net
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2
+# (or any later version), as published by the Free Software Foundation.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+###############################################################################
+
+if(description)
+{
+  script_id(863498);
+  script_version("$Revision$: 1.0");
+  script_tag(name:"risk_factor", value:"High");
+  script_xref(name: "FEDORA", value: "2011-12271");
+  script_cve_id("CVE-2011-3146");
+  script_name("Fedora Update for librsvg2 FEDORA-2011-12271");
+  desc = "
+
+  Vulnerability Insight:
+  An SVG library based on cairo.
+
+
+  Affected Software/OS:
+  librsvg2 on Fedora 15
+
+  Fix: Please Install the Updated Packages.
+
+  References:
+  http://lists.fedoraproject.org/pipermail/package-announce/2011-September/065730.html
+
+  ";
+
+  script_description(desc);
+  script_summary("Check for the Version of librsvg2");
+  script_category(ACT_GATHER_INFO);
+  script_copyright("Copyright (c) 2011 Greenbone Networks GmbH");
+  script_family("Fedora Local Security Checks");
+  script_dependencies("gather-package-list.nasl");
+  script_require_keys("ssh/login/release");
+  exit(0);
+}
+
+
+include("pkg-lib-rpm.inc");
+include("revisions-lib.inc");
+
+release = get_kb_item("ssh/login/release");
+
+if(release == NULL){
+  exit(0);
+}
+
+if(release == "FC15")
+{
+
+  if(isrpmvuln(pkg:"librsvg2", rpm:"librsvg2~2.34.0~2.fc15", rls:"FC15"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
\ No newline at end of file

Added: trunk/openvas-plugins/scripts/gb_fedora_2011_12280_firefox_fc15.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_fedora_2011_12280_firefox_fc15.nasl	2011-09-12 13:54:55 UTC (rev 11601)
+++ trunk/openvas-plugins/scripts/gb_fedora_2011_12280_firefox_fc15.nasl	2011-09-12 14:29:49 UTC (rev 11602)
@@ -0,0 +1,80 @@
+###############################################################################
+# OpenVAS Vulnerability Test
+#
+# Fedora Update for firefox FEDORA-2011-12280
+#
+# Authors:
+# System Generated Check
+#
+# Copyright:
+# Copyright (c) 2011 Greenbone Networks GmbH, http://www.greenbone.net
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2
+# (or any later version), as published by the Free Software Foundation.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+###############################################################################
+
+if(description)
+{
+  script_id(863497);
+  script_version("$Revision$: 1.0");
+  script_tag(name:"risk_factor", value:"High");
+  script_xref(name: "FEDORA", value: "2011-12280");
+  script_name("Fedora Update for firefox FEDORA-2011-12280");
+  desc = "
+
+  Vulnerability Insight:
+  Mozilla Firefox is an open-source web browser, designed for standards
+  compliance, performance and portability.
+
+
+  Affected Software/OS:
+  firefox on Fedora 15
+
+  Fix: Please Install the Updated Packages.
+
+  References:
+  http://lists.fedoraproject.org/pipermail/package-announce/2011-September/065704.html
+
+  ";
+
+  script_description(desc);
+  script_summary("Check for the Version of firefox");
+  script_category(ACT_GATHER_INFO);
+  script_copyright("Copyright (c) 2011 Greenbone Networks GmbH");
+  script_family("Fedora Local Security Checks");
+  script_dependencies("gather-package-list.nasl");
+  script_require_keys("ssh/login/release");
+  exit(0);
+}
+
+
+include("pkg-lib-rpm.inc");
+include("revisions-lib.inc");
+
+release = get_kb_item("ssh/login/release");
+
+if(release == NULL){
+  exit(0);
+}
+
+if(release == "FC15")
+{
+
+  if(isrpmvuln(pkg:"firefox", rpm:"firefox~6.0.2~1.fc15", rls:"FC15"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
\ No newline at end of file

Added: trunk/openvas-plugins/scripts/gb_fedora_2011_12280_gnome-python2-extras_fc15.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_fedora_2011_12280_gnome-python2-extras_fc15.nasl	2011-09-12 13:54:55 UTC (rev 11601)
+++ trunk/openvas-plugins/scripts/gb_fedora_2011_12280_gnome-python2-extras_fc15.nasl	2011-09-12 14:29:49 UTC (rev 11602)
@@ -0,0 +1,80 @@
+###############################################################################
+# OpenVAS Vulnerability Test
+#
+# Fedora Update for gnome-python2-extras FEDORA-2011-12280
+#
+# Authors:
+# System Generated Check
+#
+# Copyright:
+# Copyright (c) 2011 Greenbone Networks GmbH, http://www.greenbone.net
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2
+# (or any later version), as published by the Free Software Foundation.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+###############################################################################
+
+if(description)
+{
+  script_id(863495);
+  script_version("$Revision$: 1.0");
+  script_tag(name:"risk_factor", value:"High");
+  script_xref(name: "FEDORA", value: "2011-12280");
+  script_name("Fedora Update for gnome-python2-extras FEDORA-2011-12280");
+  desc = "
+
+  Vulnerability Insight:
+  The gnome-python-extra package contains the source packages for additional
+  Python bindings for GNOME. It should be used together with gnome-python.
+
+
+  Affected Software/OS:
+  gnome-python2-extras on Fedora 15
+
+  Fix: Please Install the Updated Packages.
+
+  References:
+  http://lists.fedoraproject.org/pipermail/package-announce/2011-September/065703.html
+
+  ";
+
+  script_description(desc);
+  script_summary("Check for the Version of gnome-python2-extras");
+  script_category(ACT_GATHER_INFO);
+  script_copyright("Copyright (c) 2011 Greenbone Networks GmbH");
+  script_family("Fedora Local Security Checks");
+  script_dependencies("gather-package-list.nasl");
+  script_require_keys("ssh/login/release");
+  exit(0);
+}
+
+
+include("pkg-lib-rpm.inc");
+include("revisions-lib.inc");
+
+release = get_kb_item("ssh/login/release");
+
+if(release == NULL){
+  exit(0);
+}
+
+if(release == "FC15")
+{
+
+  if(isrpmvuln(pkg:"gnome-python2-extras", rpm:"gnome-python2-extras~2.25.3~34.fc15", rls:"FC15"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
\ No newline at end of file

Added: trunk/openvas-plugins/scripts/gb_fedora_2011_12280_mozvoikko_fc15.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_fedora_2011_12280_mozvoikko_fc15.nasl	2011-09-12 13:54:55 UTC (rev 11601)
+++ trunk/openvas-plugins/scripts/gb_fedora_2011_12280_mozvoikko_fc15.nasl	2011-09-12 14:29:49 UTC (rev 11602)
@@ -0,0 +1,80 @@
+###############################################################################
+# OpenVAS Vulnerability Test
+#
+# Fedora Update for mozvoikko FEDORA-2011-12280
+#
+# Authors:
+# System Generated Check
+#
+# Copyright:
+# Copyright (c) 2011 Greenbone Networks GmbH, http://www.greenbone.net
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2
+# (or any later version), as published by the Free Software Foundation.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+###############################################################################
+
+if(description)
+{
+  script_id(863492);
+  script_version("$Revision$: 1.0");
+  script_tag(name:"risk_factor", value:"High");
+  script_xref(name: "FEDORA", value: "2011-12280");
+  script_name("Fedora Update for mozvoikko FEDORA-2011-12280");
+  desc = "
+
+  Vulnerability Insight:
+  This is mozvoikko, an extension for Mozilla programs for using the Finnish
+  spell-checker Voikko.
+
+
+  Affected Software/OS:
+  mozvoikko on Fedora 15
+
+  Fix: Please Install the Updated Packages.
+
+  References:
+  http://lists.fedoraproject.org/pipermail/package-announce/2011-September/065701.html
+
+  ";
+
+  script_description(desc);
+  script_summary("Check for the Version of mozvoikko");
+  script_category(ACT_GATHER_INFO);
+  script_copyright("Copyright (c) 2011 Greenbone Networks GmbH");
+  script_family("Fedora Local Security Checks");
+  script_dependencies("gather-package-list.nasl");
+  script_require_keys("ssh/login/release");
+  exit(0);
+}
+
+
+include("pkg-lib-rpm.inc");
+include("revisions-lib.inc");
+
+release = get_kb_item("ssh/login/release");
+
+if(release == NULL){
+  exit(0);
+}
+
+if(release == "FC15")
+{
+
+  if(isrpmvuln(pkg:"mozvoikko", rpm:"mozvoikko~1.9.0~7.fc15", rls:"FC15"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
\ No newline at end of file

Added: trunk/openvas-plugins/scripts/gb_fedora_2011_12280_perl-Gtk2-MozEmbed_fc15.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_fedora_2011_12280_perl-Gtk2-MozEmbed_fc15.nasl	2011-09-12 13:54:55 UTC (rev 11601)
+++ trunk/openvas-plugins/scripts/gb_fedora_2011_12280_perl-Gtk2-MozEmbed_fc15.nasl	2011-09-12 14:29:49 UTC (rev 11602)
@@ -0,0 +1,79 @@
+###############################################################################
+# OpenVAS Vulnerability Test
+#
+# Fedora Update for perl-Gtk2-MozEmbed FEDORA-2011-12280
+#
+# Authors:
+# System Generated Check
+#
+# Copyright:
+# Copyright (c) 2011 Greenbone Networks GmbH, http://www.greenbone.net
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2
+# (or any later version), as published by the Free Software Foundation.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+###############################################################################
+
+if(description)
+{
+  script_id(863493);
+  script_version("$Revision$: 1.0");
+  script_tag(name:"risk_factor", value:"High");
+  script_xref(name: "FEDORA", value: "2011-12280");
+  script_name("Fedora Update for perl-Gtk2-MozEmbed FEDORA-2011-12280");
+  desc = "
+
+  Vulnerability Insight:
+  This module allows you to use the Mozilla embedding widget from Perl.
+
+
+  Affected Software/OS:
+  perl-Gtk2-MozEmbed on Fedora 15
+
+  Fix: Please Install the Updated Packages.
+
+  References:
+  http://lists.fedoraproject.org/pipermail/package-announce/2011-September/065702.html
+
+  ";
+
+  script_description(desc);
+  script_summary("Check for the Version of perl-Gtk2-MozEmbed");
+  script_category(ACT_GATHER_INFO);
+  script_copyright("Copyright (c) 2011 Greenbone Networks GmbH");
+  script_family("Fedora Local Security Checks");
+  script_dependencies("gather-package-list.nasl");
+  script_require_keys("ssh/login/release");
+  exit(0);
+}
+
+
+include("pkg-lib-rpm.inc");
+include("revisions-lib.inc");
+
+release = get_kb_item("ssh/login/release");
+
+if(release == NULL){
+  exit(0);
+}
+
+if(release == "FC15")
+{
+
+  if(isrpmvuln(pkg:"perl-Gtk2-MozEmbed", rpm:"perl-Gtk2-MozEmbed~0.09~1.fc15.3", rls:"FC15"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
\ No newline at end of file

Added: trunk/openvas-plugins/scripts/gb_fedora_2011_12280_thunderbird_fc15.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_fedora_2011_12280_thunderbird_fc15.nasl	2011-09-12 13:54:55 UTC (rev 11601)
+++ trunk/openvas-plugins/scripts/gb_fedora_2011_12280_thunderbird_fc15.nasl	2011-09-12 14:29:49 UTC (rev 11602)
@@ -0,0 +1,79 @@
+###############################################################################
+# OpenVAS Vulnerability Test
+#
+# Fedora Update for thunderbird FEDORA-2011-12280
+#
+# Authors:
+# System Generated Check
+#
+# Copyright:
+# Copyright (c) 2011 Greenbone Networks GmbH, http://www.greenbone.net
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2
+# (or any later version), as published by the Free Software Foundation.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+###############################################################################
+
+if(description)
+{
+  script_id(863491);
+  script_version("$Revision$: 1.0");
+  script_tag(name:"risk_factor", value:"High");
+  script_xref(name: "FEDORA", value: "2011-12280");
+  script_name("Fedora Update for thunderbird FEDORA-2011-12280");
+  desc = "
+
+  Vulnerability Insight:
+  Mozilla Thunderbird is a standalone mail and newsgroup client.
+
+
+  Affected Software/OS:
+  thunderbird on Fedora 15
+
+  Fix: Please Install the Updated Packages.
+
+  References:
+  http://lists.fedoraproject.org/pipermail/package-announce/2011-September/065699.html
+
+  ";
+
+  script_description(desc);
+  script_summary("Check for the Version of thunderbird");
+  script_category(ACT_GATHER_INFO);
+  script_copyright("Copyright (c) 2011 Greenbone Networks GmbH");
+  script_family("Fedora Local Security Checks");
+  script_dependencies("gather-package-list.nasl");
+  script_require_keys("ssh/login/release");
+  exit(0);
+}
+
+
+include("pkg-lib-rpm.inc");
+include("revisions-lib.inc");
+
+release = get_kb_item("ssh/login/release");
+
+if(release == NULL){
+  exit(0);
+}
+
+if(release == "FC15")
+{
+
+  if(isrpmvuln(pkg:"thunderbird", rpm:"thunderbird~6.0.2~1.fc15", rls:"FC15"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
\ No newline at end of file

Added: trunk/openvas-plugins/scripts/gb_fedora_2011_12280_xulrunner_fc15.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_fedora_2011_12280_xulrunner_fc15.nasl	2011-09-12 13:54:55 UTC (rev 11601)
+++ trunk/openvas-plugins/scripts/gb_fedora_2011_12280_xulrunner_fc15.nasl	2011-09-12 14:29:49 UTC (rev 11602)
@@ -0,0 +1,83 @@
+###############################################################################
+# OpenVAS Vulnerability Test
+#
+# Fedora Update for xulrunner FEDORA-2011-12280
+#
+# Authors:
+# System Generated Check
+#
+# Copyright:
+# Copyright (c) 2011 Greenbone Networks GmbH, http://www.greenbone.net
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2
+# (or any later version), as published by the Free Software Foundation.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+###############################################################################
+
+if(description)
+{
+  script_id(863500);
+  script_version("$Revision$: 1.0");
+  script_tag(name:"risk_factor", value:"High");
+  script_xref(name: "FEDORA", value: "2011-12280");
+  script_name("Fedora Update for xulrunner FEDORA-2011-12280");
+  desc = "
+
+  Vulnerability Insight:
+  XULRunner is a Mozilla runtime package that can be used to bootstrap XUL+XPCOM
+  applications that are as rich as Firefox and Thunderbird. It provides mechanisms
+  for installing, upgrading, and uninstalling these applications. XULRunner also
+  provides libxul, a solution which allows the embedding of Mozilla technologies
+  in other projects and products.
+
+
+  Affected Software/OS:
+  xulrunner on Fedora 15
+
+  Fix: Please Install the Updated Packages.
+
+  References:
+  http://lists.fedoraproject.org/pipermail/package-announce/2011-September/065700.html
+
+  ";
+
+  script_description(desc);
+  script_summary("Check for the Version of xulrunner");
+  script_category(ACT_GATHER_INFO);
+  script_copyright("Copyright (c) 2011 Greenbone Networks GmbH");
+  script_family("Fedora Local Security Checks");
+  script_dependencies("gather-package-list.nasl");
+  script_require_keys("ssh/login/release");
+  exit(0);
+}
+
+
+include("pkg-lib-rpm.inc");
+include("revisions-lib.inc");
+
+release = get_kb_item("ssh/login/release");
+
+if(release == NULL){
+  exit(0);
+}
+
+if(release == "FC15")
+{
+
+  if(isrpmvuln(pkg:"xulrunner", rpm:"xulrunner~6.0.2~1.fc15", rls:"FC15"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
\ No newline at end of file

Added: trunk/openvas-plugins/scripts/gb_fedora_2011_12281_openssl_fc14.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_fedora_2011_12281_openssl_fc14.nasl	2011-09-12 13:54:55 UTC (rev 11601)
+++ trunk/openvas-plugins/scripts/gb_fedora_2011_12281_openssl_fc14.nasl	2011-09-12 14:29:49 UTC (rev 11602)
@@ -0,0 +1,84 @@
+###############################################################################
+# OpenVAS Vulnerability Test
+#
+# Fedora Update for openssl FEDORA-2011-12281
+#
+# Authors:
+# System Generated Check
+#
+# Copyright:
+# Copyright (c) 2011 Greenbone Networks GmbH, http://www.greenbone.net
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2
+# (or any later version), as published by the Free Software Foundation.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+###############################################################################
+
+if(description)
+{
+  script_id(863499);
+  script_version("$Revision$: 1.0");
+  script_tag(name:"cvss_base", value:"7.6");
+  script_tag(name:"risk_factor", value:"High");
+  script_xref(name: "FEDORA", value: "2011-12281");
+  script_cve_id("CVE-2011-3207", "CVE-2011-0014", "CVE-2010-4180", "CVE-2010-3864");
+  script_name("Fedora Update for openssl FEDORA-2011-12281");
+  desc = "
+
+  Vulnerability Insight:
+  The OpenSSL toolkit provides support for secure communications between
+  machines. OpenSSL includes a certificate management tool and shared
+  libraries which provide various cryptographic algorithms and
+  protocols.
+
+
+  Affected Software/OS:
+  openssl on Fedora 14
+
+  Fix: Please Install the Updated Packages.
+
+  References:
+  http://lists.fedoraproject.org/pipermail/package-announce/2011-September/065712.html
+
+  ";
+
+  script_description(desc);
+  script_summary("Check for the Version of openssl");
+  script_category(ACT_GATHER_INFO);
+  script_copyright("Copyright (c) 2011 Greenbone Networks GmbH");
+  script_family("Fedora Local Security Checks");
+  script_dependencies("gather-package-list.nasl");
+  script_require_keys("ssh/login/release");
+  exit(0);
+}
+
+
+include("pkg-lib-rpm.inc");
+include("revisions-lib.inc");
+
+release = get_kb_item("ssh/login/release");
+
+if(release == NULL){
+  exit(0);
+}
+
+if(release == "FC14")
+{
+
+  if(isrpmvuln(pkg:"openssl", rpm:"openssl~1.0.0e~1.fc14", rls:"FC14"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
\ No newline at end of file

Added: trunk/openvas-plugins/scripts/gb_fedora_2011_12350_audacious-plugins_fc15.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_fedora_2011_12350_audacious-plugins_fc15.nasl	2011-09-12 13:54:55 UTC (rev 11601)
+++ trunk/openvas-plugins/scripts/gb_fedora_2011_12350_audacious-plugins_fc15.nasl	2011-09-12 14:29:49 UTC (rev 11602)
@@ -0,0 +1,86 @@
+###############################################################################
+# OpenVAS Vulnerability Test
+#
+# Fedora Update for audacious-plugins FEDORA-2011-12350
+#
+# Authors:
+# System Generated Check
+#
+# Copyright:
+# Copyright (c) 2011 Greenbone Networks GmbH, http://www.greenbone.net
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2
+# (or any later version), as published by the Free Software Foundation.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+###############################################################################
+
+if(description)
+{
+  script_id(863501);
+  script_version("$Revision$: 1.0");
+  script_tag(name:"risk_factor", value:"High");
+  script_xref(name: "FEDORA", value: "2011-12350");
+  script_name("Fedora Update for audacious-plugins FEDORA-2011-12350");
+  desc = "
+
+  Vulnerability Insight:
+  This package provides essential plugins for the Audacious audio player.
+  
+  Audacious is an advanced audio player. It is free, lightweight, based on
+  GTK2, runs on Linux and many other *nix platforms and is focused on audio
+  quality and supporting a wide range of audio codecs. It still features
+  an alternative skinned user interface (based on Winamp 2.x skins).
+  Historically, it started as a fork of Beep Media Player (BMP), which
+  itself forked from XMMS.
+
+
+  Affected Software/OS:
+  audacious-plugins on Fedora 15
+
+  Fix: Please Install the Updated Packages.
+
+  References:
+  http://lists.fedoraproject.org/pipermail/package-announce/2011-September/065720.html
+
+  ";
+
+  script_description(desc);
+  script_summary("Check for the Version of audacious-plugins");
+  script_category(ACT_GATHER_INFO);
+  script_copyright("Copyright (c) 2011 Greenbone Networks GmbH");
+  script_family("Fedora Local Security Checks");
+  script_dependencies("gather-package-list.nasl");
+  script_require_keys("ssh/login/release");
+  exit(0);
+}
+
+
+include("pkg-lib-rpm.inc");
+include("revisions-lib.inc");
+
+release = get_kb_item("ssh/login/release");
+
+if(release == NULL){
+  exit(0);
+}
+
+if(release == "FC15")
+{
+
+  if(isrpmvuln(pkg:"audacious-plugins", rpm:"audacious-plugins~2.5.4~2.fc15", rls:"FC15"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
\ No newline at end of file

Added: trunk/openvas-plugins/scripts/gb_fedora_2011_9319_libsndfile_fc14.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_fedora_2011_9319_libsndfile_fc14.nasl	2011-09-12 13:54:55 UTC (rev 11601)
+++ trunk/openvas-plugins/scripts/gb_fedora_2011_9319_libsndfile_fc14.nasl	2011-09-12 14:29:49 UTC (rev 11602)
@@ -0,0 +1,85 @@
+###############################################################################
+# OpenVAS Vulnerability Test
+#
+# Fedora Update for libsndfile FEDORA-2011-9319
+#
+# Authors:
+# System Generated Check
+#
+# Copyright:
+# Copyright (c) 2011 Greenbone Networks GmbH, http://www.greenbone.net
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2
+# (or any later version), as published by the Free Software Foundation.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+###############################################################################
+
+if(description)
+{
+  script_id(863480);
+  script_version("$Revision$: 1.0");
+  script_tag(name:"cvss_base", value:"6.8");
+  script_tag(name:"risk_factor", value:"High");
+  script_xref(name: "FEDORA", value: "2011-9319");
+  script_cve_id("CVE-2011-2696");
+  script_name("Fedora Update for libsndfile FEDORA-2011-9319");
+  desc = "
+
+  Vulnerability Insight:
+  libsndfile is a C library for reading and writing sound files such as
+  AIFF, AU, WAV, and others through one standard interface. It can
+  currently read/write 8, 16, 24 and 32-bit PCM files as well as 32 and
+  64-bit floating point WAV files and a number of compressed formats. It
+  compiles and runs on *nix, MacOS, and Win32.
+
+
+  Affected Software/OS:
+  libsndfile on Fedora 14
+
+  Fix: Please Install the Updated Packages.
+
+  References:
+  http://lists.fedoraproject.org/pipermail/package-announce/2011-September/065167.html
+
+  ";
+
+  script_description(desc);
+  script_summary("Check for the Version of libsndfile");
+  script_category(ACT_GATHER_INFO);
+  script_copyright("Copyright (c) 2011 Greenbone Networks GmbH");
+  script_family("Fedora Local Security Checks");
+  script_dependencies("gather-package-list.nasl");
+  script_require_keys("ssh/login/release");
+  exit(0);
+}
+
+
+include("pkg-lib-rpm.inc");
+include("revisions-lib.inc");
+
+release = get_kb_item("ssh/login/release");
+
+if(release == NULL){
+  exit(0);
+}
+
+if(release == "FC14")
+{
+
+  if(isrpmvuln(pkg:"libsndfile", rpm:"libsndfile~1.0.25~1.fc14", rls:"FC14"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
\ No newline at end of file

Added: trunk/openvas-plugins/scripts/gb_mandriva_MDVA_2011_032.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_mandriva_MDVA_2011_032.nasl	2011-09-12 13:54:55 UTC (rev 11601)
+++ trunk/openvas-plugins/scripts/gb_mandriva_MDVA_2011_032.nasl	2011-09-12 14:29:49 UTC (rev 11602)
@@ -0,0 +1,665 @@
+###############################################################################
+# OpenVAS Vulnerability Test
+#
+# Mandriva Update for kdepim4 MDVA-2011:032 (kdepim4)
+#
+# Authors:
+# System Generated Check
+#
+# Copyright:
+# Copyright (c) 2011 Greenbone Networks GmbH, http://www.greenbone.net
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2
+# (or any later version), as published by the Free Software Foundation.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+###############################################################################
+
+if(description)
+{
+  script_id(831453);
+  script_version("$Revision$: 1.0");
+  script_tag(name:"risk_factor", value:"High");
+  script_xref(name: "MDVA", value: "2011:032");
+  script_name("Mandriva Update for kdepim4 MDVA-2011:032 (kdepim4)");
+  desc = "
+
+  Vulnerability Insight:
+
+  It was discovered that kmail crashed sometimes when deleting mail
+  due to a broken patch for nepomuk support.
+  
+  The updated packages have been patched to correct this issue.
+
+  Affected Software/OS:
+  kdepim4 on Mandriva Linux 2010.1,
+  Mandriva Linux 2010.1/X86_64
+
+  Fix: Please Install the Updated Packages.
+
+  References:
+  http://lists.mandriva.com/security-announce/2011-09/msg00007.php
+
+  ";
+
+  script_description(desc);
+  script_summary("Check for the Version of kdepim4");
+  script_category(ACT_GATHER_INFO);
+  script_copyright("Copyright (c) 2011 Greenbone Networks GmbH");
+  script_family("Mandrake Local Security Checks");
+  script_dependencies("gather-package-list.nasl");
+  script_require_keys("ssh/login/release");
+  exit(0);
+}
+
+
+include("pkg-lib-rpm.inc");
+include("revisions-lib.inc");
+
+release = get_kb_item("ssh/login/release");
+
+if(release == NULL){
+  exit(0);
+}
+
+if(release == "MNDK_2010.1")
+{
+
+  if(isrpmvuln(pkg:"akonadiconsole", rpm:"akonadiconsole~4.4.9~0.3mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"akregator", rpm:"akregator~4.4.9~0.3mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"blogilo", rpm:"blogilo~4.4.9~0.3mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"kaddressbook", rpm:"kaddressbook~4.4.9~0.3mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"kalarm", rpm:"kalarm~4.4.9~0.3mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"kdepim4", rpm:"kdepim4~4.4.9~0.3mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"kdepim4-core", rpm:"kdepim4-core~4.4.9~0.3mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"kdepim4-devel", rpm:"kdepim4-devel~4.4.9~0.3mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"kdepim4-kresources", rpm:"kdepim4-kresources~4.4.9~0.3mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"kdepim4-wizards", rpm:"kdepim4-wizards~4.4.9~0.3mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"kjots", rpm:"kjots~4.4.9~0.3mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"kleopatra", rpm:"kleopatra~4.4.9~0.3mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"kmail", rpm:"kmail~4.4.9~0.3mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"kmailcvt", rpm:"kmailcvt~4.4.9~0.3mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"knode", rpm:"knode~4.4.9~0.3mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"knotes", rpm:"knotes~4.4.9~0.3mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"kontact", rpm:"kontact~4.4.9~0.3mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"korganizer", rpm:"korganizer~4.4.9~0.3mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"ksendemail", rpm:"ksendemail~4.4.9~0.3mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"ktimetracker", rpm:"ktimetracker~4.4.9~0.3mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"libakonadi-kcal_next4", rpm:"libakonadi-kcal_next4~4.4.9~0.3mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"libakonadi-next4", rpm:"libakonadi-next4~4.4.9~0.3mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"libakregatorinterfaces4", rpm:"libakregatorinterfaces4~4.4.9~0.3mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"libakregatorprivate4", rpm:"libakregatorprivate4~4.4.9~0.3mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"libgwsoap4", rpm:"libgwsoap4~4.4.9~0.3mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"libkabc_groupdav4", rpm:"libkabc_groupdav4~4.4.9~0.3mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"libkabc_groupwise4", rpm:"libkabc_groupwise4~4.4.9~0.3mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"libkabckolab4", rpm:"libkabckolab4~4.4.9~0.3mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"libkabc_slox4", rpm:"libkabc_slox4~4.4.9~0.3mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"libkaddressbookprivate4", rpm:"libkaddressbookprivate4~4.4.9~0.3mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"libkalarm_calendar4", rpm:"libkalarm_calendar4~4.4.9~0.3mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"libkalarm_resources4", rpm:"libkalarm_resources4~4.4.9~0.3mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"libkcal_groupdav4", rpm:"libkcal_groupdav4~4.4.9~0.3mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"libkcal_groupwise4", rpm:"libkcal_groupwise4~4.4.9~0.3mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"libkcalkolab4", rpm:"libkcalkolab4~4.4.9~0.3mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"libkcal_resourceblog4", rpm:"libkcal_resourceblog4~4.4.9~0.3mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"libkcal_resourceremote4", rpm:"libkcal_resourceremote4~4.4.9~0.3mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"libkcal_slox4", rpm:"libkcal_slox4~4.4.9~0.3mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"libkdepim4", rpm:"libkdepim4~4.4.9~0.3mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"libkgroupwarebase4", rpm:"libkgroupwarebase4~4.4.9~0.3mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"libkgroupwaredav4", rpm:"libkgroupwaredav4~4.4.9~0.3mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"libkleo4", rpm:"libkleo4~4.4.9~0.3mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"libkmailprivate4", rpm:"libkmailprivate4~4.4.9~0.3mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"libknodecommon4", rpm:"libknodecommon4~4.4.9~0.3mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"libknoteskolab4", rpm:"libknoteskolab4~4.4.9~0.3mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"libkontactprivate4", rpm:"libkontactprivate4~4.4.9~0.3mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"libkorganizer_calendar4", rpm:"libkorganizer_calendar4~4.4.9~0.3mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"libkorganizer_core4", rpm:"libkorganizer_core4~4.4.9~0.3mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"libkorganizer_eventviewer4", rpm:"libkorganizer_eventviewer4~4.4.9~0.3mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"libkorganizer_interfaces4", rpm:"libkorganizer_interfaces4~4.4.9~0.3mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"libkorganizerprivate4", rpm:"libkorganizerprivate4~4.4.9~0.3mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"libkorg_stdprinting4", rpm:"libkorg_stdprinting4~4.4.9~0.3mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"libkpgp4", rpm:"libkpgp4~4.4.9~0.3mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"libksieve4", rpm:"libksieve4~4.4.9~0.3mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"libkslox4", rpm:"libkslox4~4.4.9~0.3mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"libmessagecore4", rpm:"libmessagecore4~4.4.9~0.3mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"libmessagelist4", rpm:"libmessagelist4~4.4.9~0.3mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"libmessageviewer0", rpm:"libmessageviewer0~4.4.9~0.3mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"libmimelib4", rpm:"libmimelib4~4.4.9~0.3mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"lib64akonadi-kcal_next4", rpm:"lib64akonadi-kcal_next4~4.4.9~0.3mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"lib64akonadi-next4", rpm:"lib64akonadi-next4~4.4.9~0.3mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"lib64akregatorinterfaces4", rpm:"lib64akregatorinterfaces4~4.4.9~0.3mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"lib64akregatorprivate4", rpm:"lib64akregatorprivate4~4.4.9~0.3mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"lib64gwsoap4", rpm:"lib64gwsoap4~4.4.9~0.3mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"lib64kabc_groupdav4", rpm:"lib64kabc_groupdav4~4.4.9~0.3mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"lib64kabc_groupwise4", rpm:"lib64kabc_groupwise4~4.4.9~0.3mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"lib64kabckolab4", rpm:"lib64kabckolab4~4.4.9~0.3mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"lib64kabc_slox4", rpm:"lib64kabc_slox4~4.4.9~0.3mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"lib64kaddressbookprivate4", rpm:"lib64kaddressbookprivate4~4.4.9~0.3mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"lib64kalarm_calendar4", rpm:"lib64kalarm_calendar4~4.4.9~0.3mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"lib64kalarm_resources4", rpm:"lib64kalarm_resources4~4.4.9~0.3mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"lib64kcal_groupdav4", rpm:"lib64kcal_groupdav4~4.4.9~0.3mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"lib64kcal_groupwise4", rpm:"lib64kcal_groupwise4~4.4.9~0.3mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"lib64kcalkolab4", rpm:"lib64kcalkolab4~4.4.9~0.3mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"lib64kcal_resourceblog4", rpm:"lib64kcal_resourceblog4~4.4.9~0.3mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"lib64kcal_resourceremote4", rpm:"lib64kcal_resourceremote4~4.4.9~0.3mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"lib64kcal_slox4", rpm:"lib64kcal_slox4~4.4.9~0.3mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"lib64kdepim4", rpm:"lib64kdepim4~4.4.9~0.3mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"lib64kgroupwarebase4", rpm:"lib64kgroupwarebase4~4.4.9~0.3mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"lib64kgroupwaredav4", rpm:"lib64kgroupwaredav4~4.4.9~0.3mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"lib64kleo4", rpm:"lib64kleo4~4.4.9~0.3mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"lib64kmailprivate4", rpm:"lib64kmailprivate4~4.4.9~0.3mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"lib64knodecommon4", rpm:"lib64knodecommon4~4.4.9~0.3mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"lib64knoteskolab4", rpm:"lib64knoteskolab4~4.4.9~0.3mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"lib64kontactprivate4", rpm:"lib64kontactprivate4~4.4.9~0.3mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"lib64korganizer_calendar4", rpm:"lib64korganizer_calendar4~4.4.9~0.3mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"lib64korganizer_core4", rpm:"lib64korganizer_core4~4.4.9~0.3mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"lib64korganizer_eventviewer4", rpm:"lib64korganizer_eventviewer4~4.4.9~0.3mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"lib64korganizer_interfaces4", rpm:"lib64korganizer_interfaces4~4.4.9~0.3mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"lib64korganizerprivate4", rpm:"lib64korganizerprivate4~4.4.9~0.3mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"lib64korg_stdprinting4", rpm:"lib64korg_stdprinting4~4.4.9~0.3mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"lib64kpgp4", rpm:"lib64kpgp4~4.4.9~0.3mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"lib64ksieve4", rpm:"lib64ksieve4~4.4.9~0.3mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"lib64kslox4", rpm:"lib64kslox4~4.4.9~0.3mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"lib64messagecore4", rpm:"lib64messagecore4~4.4.9~0.3mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"lib64messagelist4", rpm:"lib64messagelist4~4.4.9~0.3mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"lib64messageviewer0", rpm:"lib64messageviewer0~4.4.9~0.3mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"lib64mimelib4", rpm:"lib64mimelib4~4.4.9~0.3mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
\ No newline at end of file

Added: trunk/openvas-plugins/scripts/gb_mandriva_MDVSA_2011_132.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_mandriva_MDVSA_2011_132.nasl	2011-09-12 13:54:55 UTC (rev 11601)
+++ trunk/openvas-plugins/scripts/gb_mandriva_MDVSA_2011_132.nasl	2011-09-12 14:29:49 UTC (rev 11602)
@@ -0,0 +1,429 @@
+###############################################################################
+# OpenVAS Vulnerability Test
+#
+# Mandriva Update for pidgin MDVSA-2011:132 (pidgin)
+#
+# Authors:
+# System Generated Check
+#
+# Copyright:
+# Copyright (c) 2011 Greenbone Networks GmbH, http://www.greenbone.net
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2
+# (or any later version), as published by the Free Software Foundation.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+###############################################################################
+
+if(description)
+{
+  script_id(831451);
+  script_version("$Revision$: 1.0");
+  script_tag(name:"cvss_base", value:"4.3");
+  script_tag(name:"risk_factor", value:"Medium");
+  script_xref(name: "MDVSA", value: "2011:132");
+  script_cve_id("CVE-2011-2485", "CVE-2011-2943", "CVE-2011-3184");
+  script_name("Mandriva Update for pidgin MDVSA-2011:132 (pidgin)");
+  desc = "
+
+  Vulnerability Insight:
+
+  Multiple vulnerabilities has been identified and fixed in pidgin:
+  
+  It was found that the gdk-pixbuf GIF image loader routine
+  gdk_pixbuf__gif_image_load() did not properly handle certain return
+  values from its subroutines. A remote attacker could provide a
+  specially-crafted GIF image, which, once opened in Pidgin, would lead
+  gdk-pixbuf to return a partially initialized pixbuf structure. Using
+  this structure, possibly containing a huge width and height, could
+  lead to the application being terminated due to excessive memory use
+  (CVE-2011-2485).
+  
+  Certain characters in the nicknames of IRC users can trigger a
+  null pointer dereference in the IRC protocol plugin&amp;#039;s handling of
+  responses to WHO requests. This can cause a crash on some operating
+  systems. Clients based on libpurple 2.8.0 through 2.9.0 are affected
+  (CVE-2011-2943).
+  
+  Incorrect handling of HTTP 100 responses in the MSN protocol plugin
+  can cause the application to attempt to access memory that it does
+  not have access to. This only affects users who have turned on the
+  HTTP connection method for their accounts (it&amp;#039;s off by default). This
+  might only be triggerable by a malicious server and not a malicious
+  peer. We believe remote code execution is not possible (CVE-2011-3184).
+  
+  Packages for 2009.0 are provided as of the Extended Maintenance
+  Program. Please visit this link to learn more:
+  http://store.mandriva.com/product_info.php?cPath=149&amp;amp;products_id=490
+  
+  This update provides pidgin 2.10.0, which is not vulnerable to
+  these issues.
+
+  Affected Software/OS:
+  pidgin on Mandriva Linux 2009.0,
+  Mandriva Linux 2009.0/X86_64,
+  Mandriva Linux 2010.1,
+  Mandriva Linux 2010.1/X86_64,
+  Mandriva Enterprise Server 5,
+  Mandriva Enterprise Server 5/X86_64
+
+  Fix: Please Install the Updated Packages.
+
+  References:
+  http://lists.mandriva.com/security-announce/2011-09/msg00005.php
+
+  ";
+
+  script_description(desc);
+  script_summary("Check for the Version of pidgin");
+  script_category(ACT_GATHER_INFO);
+  script_copyright("Copyright (c) 2011 Greenbone Networks GmbH");
+  script_family("Mandrake Local Security Checks");
+  script_dependencies("gather-package-list.nasl");
+  script_require_keys("ssh/login/release");
+  exit(0);
+}
+
+
+include("pkg-lib-rpm.inc");
+include("revisions-lib.inc");
+
+release = get_kb_item("ssh/login/release");
+
+if(release == NULL){
+  exit(0);
+}
+
+if(release == "MNDK_mes5")
+{
+
+  if(isrpmvuln(pkg:"finch", rpm:"finch~2.10.0~0.1mdvmes5.2", rls:"MNDK_mes5"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"libfinch0", rpm:"libfinch0~2.10.0~0.1mdvmes5.2", rls:"MNDK_mes5"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"libpurple0", rpm:"libpurple0~2.10.0~0.1mdvmes5.2", rls:"MNDK_mes5"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"libpurple-devel", rpm:"libpurple-devel~2.10.0~0.1mdvmes5.2", rls:"MNDK_mes5"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"pidgin", rpm:"pidgin~2.10.0~0.1mdvmes5.2", rls:"MNDK_mes5"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"pidgin-bonjour", rpm:"pidgin-bonjour~2.10.0~0.1mdvmes5.2", rls:"MNDK_mes5"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"pidgin-client", rpm:"pidgin-client~2.10.0~0.1mdvmes5.2", rls:"MNDK_mes5"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"pidgin-gevolution", rpm:"pidgin-gevolution~2.10.0~0.1mdvmes5.2", rls:"MNDK_mes5"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"pidgin-i18n", rpm:"pidgin-i18n~2.10.0~0.1mdvmes5.2", rls:"MNDK_mes5"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"pidgin-meanwhile", rpm:"pidgin-meanwhile~2.10.0~0.1mdvmes5.2", rls:"MNDK_mes5"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"pidgin-perl", rpm:"pidgin-perl~2.10.0~0.1mdvmes5.2", rls:"MNDK_mes5"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"pidgin-plugins", rpm:"pidgin-plugins~2.10.0~0.1mdvmes5.2", rls:"MNDK_mes5"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"pidgin-silc", rpm:"pidgin-silc~2.10.0~0.1mdvmes5.2", rls:"MNDK_mes5"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"pidgin-tcl", rpm:"pidgin-tcl~2.10.0~0.1mdvmes5.2", rls:"MNDK_mes5"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"lib64finch0", rpm:"lib64finch0~2.10.0~0.1mdvmes5.2", rls:"MNDK_mes5"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"lib64purple0", rpm:"lib64purple0~2.10.0~0.1mdvmes5.2", rls:"MNDK_mes5"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"lib64purple-devel", rpm:"lib64purple-devel~2.10.0~0.1mdvmes5.2", rls:"MNDK_mes5"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "MNDK_2010.1")
+{
+
+  if(isrpmvuln(pkg:"finch", rpm:"finch~2.10.0~0.1mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"libfinch0", rpm:"libfinch0~2.10.0~0.1mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"libpurple0", rpm:"libpurple0~2.10.0~0.1mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"libpurple-devel", rpm:"libpurple-devel~2.10.0~0.1mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"pidgin", rpm:"pidgin~2.10.0~0.1mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"pidgin-bonjour", rpm:"pidgin-bonjour~2.10.0~0.1mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"pidgin-client", rpm:"pidgin-client~2.10.0~0.1mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"pidgin-gevolution", rpm:"pidgin-gevolution~2.10.0~0.1mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"pidgin-i18n", rpm:"pidgin-i18n~2.10.0~0.1mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"pidgin-meanwhile", rpm:"pidgin-meanwhile~2.10.0~0.1mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"pidgin-perl", rpm:"pidgin-perl~2.10.0~0.1mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"pidgin-plugins", rpm:"pidgin-plugins~2.10.0~0.1mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"pidgin-silc", rpm:"pidgin-silc~2.10.0~0.1mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"pidgin-tcl", rpm:"pidgin-tcl~2.10.0~0.1mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"lib64finch0", rpm:"lib64finch0~2.10.0~0.1mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"lib64purple0", rpm:"lib64purple0~2.10.0~0.1mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"lib64purple-devel", rpm:"lib64purple-devel~2.10.0~0.1mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "MNDK_2009.0")
+{
+
+  if(isrpmvuln(pkg:"finch", rpm:"finch~2.10.0~0.1mdv2009.0", rls:"MNDK_2009.0"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"libfinch0", rpm:"libfinch0~2.10.0~0.1mdv2009.0", rls:"MNDK_2009.0"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"libpurple0", rpm:"libpurple0~2.10.0~0.1mdv2009.0", rls:"MNDK_2009.0"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"libpurple-devel", rpm:"libpurple-devel~2.10.0~0.1mdv2009.0", rls:"MNDK_2009.0"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"pidgin", rpm:"pidgin~2.10.0~0.1mdv2009.0", rls:"MNDK_2009.0"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"pidgin-bonjour", rpm:"pidgin-bonjour~2.10.0~0.1mdv2009.0", rls:"MNDK_2009.0"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"pidgin-client", rpm:"pidgin-client~2.10.0~0.1mdv2009.0", rls:"MNDK_2009.0"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"pidgin-gevolution", rpm:"pidgin-gevolution~2.10.0~0.1mdv2009.0", rls:"MNDK_2009.0"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"pidgin-i18n", rpm:"pidgin-i18n~2.10.0~0.1mdv2009.0", rls:"MNDK_2009.0"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"pidgin-meanwhile", rpm:"pidgin-meanwhile~2.10.0~0.1mdv2009.0", rls:"MNDK_2009.0"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"pidgin-perl", rpm:"pidgin-perl~2.10.0~0.1mdv2009.0", rls:"MNDK_2009.0"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"pidgin-plugins", rpm:"pidgin-plugins~2.10.0~0.1mdv2009.0", rls:"MNDK_2009.0"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"pidgin-silc", rpm:"pidgin-silc~2.10.0~0.1mdv2009.0", rls:"MNDK_2009.0"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"pidgin-tcl", rpm:"pidgin-tcl~2.10.0~0.1mdv2009.0", rls:"MNDK_2009.0"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"lib64finch0", rpm:"lib64finch0~2.10.0~0.1mdv2009.0", rls:"MNDK_2009.0"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"lib64purple0", rpm:"lib64purple0~2.10.0~0.1mdv2009.0", rls:"MNDK_2009.0"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"lib64purple-devel", rpm:"lib64purple-devel~2.10.0~0.1mdv2009.0", rls:"MNDK_2009.0"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
\ No newline at end of file

Added: trunk/openvas-plugins/scripts/gb_mandriva_MDVSA_2011_133.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_mandriva_MDVSA_2011_133.nasl	2011-09-12 13:54:55 UTC (rev 11601)
+++ trunk/openvas-plugins/scripts/gb_mandriva_MDVSA_2011_133.nasl	2011-09-12 14:29:49 UTC (rev 11602)
@@ -0,0 +1,2858 @@
+###############################################################################
+# OpenVAS Vulnerability Test
+#
+# Mandriva Update for mozilla MDVSA-2011:133 (mozilla)
+#
+# Authors:
+# System Generated Check
+#
+# Copyright:
+# Copyright (c) 2011 Greenbone Networks GmbH, http://www.greenbone.net
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2
+# (or any later version), as published by the Free Software Foundation.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+###############################################################################
+
+if(description)
+{
+  script_id(831450);
+  script_version("$Revision$: 1.0");
+  script_tag(name:"risk_factor", value:"High");
+  script_xref(name: "MDVSA", value: "2011:133");
+  script_name("Mandriva Update for mozilla MDVSA-2011:133 (mozilla)");
+  desc = "
+
+  Vulnerability Insight:
+
+  Security issues were identified and fixed in mozilla firefox and
+  thunderbird:
+  
+  As more information has come to light about the attack on the DigiNotar
+  Certificate Authority we have improved the protections added in MFSA
+  2011-34. The main change is to add explicit distrust to the DigiNotar
+  root certificate and several intermediates. Removing the root as in
+  our previous fix meant the certificates could be considered valid if
+  cross-signed by another Certificate Authority. Importantly this list
+  of distrusted certificates includes the PKIOverheid (PKIGovernment)
+  intermediates under DigiNotar&amp;#039;s control that did not chain to
+  DigiNotar&amp;#039;s root and were not previously blocked.
+  
+  Packages for 2009.0 are provided as of the Extended Maintenance
+  Program. Please visit this link to learn more:
+  http://store.mandriva.com/product_info.php?cPath=149&amp;amp;products_id=490
+  
+  Additionally, some packages which require so, have been rebuilt and
+  are being provided as updates.
+
+  Affected Software/OS:
+  mozilla on Mandriva Linux 2009.0,
+  Mandriva Linux 2009.0/X86_64,
+  Mandriva Linux 2010.1,
+  Mandriva Linux 2010.1/X86_64,
+  Mandriva Enterprise Server 5,
+  Mandriva Enterprise Server 5/X86_64
+
+  Fix: Please Install the Updated Packages.
+
+  References:
+  http://lists.mandriva.com/security-announce/2011-09/msg00006.php
+
+  ";
+
+  script_description(desc);
+  script_summary("Check for the Version of mozilla");
+  script_category(ACT_GATHER_INFO);
+  script_copyright("Copyright (c) 2011 Greenbone Networks GmbH");
+  script_family("Mandrake Local Security Checks");
+  script_dependencies("gather-package-list.nasl");
+  script_require_keys("ssh/login/release");
+  exit(0);
+}
+
+
+include("pkg-lib-rpm.inc");
+include("revisions-lib.inc");
+
+release = get_kb_item("ssh/login/release");
+
+if(release == NULL){
+  exit(0);
+}
+
+if(release == "MNDK_mes5")
+{
+
+  if(isrpmvuln(pkg:"firefox", rpm:"firefox~3.6.22~0.1mdvmes5.2", rls:"MNDK_mes5"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"firefox-af", rpm:"firefox-af~3.6.22~0.1mdvmes5.2", rls:"MNDK_mes5"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"firefox-ar", rpm:"firefox-ar~3.6.22~0.1mdvmes5.2", rls:"MNDK_mes5"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"firefox-be", rpm:"firefox-be~3.6.22~0.1mdvmes5.2", rls:"MNDK_mes5"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"firefox-bg", rpm:"firefox-bg~3.6.22~0.1mdvmes5.2", rls:"MNDK_mes5"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"firefox-bn", rpm:"firefox-bn~3.6.22~0.1mdvmes5.2", rls:"MNDK_mes5"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"firefox-ca", rpm:"firefox-ca~3.6.22~0.1mdvmes5.2", rls:"MNDK_mes5"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"firefox-cs", rpm:"firefox-cs~3.6.22~0.1mdvmes5.2", rls:"MNDK_mes5"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"firefox-cy", rpm:"firefox-cy~3.6.22~0.1mdvmes5.2", rls:"MNDK_mes5"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"firefox-da", rpm:"firefox-da~3.6.22~0.1mdvmes5.2", rls:"MNDK_mes5"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"firefox-de", rpm:"firefox-de~3.6.22~0.1mdvmes5.2", rls:"MNDK_mes5"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"firefox-devel", rpm:"firefox-devel~3.6.22~0.1mdvmes5.2", rls:"MNDK_mes5"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"firefox-el", rpm:"firefox-el~3.6.22~0.1mdvmes5.2", rls:"MNDK_mes5"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"firefox-en_GB", rpm:"firefox-en_GB~3.6.22~0.1mdvmes5.2", rls:"MNDK_mes5"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"firefox-eo", rpm:"firefox-eo~3.6.22~0.1mdvmes5.2", rls:"MNDK_mes5"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"firefox-es_AR", rpm:"firefox-es_AR~3.6.22~0.1mdvmes5.2", rls:"MNDK_mes5"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"firefox-es_ES", rpm:"firefox-es_ES~3.6.22~0.1mdvmes5.2", rls:"MNDK_mes5"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"firefox-et", rpm:"firefox-et~3.6.22~0.1mdvmes5.2", rls:"MNDK_mes5"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"firefox-eu", rpm:"firefox-eu~3.6.22~0.1mdvmes5.2", rls:"MNDK_mes5"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"firefox-fi", rpm:"firefox-fi~3.6.22~0.1mdvmes5.2", rls:"MNDK_mes5"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"firefox-fr", rpm:"firefox-fr~3.6.22~0.1mdvmes5.2", rls:"MNDK_mes5"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"firefox-fy", rpm:"firefox-fy~3.6.22~0.1mdvmes5.2", rls:"MNDK_mes5"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"firefox-ga_IE", rpm:"firefox-ga_IE~3.6.22~0.1mdvmes5.2", rls:"MNDK_mes5"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"firefox-gl", rpm:"firefox-gl~3.6.22~0.1mdvmes5.2", rls:"MNDK_mes5"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"firefox-gu_IN", rpm:"firefox-gu_IN~3.6.22~0.1mdvmes5.2", rls:"MNDK_mes5"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"firefox-he", rpm:"firefox-he~3.6.22~0.1mdvmes5.2", rls:"MNDK_mes5"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"firefox-hi", rpm:"firefox-hi~3.6.22~0.1mdvmes5.2", rls:"MNDK_mes5"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"firefox-hu", rpm:"firefox-hu~3.6.22~0.1mdvmes5.2", rls:"MNDK_mes5"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"firefox-id", rpm:"firefox-id~3.6.22~0.1mdvmes5.2", rls:"MNDK_mes5"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"firefox-is", rpm:"firefox-is~3.6.22~0.1mdvmes5.2", rls:"MNDK_mes5"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"firefox-it", rpm:"firefox-it~3.6.22~0.1mdvmes5.2", rls:"MNDK_mes5"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"firefox-ja", rpm:"firefox-ja~3.6.22~0.1mdvmes5.2", rls:"MNDK_mes5"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"firefox-ka", rpm:"firefox-ka~3.6.22~0.1mdvmes5.2", rls:"MNDK_mes5"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"firefox-kn", rpm:"firefox-kn~3.6.22~0.1mdvmes5.2", rls:"MNDK_mes5"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"firefox-ko", rpm:"firefox-ko~3.6.22~0.1mdvmes5.2", rls:"MNDK_mes5"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"firefox-ku", rpm:"firefox-ku~3.6.22~0.1mdvmes5.2", rls:"MNDK_mes5"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"firefox-lt", rpm:"firefox-lt~3.6.22~0.1mdvmes5.2", rls:"MNDK_mes5"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"firefox-lv", rpm:"firefox-lv~3.6.22~0.1mdvmes5.2", rls:"MNDK_mes5"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"firefox-mk", rpm:"firefox-mk~3.6.22~0.1mdvmes5.2", rls:"MNDK_mes5"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"firefox-mr", rpm:"firefox-mr~3.6.22~0.1mdvmes5.2", rls:"MNDK_mes5"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"firefox-nb_NO", rpm:"firefox-nb_NO~3.6.22~0.1mdvmes5.2", rls:"MNDK_mes5"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"firefox-nl", rpm:"firefox-nl~3.6.22~0.1mdvmes5.2", rls:"MNDK_mes5"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"firefox-nn_NO", rpm:"firefox-nn_NO~3.6.22~0.1mdvmes5.2", rls:"MNDK_mes5"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"firefox-oc", rpm:"firefox-oc~3.6.22~0.1mdvmes5.2", rls:"MNDK_mes5"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"firefox-pa_IN", rpm:"firefox-pa_IN~3.6.22~0.1mdvmes5.2", rls:"MNDK_mes5"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"firefox-pl", rpm:"firefox-pl~3.6.22~0.1mdvmes5.2", rls:"MNDK_mes5"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"firefox-pt_BR", rpm:"firefox-pt_BR~3.6.22~0.1mdvmes5.2", rls:"MNDK_mes5"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"firefox-pt_PT", rpm:"firefox-pt_PT~3.6.22~0.1mdvmes5.2", rls:"MNDK_mes5"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"firefox-ro", rpm:"firefox-ro~3.6.22~0.1mdvmes5.2", rls:"MNDK_mes5"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"firefox-ru", rpm:"firefox-ru~3.6.22~0.1mdvmes5.2", rls:"MNDK_mes5"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"firefox-si", rpm:"firefox-si~3.6.22~0.1mdvmes5.2", rls:"MNDK_mes5"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"firefox-sk", rpm:"firefox-sk~3.6.22~0.1mdvmes5.2", rls:"MNDK_mes5"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"firefox-sl", rpm:"firefox-sl~3.6.22~0.1mdvmes5.2", rls:"MNDK_mes5"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"firefox-sq", rpm:"firefox-sq~3.6.22~0.1mdvmes5.2", rls:"MNDK_mes5"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"firefox-sr", rpm:"firefox-sr~3.6.22~0.1mdvmes5.2", rls:"MNDK_mes5"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"firefox-sv_SE", rpm:"firefox-sv_SE~3.6.22~0.1mdvmes5.2", rls:"MNDK_mes5"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"firefox-te", rpm:"firefox-te~3.6.22~0.1mdvmes5.2", rls:"MNDK_mes5"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"firefox-th", rpm:"firefox-th~3.6.22~0.1mdvmes5.2", rls:"MNDK_mes5"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"firefox-tr", rpm:"firefox-tr~3.6.22~0.1mdvmes5.2", rls:"MNDK_mes5"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"firefox-uk", rpm:"firefox-uk~3.6.22~0.1mdvmes5.2", rls:"MNDK_mes5"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"firefox-zh_CN", rpm:"firefox-zh_CN~3.6.22~0.1mdvmes5.2", rls:"MNDK_mes5"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"firefox-zh_TW", rpm:"firefox-zh_TW~3.6.22~0.1mdvmes5.2", rls:"MNDK_mes5"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"gnome-python-extras", rpm:"gnome-python-extras~2.19.1~20.31mdvmes5.2", rls:"MNDK_mes5"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"gnome-python-gda", rpm:"gnome-python-gda~2.19.1~20.31mdvmes5.2", rls:"MNDK_mes5"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"gnome-python-gda-devel", rpm:"gnome-python-gda-devel~2.19.1~20.31mdvmes5.2", rls:"MNDK_mes5"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"gnome-python-gdl", rpm:"gnome-python-gdl~2.19.1~20.31mdvmes5.2", rls:"MNDK_mes5"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"gnome-python-gtkhtml2", rpm:"gnome-python-gtkhtml2~2.19.1~20.31mdvmes5.2", rls:"MNDK_mes5"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"gnome-python-gtkmozembed", rpm:"gnome-python-gtkmozembed~2.19.1~20.31mdvmes5.2", rls:"MNDK_mes5"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"gnome-python-gtkspell", rpm:"gnome-python-gtkspell~2.19.1~20.31mdvmes5.2", rls:"MNDK_mes5"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"libnss3", rpm:"libnss3~3.12.11~0.4mdvmes5.2", rls:"MNDK_mes5"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"libnss-devel", rpm:"libnss-devel~3.12.11~0.4mdvmes5.2", rls:"MNDK_mes5"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"libnss-static-devel", rpm:"libnss-static-devel~3.12.11~0.4mdvmes5.2", rls:"MNDK_mes5"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"libxulrunner1.9.2.22", rpm:"libxulrunner1.9.2.22~1.9.2.22~0.1mdvmes5.2", rls:"MNDK_mes5"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"libxulrunner-devel", rpm:"libxulrunner-devel~1.9.2.22~0.1mdvmes5.2", rls:"MNDK_mes5"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"nss", rpm:"nss~3.12.11~0.4mdvmes5.2", rls:"MNDK_mes5"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"rootcerts", rpm:"rootcerts~20110902.00~1mdvmes5.2", rls:"MNDK_mes5"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"rootcerts-java", rpm:"rootcerts-java~20110902.00~1mdvmes5.2", rls:"MNDK_mes5"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"xulrunner", rpm:"xulrunner~1.9.2.22~0.1mdvmes5.2", rls:"MNDK_mes5"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"yelp", rpm:"yelp~2.24.0~3.32mdvmes5.2", rls:"MNDK_mes5"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"firefox-l10n", rpm:"firefox-l10n~3.6.22~0.1mdvmes5.2", rls:"MNDK_mes5"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"lib64nss3", rpm:"lib64nss3~3.12.11~0.4mdvmes5.2", rls:"MNDK_mes5"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"lib64nss-devel", rpm:"lib64nss-devel~3.12.11~0.4mdvmes5.2", rls:"MNDK_mes5"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"lib64nss-static-devel", rpm:"lib64nss-static-devel~3.12.11~0.4mdvmes5.2", rls:"MNDK_mes5"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"lib64xulrunner1.9.2.22", rpm:"lib64xulrunner1.9.2.22~1.9.2.22~0.1mdvmes5.2", rls:"MNDK_mes5"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"lib64xulrunner-devel", rpm:"lib64xulrunner-devel~1.9.2.22~0.1mdvmes5.2", rls:"MNDK_mes5"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "MNDK_2010.1")
+{
+
+  if(isrpmvuln(pkg:"beagle", rpm:"beagle~0.3.9~40.19mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"beagle-crawl-system", rpm:"beagle-crawl-system~0.3.9~40.19mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"beagle-doc", rpm:"beagle-doc~0.3.9~40.19mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"beagle-evolution", rpm:"beagle-evolution~0.3.9~40.19mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"beagle-gui", rpm:"beagle-gui~0.3.9~40.19mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"beagle-gui-qt", rpm:"beagle-gui-qt~0.3.9~40.19mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"beagle-libs", rpm:"beagle-libs~0.3.9~40.19mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"firefox", rpm:"firefox~3.6.22~0.1mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"firefox-af", rpm:"firefox-af~3.6.22~0.1mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"firefox-ar", rpm:"firefox-ar~3.6.22~0.1mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"firefox-be", rpm:"firefox-be~3.6.22~0.1mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"firefox-bg", rpm:"firefox-bg~3.6.22~0.1mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"firefox-bn", rpm:"firefox-bn~3.6.22~0.1mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"firefox-ca", rpm:"firefox-ca~3.6.22~0.1mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"firefox-cs", rpm:"firefox-cs~3.6.22~0.1mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"firefox-cy", rpm:"firefox-cy~3.6.22~0.1mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"firefox-da", rpm:"firefox-da~3.6.22~0.1mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"firefox-de", rpm:"firefox-de~3.6.22~0.1mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"firefox-devel", rpm:"firefox-devel~3.6.22~0.1mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"firefox-el", rpm:"firefox-el~3.6.22~0.1mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"firefox-en_GB", rpm:"firefox-en_GB~3.6.22~0.1mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"firefox-eo", rpm:"firefox-eo~3.6.22~0.1mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"firefox-es_AR", rpm:"firefox-es_AR~3.6.22~0.1mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"firefox-es_ES", rpm:"firefox-es_ES~3.6.22~0.1mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"firefox-et", rpm:"firefox-et~3.6.22~0.1mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"firefox-eu", rpm:"firefox-eu~3.6.22~0.1mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"firefox-ext-beagle", rpm:"firefox-ext-beagle~0.3.9~40.19mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"firefox-ext-blogrovr", rpm:"firefox-ext-blogrovr~1.1.804~13.15mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"firefox-ext-mozvoikko", rpm:"firefox-ext-mozvoikko~1.0.1~2.15mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"firefox-ext-r-kiosk", rpm:"firefox-ext-r-kiosk~0.8.1~2.15mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"firefox-ext-scribefire", rpm:"firefox-ext-scribefire~3.5.2~2.15mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"firefox-ext-weave-sync", rpm:"firefox-ext-weave-sync~1.1~5.15mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"firefox-ext-xmarks", rpm:"firefox-ext-xmarks~3.6.14~2.15mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"firefox-fi", rpm:"firefox-fi~3.6.22~0.1mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"firefox-fr", rpm:"firefox-fr~3.6.22~0.1mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"firefox-fy", rpm:"firefox-fy~3.6.22~0.1mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"firefox-ga_IE", rpm:"firefox-ga_IE~3.6.22~0.1mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"firefox-gl", rpm:"firefox-gl~3.6.22~0.1mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"firefox-gu_IN", rpm:"firefox-gu_IN~3.6.22~0.1mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"firefox-he", rpm:"firefox-he~3.6.22~0.1mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"firefox-hi", rpm:"firefox-hi~3.6.22~0.1mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"firefox-hu", rpm:"firefox-hu~3.6.22~0.1mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"firefox-id", rpm:"firefox-id~3.6.22~0.1mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"firefox-is", rpm:"firefox-is~3.6.22~0.1mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"firefox-it", rpm:"firefox-it~3.6.22~0.1mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"firefox-ja", rpm:"firefox-ja~3.6.22~0.1mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"firefox-ka", rpm:"firefox-ka~3.6.22~0.1mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"firefox-kn", rpm:"firefox-kn~3.6.22~0.1mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"firefox-ko", rpm:"firefox-ko~3.6.22~0.1mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"firefox-ku", rpm:"firefox-ku~3.6.22~0.1mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"firefox-lt", rpm:"firefox-lt~3.6.22~0.1mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"firefox-lv", rpm:"firefox-lv~3.6.22~0.1mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"firefox-mk", rpm:"firefox-mk~3.6.22~0.1mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"firefox-mr", rpm:"firefox-mr~3.6.22~0.1mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"firefox-nb_NO", rpm:"firefox-nb_NO~3.6.22~0.1mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"firefox-nl", rpm:"firefox-nl~3.6.22~0.1mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"firefox-nn_NO", rpm:"firefox-nn_NO~3.6.22~0.1mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"firefox-oc", rpm:"firefox-oc~3.6.22~0.1mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"firefox-pa_IN", rpm:"firefox-pa_IN~3.6.22~0.1mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"firefox-pl", rpm:"firefox-pl~3.6.22~0.1mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"firefox-pt_BR", rpm:"firefox-pt_BR~3.6.22~0.1mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"firefox-pt_PT", rpm:"firefox-pt_PT~3.6.22~0.1mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"firefox-ro", rpm:"firefox-ro~3.6.22~0.1mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"firefox-ru", rpm:"firefox-ru~3.6.22~0.1mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"firefox-si", rpm:"firefox-si~3.6.22~0.1mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"firefox-sk", rpm:"firefox-sk~3.6.22~0.1mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"firefox-sl", rpm:"firefox-sl~3.6.22~0.1mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"firefox-sq", rpm:"firefox-sq~3.6.22~0.1mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"firefox-sr", rpm:"firefox-sr~3.6.22~0.1mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"firefox-sv_SE", rpm:"firefox-sv_SE~3.6.22~0.1mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"firefox-te", rpm:"firefox-te~3.6.22~0.1mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"firefox-th", rpm:"firefox-th~3.6.22~0.1mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"firefox-tr", rpm:"firefox-tr~3.6.22~0.1mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"firefox-uk", rpm:"firefox-uk~3.6.22~0.1mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"firefox-zh_CN", rpm:"firefox-zh_CN~3.6.22~0.1mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"firefox-zh_TW", rpm:"firefox-zh_TW~3.6.22~0.1mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"gjs", rpm:"gjs~0.6~4.15mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"gnome-python-extras", rpm:"gnome-python-extras~2.25.3~18.15mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"gnome-python-gda", rpm:"gnome-python-gda~2.25.3~18.15mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"gnome-python-gda-devel", rpm:"gnome-python-gda-devel~2.25.3~18.15mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"gnome-python-gdl", rpm:"gnome-python-gdl~2.25.3~18.15mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"gnome-python-gtkhtml2", rpm:"gnome-python-gtkhtml2~2.25.3~18.15mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"gnome-python-gtkmozembed", rpm:"gnome-python-gtkmozembed~2.25.3~18.15mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"gnome-python-gtkspell", rpm:"gnome-python-gtkspell~2.25.3~18.15mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"libgjs0", rpm:"libgjs0~0.6~4.15mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"libgjs-devel", rpm:"libgjs-devel~0.6~4.15mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"libnss3", rpm:"libnss3~3.12.11~0.4mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"libnss-devel", rpm:"libnss-devel~3.12.11~0.4mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"libnss-static-devel", rpm:"libnss-static-devel~3.12.11~0.4mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"libxulrunner1.9.2.22", rpm:"libxulrunner1.9.2.22~1.9.2.22~0.1mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"libxulrunner-devel", rpm:"libxulrunner-devel~1.9.2.22~0.1mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"mozilla-thunderbird", rpm:"mozilla-thunderbird~3.1.14~0.1mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"mozilla-thunderbird-af", rpm:"mozilla-thunderbird-af~3.1.14~0.1mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"mozilla-thunderbird-ar", rpm:"mozilla-thunderbird-ar~3.1.14~0.1mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"mozilla-thunderbird-be", rpm:"mozilla-thunderbird-be~3.1.14~0.1mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"mozilla-thunderbird-beagle", rpm:"mozilla-thunderbird-beagle~0.3.9~40.19mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"mozilla-thunderbird-bg", rpm:"mozilla-thunderbird-bg~3.1.14~0.1mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"mozilla-thunderbird-bn_BD", rpm:"mozilla-thunderbird-bn_BD~3.1.14~0.1mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"mozilla-thunderbird-ca", rpm:"mozilla-thunderbird-ca~3.1.14~0.1mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"mozilla-thunderbird-cs", rpm:"mozilla-thunderbird-cs~3.1.14~0.1mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"mozilla-thunderbird-da", rpm:"mozilla-thunderbird-da~3.1.14~0.1mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"mozilla-thunderbird-de", rpm:"mozilla-thunderbird-de~3.1.14~0.1mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"mozilla-thunderbird-el", rpm:"mozilla-thunderbird-el~3.1.14~0.1mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"mozilla-thunderbird-en_GB", rpm:"mozilla-thunderbird-en_GB~3.1.14~0.1mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"mozilla-thunderbird-enigmail", rpm:"mozilla-thunderbird-enigmail~3.1.14~0.1mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"mozilla-thunderbird-enigmail-ar", rpm:"mozilla-thunderbird-enigmail-ar~3.1.14~0.1mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"mozilla-thunderbird-enigmail-ca", rpm:"mozilla-thunderbird-enigmail-ca~3.1.14~0.1mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"mozilla-thunderbird-enigmail-cs", rpm:"mozilla-thunderbird-enigmail-cs~3.1.14~0.1mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"mozilla-thunderbird-enigmail-de", rpm:"mozilla-thunderbird-enigmail-de~3.1.14~0.1mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"mozilla-thunderbird-enigmail-el", rpm:"mozilla-thunderbird-enigmail-el~3.1.14~0.1mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"mozilla-thunderbird-enigmail-es", rpm:"mozilla-thunderbird-enigmail-es~3.1.14~0.1mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"mozilla-thunderbird-enigmail-fi", rpm:"mozilla-thunderbird-enigmail-fi~3.1.14~0.1mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"mozilla-thunderbird-enigmail-fr", rpm:"mozilla-thunderbird-enigmail-fr~3.1.14~0.1mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"mozilla-thunderbird-enigmail-hu", rpm:"mozilla-thunderbird-enigmail-hu~3.1.14~0.1mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"mozilla-thunderbird-enigmail-it", rpm:"mozilla-thunderbird-enigmail-it~3.1.14~0.1mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"mozilla-thunderbird-enigmail-ja", rpm:"mozilla-thunderbird-enigmail-ja~3.1.14~0.1mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"mozilla-thunderbird-enigmail-ko", rpm:"mozilla-thunderbird-enigmail-ko~3.1.14~0.1mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"mozilla-thunderbird-enigmail-nb", rpm:"mozilla-thunderbird-enigmail-nb~3.1.14~0.1mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"mozilla-thunderbird-enigmail-nl", rpm:"mozilla-thunderbird-enigmail-nl~3.1.14~0.1mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"mozilla-thunderbird-enigmail-pl", rpm:"mozilla-thunderbird-enigmail-pl~3.1.14~0.1mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"mozilla-thunderbird-enigmail-pt", rpm:"mozilla-thunderbird-enigmail-pt~3.1.14~0.1mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"mozilla-thunderbird-enigmail-pt_BR", rpm:"mozilla-thunderbird-enigmail-pt_BR~3.1.14~0.1mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"mozilla-thunderbird-enigmail-ru", rpm:"mozilla-thunderbird-enigmail-ru~3.1.14~0.1mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"mozilla-thunderbird-enigmail-sl", rpm:"mozilla-thunderbird-enigmail-sl~3.1.14~0.1mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"mozilla-thunderbird-enigmail-sv", rpm:"mozilla-thunderbird-enigmail-sv~3.1.14~0.1mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"mozilla-thunderbird-enigmail-tr", rpm:"mozilla-thunderbird-enigmail-tr~3.1.14~0.1mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"mozilla-thunderbird-enigmail-vi", rpm:"mozilla-thunderbird-enigmail-vi~3.1.14~0.1mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"mozilla-thunderbird-enigmail-zh_CN", rpm:"mozilla-thunderbird-enigmail-zh_CN~3.1.14~0.1mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"mozilla-thunderbird-enigmail-zh_TW", rpm:"mozilla-thunderbird-enigmail-zh_TW~3.1.14~0.1mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"mozilla-thunderbird-es_AR", rpm:"mozilla-thunderbird-es_AR~3.1.14~0.1mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"mozilla-thunderbird-es_ES", rpm:"mozilla-thunderbird-es_ES~3.1.14~0.1mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"mozilla-thunderbird-et", rpm:"mozilla-thunderbird-et~3.1.14~0.1mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"mozilla-thunderbird-et_EE", rpm:"mozilla-thunderbird-et_EE~3.1.14~0.1mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"mozilla-thunderbird-eu", rpm:"mozilla-thunderbird-eu~3.1.14~0.1mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"mozilla-thunderbird-fi", rpm:"mozilla-thunderbird-fi~3.1.14~0.1mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"mozilla-thunderbird-fr", rpm:"mozilla-thunderbird-fr~3.1.14~0.1mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"mozilla-thunderbird-fy", rpm:"mozilla-thunderbird-fy~3.1.14~0.1mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"mozilla-thunderbird-ga", rpm:"mozilla-thunderbird-ga~3.1.14~0.1mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"mozilla-thunderbird-gd", rpm:"mozilla-thunderbird-gd~3.1.14~0.1mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"mozilla-thunderbird-gl", rpm:"mozilla-thunderbird-gl~3.1.14~0.1mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"mozilla-thunderbird-he", rpm:"mozilla-thunderbird-he~3.1.14~0.1mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"mozilla-thunderbird-hu", rpm:"mozilla-thunderbird-hu~3.1.14~0.1mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"mozilla-thunderbird-id", rpm:"mozilla-thunderbird-id~3.1.14~0.1mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"mozilla-thunderbird-is", rpm:"mozilla-thunderbird-is~3.1.14~0.1mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"mozilla-thunderbird-it", rpm:"mozilla-thunderbird-it~3.1.14~0.1mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"mozilla-thunderbird-ja", rpm:"mozilla-thunderbird-ja~3.1.14~0.1mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"mozilla-thunderbird-ka", rpm:"mozilla-thunderbird-ka~3.1.14~0.1mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"mozilla-thunderbird-ko", rpm:"mozilla-thunderbird-ko~3.1.14~0.1mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"mozilla-thunderbird-lightning", rpm:"mozilla-thunderbird-lightning~3.1.14~0.1mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"mozilla-thunderbird-lt", rpm:"mozilla-thunderbird-lt~3.1.14~0.1mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"mozilla-thunderbird-nb_NO", rpm:"mozilla-thunderbird-nb_NO~3.1.14~0.1mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"mozilla-thunderbird-nl", rpm:"mozilla-thunderbird-nl~3.1.14~0.1mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"mozilla-thunderbird-nn_NO", rpm:"mozilla-thunderbird-nn_NO~3.1.14~0.1mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"mozilla-thunderbird-pa_IN", rpm:"mozilla-thunderbird-pa_IN~3.1.14~0.1mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"mozilla-thunderbird-pl", rpm:"mozilla-thunderbird-pl~3.1.14~0.1mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"mozilla-thunderbird-pt_BR", rpm:"mozilla-thunderbird-pt_BR~3.1.14~0.1mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"mozilla-thunderbird-pt_PT", rpm:"mozilla-thunderbird-pt_PT~3.1.14~0.1mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"mozilla-thunderbird-ro", rpm:"mozilla-thunderbird-ro~3.1.14~0.1mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"mozilla-thunderbird-ru", rpm:"mozilla-thunderbird-ru~3.1.14~0.1mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"mozilla-thunderbird-si", rpm:"mozilla-thunderbird-si~3.1.14~0.1mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"mozilla-thunderbird-sk", rpm:"mozilla-thunderbird-sk~3.1.14~0.1mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"mozilla-thunderbird-sl", rpm:"mozilla-thunderbird-sl~3.1.14~0.1mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"mozilla-thunderbird-sq", rpm:"mozilla-thunderbird-sq~3.1.14~0.1mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"mozilla-thunderbird-sr", rpm:"mozilla-thunderbird-sr~3.1.14~0.1mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"mozilla-thunderbird-sv_SE", rpm:"mozilla-thunderbird-sv_SE~3.1.14~0.1mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"mozilla-thunderbird-tr", rpm:"mozilla-thunderbird-tr~3.1.14~0.1mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"mozilla-thunderbird-uk", rpm:"mozilla-thunderbird-uk~3.1.14~0.1mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"mozilla-thunderbird-vi", rpm:"mozilla-thunderbird-vi~3.1.14~0.1mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"mozilla-thunderbird-zh_CN", rpm:"mozilla-thunderbird-zh_CN~3.1.14~0.1mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"mozilla-thunderbird-zh_TW", rpm:"mozilla-thunderbird-zh_TW~3.1.14~0.1mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"nsinstall", rpm:"nsinstall~3.1.14~0.1mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"nss", rpm:"nss~3.12.11~0.4mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"rootcerts", rpm:"rootcerts~20110902.00~1mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"rootcerts-java", rpm:"rootcerts-java~20110902.00~1mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"xulrunner", rpm:"xulrunner~1.9.2.22~0.1mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"yelp", rpm:"yelp~2.30.1~4.15mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"firefox-l10n", rpm:"firefox-l10n~3.6.22~0.1mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"mozilla-thunderbird-l10n", rpm:"mozilla-thunderbird-l10n~3.1.14~0.1mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"lib64gjs0", rpm:"lib64gjs0~0.6~4.15mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"lib64gjs-devel", rpm:"lib64gjs-devel~0.6~4.15mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"lib64nss3", rpm:"lib64nss3~3.12.11~0.4mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"lib64nss-devel", rpm:"lib64nss-devel~3.12.11~0.4mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"lib64nss-static-devel", rpm:"lib64nss-static-devel~3.12.11~0.4mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"lib64xulrunner1.9.2.22", rpm:"lib64xulrunner1.9.2.22~1.9.2.22~0.1mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"lib64xulrunner-devel", rpm:"lib64xulrunner-devel~1.9.2.22~0.1mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "MNDK_2009.0")
+{
+
+  if(isrpmvuln(pkg:"beagle", rpm:"beagle~0.3.8~13.41mdv2009.0", rls:"MNDK_2009.0"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"beagle-crawl-system", rpm:"beagle-crawl-system~0.3.8~13.41mdv2009.0", rls:"MNDK_2009.0"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"beagle-doc", rpm:"beagle-doc~0.3.8~13.41mdv2009.0", rls:"MNDK_2009.0"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"beagle-epiphany", rpm:"beagle-epiphany~0.3.8~13.41mdv2009.0", rls:"MNDK_2009.0"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"beagle-evolution", rpm:"beagle-evolution~0.3.8~13.41mdv2009.0", rls:"MNDK_2009.0"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"beagle-gui", rpm:"beagle-gui~0.3.8~13.41mdv2009.0", rls:"MNDK_2009.0"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"beagle-gui-qt", rpm:"beagle-gui-qt~0.3.8~13.41mdv2009.0", rls:"MNDK_2009.0"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"beagle-libs", rpm:"beagle-libs~0.3.8~13.41mdv2009.0", rls:"MNDK_2009.0"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"devhelp", rpm:"devhelp~0.21~3.29mdv2009.0", rls:"MNDK_2009.0"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"devhelp-plugins", rpm:"devhelp-plugins~0.21~3.29mdv2009.0", rls:"MNDK_2009.0"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"epiphany", rpm:"epiphany~2.24.3~0.18mdv2009.0", rls:"MNDK_2009.0"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"epiphany-devel", rpm:"epiphany-devel~2.24.3~0.18mdv2009.0", rls:"MNDK_2009.0"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"firefox", rpm:"firefox~3.6.22~0.1mdv2009.0", rls:"MNDK_2009.0"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"firefox-af", rpm:"firefox-af~3.6.22~0.1mdv2009.0", rls:"MNDK_2009.0"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"firefox-ar", rpm:"firefox-ar~3.6.22~0.1mdv2009.0", rls:"MNDK_2009.0"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"firefox-be", rpm:"firefox-be~3.6.22~0.1mdv2009.0", rls:"MNDK_2009.0"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"firefox-bg", rpm:"firefox-bg~3.6.22~0.1mdv2009.0", rls:"MNDK_2009.0"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"firefox-bn", rpm:"firefox-bn~3.6.22~0.1mdv2009.0", rls:"MNDK_2009.0"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"firefox-ca", rpm:"firefox-ca~3.6.22~0.1mdv2009.0", rls:"MNDK_2009.0"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"firefox-cs", rpm:"firefox-cs~3.6.22~0.1mdv2009.0", rls:"MNDK_2009.0"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"firefox-cy", rpm:"firefox-cy~3.6.22~0.1mdv2009.0", rls:"MNDK_2009.0"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"firefox-da", rpm:"firefox-da~3.6.22~0.1mdv2009.0", rls:"MNDK_2009.0"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"firefox-de", rpm:"firefox-de~3.6.22~0.1mdv2009.0", rls:"MNDK_2009.0"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"firefox-devel", rpm:"firefox-devel~3.6.22~0.1mdv2009.0", rls:"MNDK_2009.0"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"firefox-el", rpm:"firefox-el~3.6.22~0.1mdv2009.0", rls:"MNDK_2009.0"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"firefox-en_GB", rpm:"firefox-en_GB~3.6.22~0.1mdv2009.0", rls:"MNDK_2009.0"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"firefox-eo", rpm:"firefox-eo~3.6.22~0.1mdv2009.0", rls:"MNDK_2009.0"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"firefox-es_AR", rpm:"firefox-es_AR~3.6.22~0.1mdv2009.0", rls:"MNDK_2009.0"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"firefox-es_ES", rpm:"firefox-es_ES~3.6.22~0.1mdv2009.0", rls:"MNDK_2009.0"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"firefox-et", rpm:"firefox-et~3.6.22~0.1mdv2009.0", rls:"MNDK_2009.0"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"firefox-eu", rpm:"firefox-eu~3.6.22~0.1mdv2009.0", rls:"MNDK_2009.0"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"firefox-ext-beagle", rpm:"firefox-ext-beagle~0.3.8~13.41mdv2009.0", rls:"MNDK_2009.0"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"firefox-ext-blogrovr", rpm:"firefox-ext-blogrovr~1.1.804~0.17mdv2009.0", rls:"MNDK_2009.0"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"firefox-ext-mozvoikko", rpm:"firefox-ext-mozvoikko~1.0~0.17mdv2009.0", rls:"MNDK_2009.0"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"firefox-ext-scribefire", rpm:"firefox-ext-scribefire~3.5.1~0.17mdv2009.0", rls:"MNDK_2009.0"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"firefox-ext-xmarks", rpm:"firefox-ext-xmarks~3.5.10~0.17mdv2009.0", rls:"MNDK_2009.0"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"firefox-fi", rpm:"firefox-fi~3.6.22~0.1mdv2009.0", rls:"MNDK_2009.0"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"firefox-fr", rpm:"firefox-fr~3.6.22~0.1mdv2009.0", rls:"MNDK_2009.0"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"firefox-fy", rpm:"firefox-fy~3.6.22~0.1mdv2009.0", rls:"MNDK_2009.0"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"firefox-ga_IE", rpm:"firefox-ga_IE~3.6.22~0.1mdv2009.0", rls:"MNDK_2009.0"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"firefox-gl", rpm:"firefox-gl~3.6.22~0.1mdv2009.0", rls:"MNDK_2009.0"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"firefox-gu_IN", rpm:"firefox-gu_IN~3.6.22~0.1mdv2009.0", rls:"MNDK_2009.0"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"firefox-he", rpm:"firefox-he~3.6.22~0.1mdv2009.0", rls:"MNDK_2009.0"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"firefox-hi", rpm:"firefox-hi~3.6.22~0.1mdv2009.0", rls:"MNDK_2009.0"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"firefox-hu", rpm:"firefox-hu~3.6.22~0.1mdv2009.0", rls:"MNDK_2009.0"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"firefox-id", rpm:"firefox-id~3.6.22~0.1mdv2009.0", rls:"MNDK_2009.0"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"firefox-is", rpm:"firefox-is~3.6.22~0.1mdv2009.0", rls:"MNDK_2009.0"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"firefox-it", rpm:"firefox-it~3.6.22~0.1mdv2009.0", rls:"MNDK_2009.0"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"firefox-ja", rpm:"firefox-ja~3.6.22~0.1mdv2009.0", rls:"MNDK_2009.0"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"firefox-ka", rpm:"firefox-ka~3.6.22~0.1mdv2009.0", rls:"MNDK_2009.0"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"firefox-kn", rpm:"firefox-kn~3.6.22~0.1mdv2009.0", rls:"MNDK_2009.0"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"firefox-ko", rpm:"firefox-ko~3.6.22~0.1mdv2009.0", rls:"MNDK_2009.0"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"firefox-ku", rpm:"firefox-ku~3.6.22~0.1mdv2009.0", rls:"MNDK_2009.0"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"firefox-lt", rpm:"firefox-lt~3.6.22~0.1mdv2009.0", rls:"MNDK_2009.0"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"firefox-lv", rpm:"firefox-lv~3.6.22~0.1mdv2009.0", rls:"MNDK_2009.0"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"firefox-mk", rpm:"firefox-mk~3.6.22~0.1mdv2009.0", rls:"MNDK_2009.0"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"firefox-mr", rpm:"firefox-mr~3.6.22~0.1mdv2009.0", rls:"MNDK_2009.0"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"firefox-nb_NO", rpm:"firefox-nb_NO~3.6.22~0.1mdv2009.0", rls:"MNDK_2009.0"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"firefox-nl", rpm:"firefox-nl~3.6.22~0.1mdv2009.0", rls:"MNDK_2009.0"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"firefox-nn_NO", rpm:"firefox-nn_NO~3.6.22~0.1mdv2009.0", rls:"MNDK_2009.0"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"firefox-oc", rpm:"firefox-oc~3.6.22~0.1mdv2009.0", rls:"MNDK_2009.0"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"firefox-pa_IN", rpm:"firefox-pa_IN~3.6.22~0.1mdv2009.0", rls:"MNDK_2009.0"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"firefox-pl", rpm:"firefox-pl~3.6.22~0.1mdv2009.0", rls:"MNDK_2009.0"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"firefox-pt_BR", rpm:"firefox-pt_BR~3.6.22~0.1mdv2009.0", rls:"MNDK_2009.0"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"firefox-pt_PT", rpm:"firefox-pt_PT~3.6.22~0.1mdv2009.0", rls:"MNDK_2009.0"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"firefox-ro", rpm:"firefox-ro~3.6.22~0.1mdv2009.0", rls:"MNDK_2009.0"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"firefox-ru", rpm:"firefox-ru~3.6.22~0.1mdv2009.0", rls:"MNDK_2009.0"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"firefox-si", rpm:"firefox-si~3.6.22~0.1mdv2009.0", rls:"MNDK_2009.0"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"firefox-sk", rpm:"firefox-sk~3.6.22~0.1mdv2009.0", rls:"MNDK_2009.0"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"firefox-sl", rpm:"firefox-sl~3.6.22~0.1mdv2009.0", rls:"MNDK_2009.0"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"firefox-sq", rpm:"firefox-sq~3.6.22~0.1mdv2009.0", rls:"MNDK_2009.0"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"firefox-sr", rpm:"firefox-sr~3.6.22~0.1mdv2009.0", rls:"MNDK_2009.0"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"firefox-sv_SE", rpm:"firefox-sv_SE~3.6.22~0.1mdv2009.0", rls:"MNDK_2009.0"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"firefox-te", rpm:"firefox-te~3.6.22~0.1mdv2009.0", rls:"MNDK_2009.0"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"firefox-th", rpm:"firefox-th~3.6.22~0.1mdv2009.0", rls:"MNDK_2009.0"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"firefox-theme-kfirefox", rpm:"firefox-theme-kfirefox~0.16~0.17mdv2009.0", rls:"MNDK_2009.0"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"firefox-tr", rpm:"firefox-tr~3.6.22~0.1mdv2009.0", rls:"MNDK_2009.0"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"firefox-uk", rpm:"firefox-uk~3.6.22~0.1mdv2009.0", rls:"MNDK_2009.0"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"firefox-zh_CN", rpm:"firefox-zh_CN~3.6.22~0.1mdv2009.0", rls:"MNDK_2009.0"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"firefox-zh_TW", rpm:"firefox-zh_TW~3.6.22~0.1mdv2009.0", rls:"MNDK_2009.0"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"gnome-python-extras", rpm:"gnome-python-extras~2.19.1~20.31mdv2009.0", rls:"MNDK_2009.0"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"gnome-python-gda", rpm:"gnome-python-gda~2.19.1~20.31mdv2009.0", rls:"MNDK_2009.0"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"gnome-python-gda-devel", rpm:"gnome-python-gda-devel~2.19.1~20.31mdv2009.0", rls:"MNDK_2009.0"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"gnome-python-gdl", rpm:"gnome-python-gdl~2.19.1~20.31mdv2009.0", rls:"MNDK_2009.0"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"gnome-python-gtkhtml2", rpm:"gnome-python-gtkhtml2~2.19.1~20.31mdv2009.0", rls:"MNDK_2009.0"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"gnome-python-gtkmozembed", rpm:"gnome-python-gtkmozembed~2.19.1~20.31mdv2009.0", rls:"MNDK_2009.0"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"gnome-python-gtkspell", rpm:"gnome-python-gtkspell~2.19.1~20.31mdv2009.0", rls:"MNDK_2009.0"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"libdevhelp-1_0", rpm:"libdevhelp-1_0~0.21~3.29mdv2009.0", rls:"MNDK_2009.0"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"libdevhelp-1-devel", rpm:"libdevhelp-1-devel~0.21~3.29mdv2009.0", rls:"MNDK_2009.0"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"libnss3", rpm:"libnss3~3.12.11~0.4mdv2009.0", rls:"MNDK_2009.0"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"libnss-devel", rpm:"libnss-devel~3.12.11~0.4mdv2009.0", rls:"MNDK_2009.0"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"libnss-static-devel", rpm:"libnss-static-devel~3.12.11~0.4mdv2009.0", rls:"MNDK_2009.0"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"libxulrunner1.9.2.22", rpm:"libxulrunner1.9.2.22~1.9.2.22~0.1mdv2009.0", rls:"MNDK_2009.0"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"libxulrunner-devel", rpm:"libxulrunner-devel~1.9.2.22~0.1mdv2009.0", rls:"MNDK_2009.0"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"mozilla-thunderbird", rpm:"mozilla-thunderbird~3.1.14~0.1mdv2009.0", rls:"MNDK_2009.0"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"mozilla-thunderbird-af", rpm:"mozilla-thunderbird-af~3.1.14~0.1mdv2009.0", rls:"MNDK_2009.0"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"mozilla-thunderbird-ar", rpm:"mozilla-thunderbird-ar~3.1.14~0.1mdv2009.0", rls:"MNDK_2009.0"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"mozilla-thunderbird-be", rpm:"mozilla-thunderbird-be~3.1.14~0.1mdv2009.0", rls:"MNDK_2009.0"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"mozilla-thunderbird-beagle", rpm:"mozilla-thunderbird-beagle~0.3.8~13.41mdv2009.0", rls:"MNDK_2009.0"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"mozilla-thunderbird-bg", rpm:"mozilla-thunderbird-bg~3.1.14~0.1mdv2009.0", rls:"MNDK_2009.0"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"mozilla-thunderbird-bn_BD", rpm:"mozilla-thunderbird-bn_BD~3.1.14~0.1mdv2009.0", rls:"MNDK_2009.0"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"mozilla-thunderbird-ca", rpm:"mozilla-thunderbird-ca~3.1.14~0.1mdv2009.0", rls:"MNDK_2009.0"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"mozilla-thunderbird-cs", rpm:"mozilla-thunderbird-cs~3.1.14~0.1mdv2009.0", rls:"MNDK_2009.0"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"mozilla-thunderbird-da", rpm:"mozilla-thunderbird-da~3.1.14~0.1mdv2009.0", rls:"MNDK_2009.0"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"mozilla-thunderbird-de", rpm:"mozilla-thunderbird-de~3.1.14~0.1mdv2009.0", rls:"MNDK_2009.0"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"mozilla-thunderbird-el", rpm:"mozilla-thunderbird-el~3.1.14~0.1mdv2009.0", rls:"MNDK_2009.0"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"mozilla-thunderbird-en_GB", rpm:"mozilla-thunderbird-en_GB~3.1.14~0.1mdv2009.0", rls:"MNDK_2009.0"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"mozilla-thunderbird-enigmail", rpm:"mozilla-thunderbird-enigmail~3.1.14~0.1mdv2009.0", rls:"MNDK_2009.0"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"mozilla-thunderbird-enigmail-ar", rpm:"mozilla-thunderbird-enigmail-ar~3.1.14~0.1mdv2009.0", rls:"MNDK_2009.0"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"mozilla-thunderbird-enigmail-ca", rpm:"mozilla-thunderbird-enigmail-ca~3.1.14~0.1mdv2009.0", rls:"MNDK_2009.0"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"mozilla-thunderbird-enigmail-cs", rpm:"mozilla-thunderbird-enigmail-cs~3.1.14~0.1mdv2009.0", rls:"MNDK_2009.0"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"mozilla-thunderbird-enigmail-de", rpm:"mozilla-thunderbird-enigmail-de~3.1.14~0.1mdv2009.0", rls:"MNDK_2009.0"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"mozilla-thunderbird-enigmail-el", rpm:"mozilla-thunderbird-enigmail-el~3.1.14~0.1mdv2009.0", rls:"MNDK_2009.0"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"mozilla-thunderbird-enigmail-es", rpm:"mozilla-thunderbird-enigmail-es~3.1.14~0.1mdv2009.0", rls:"MNDK_2009.0"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"mozilla-thunderbird-enigmail-fi", rpm:"mozilla-thunderbird-enigmail-fi~3.1.14~0.1mdv2009.0", rls:"MNDK_2009.0"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"mozilla-thunderbird-enigmail-fr", rpm:"mozilla-thunderbird-enigmail-fr~3.1.14~0.1mdv2009.0", rls:"MNDK_2009.0"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"mozilla-thunderbird-enigmail-hu", rpm:"mozilla-thunderbird-enigmail-hu~3.1.14~0.1mdv2009.0", rls:"MNDK_2009.0"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"mozilla-thunderbird-enigmail-it", rpm:"mozilla-thunderbird-enigmail-it~3.1.14~0.1mdv2009.0", rls:"MNDK_2009.0"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"mozilla-thunderbird-enigmail-ja", rpm:"mozilla-thunderbird-enigmail-ja~3.1.14~0.1mdv2009.0", rls:"MNDK_2009.0"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"mozilla-thunderbird-enigmail-ko", rpm:"mozilla-thunderbird-enigmail-ko~3.1.14~0.1mdv2009.0", rls:"MNDK_2009.0"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"mozilla-thunderbird-enigmail-nb", rpm:"mozilla-thunderbird-enigmail-nb~3.1.14~0.1mdv2009.0", rls:"MNDK_2009.0"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"mozilla-thunderbird-enigmail-nl", rpm:"mozilla-thunderbird-enigmail-nl~3.1.14~0.1mdv2009.0", rls:"MNDK_2009.0"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"mozilla-thunderbird-enigmail-pl", rpm:"mozilla-thunderbird-enigmail-pl~3.1.14~0.1mdv2009.0", rls:"MNDK_2009.0"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"mozilla-thunderbird-enigmail-pt", rpm:"mozilla-thunderbird-enigmail-pt~3.1.14~0.1mdv2009.0", rls:"MNDK_2009.0"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"mozilla-thunderbird-enigmail-pt_BR", rpm:"mozilla-thunderbird-enigmail-pt_BR~3.1.14~0.1mdv2009.0", rls:"MNDK_2009.0"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"mozilla-thunderbird-enigmail-ru", rpm:"mozilla-thunderbird-enigmail-ru~3.1.14~0.1mdv2009.0", rls:"MNDK_2009.0"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"mozilla-thunderbird-enigmail-sl", rpm:"mozilla-thunderbird-enigmail-sl~3.1.14~0.1mdv2009.0", rls:"MNDK_2009.0"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"mozilla-thunderbird-enigmail-sv", rpm:"mozilla-thunderbird-enigmail-sv~3.1.14~0.1mdv2009.0", rls:"MNDK_2009.0"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"mozilla-thunderbird-enigmail-tr", rpm:"mozilla-thunderbird-enigmail-tr~3.1.14~0.1mdv2009.0", rls:"MNDK_2009.0"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"mozilla-thunderbird-enigmail-vi", rpm:"mozilla-thunderbird-enigmail-vi~3.1.14~0.1mdv2009.0", rls:"MNDK_2009.0"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"mozilla-thunderbird-enigmail-zh_CN", rpm:"mozilla-thunderbird-enigmail-zh_CN~3.1.14~0.1mdv2009.0", rls:"MNDK_2009.0"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"mozilla-thunderbird-enigmail-zh_TW", rpm:"mozilla-thunderbird-enigmail-zh_TW~3.1.14~0.1mdv2009.0", rls:"MNDK_2009.0"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"mozilla-thunderbird-es_AR", rpm:"mozilla-thunderbird-es_AR~3.1.14~0.1mdv2009.0", rls:"MNDK_2009.0"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"mozilla-thunderbird-es_ES", rpm:"mozilla-thunderbird-es_ES~3.1.14~0.1mdv2009.0", rls:"MNDK_2009.0"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"mozilla-thunderbird-et", rpm:"mozilla-thunderbird-et~3.1.14~0.1mdv2009.0", rls:"MNDK_2009.0"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"mozilla-thunderbird-et_EE", rpm:"mozilla-thunderbird-et_EE~3.1.14~0.1mdv2009.0", rls:"MNDK_2009.0"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"mozilla-thunderbird-eu", rpm:"mozilla-thunderbird-eu~3.1.14~0.1mdv2009.0", rls:"MNDK_2009.0"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"mozilla-thunderbird-fi", rpm:"mozilla-thunderbird-fi~3.1.14~0.1mdv2009.0", rls:"MNDK_2009.0"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"mozilla-thunderbird-fr", rpm:"mozilla-thunderbird-fr~3.1.14~0.1mdv2009.0", rls:"MNDK_2009.0"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"mozilla-thunderbird-fy", rpm:"mozilla-thunderbird-fy~3.1.14~0.1mdv2009.0", rls:"MNDK_2009.0"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"mozilla-thunderbird-ga", rpm:"mozilla-thunderbird-ga~3.1.14~0.1mdv2009.0", rls:"MNDK_2009.0"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"mozilla-thunderbird-gd", rpm:"mozilla-thunderbird-gd~3.1.14~0.1mdv2009.0", rls:"MNDK_2009.0"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"mozilla-thunderbird-gl", rpm:"mozilla-thunderbird-gl~3.1.14~0.1mdv2009.0", rls:"MNDK_2009.0"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"mozilla-thunderbird-he", rpm:"mozilla-thunderbird-he~3.1.14~0.1mdv2009.0", rls:"MNDK_2009.0"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"mozilla-thunderbird-hu", rpm:"mozilla-thunderbird-hu~3.1.14~0.1mdv2009.0", rls:"MNDK_2009.0"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"mozilla-thunderbird-id", rpm:"mozilla-thunderbird-id~3.1.14~0.1mdv2009.0", rls:"MNDK_2009.0"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"mozilla-thunderbird-is", rpm:"mozilla-thunderbird-is~3.1.14~0.1mdv2009.0", rls:"MNDK_2009.0"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"mozilla-thunderbird-it", rpm:"mozilla-thunderbird-it~3.1.14~0.1mdv2009.0", rls:"MNDK_2009.0"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"mozilla-thunderbird-ja", rpm:"mozilla-thunderbird-ja~3.1.14~0.1mdv2009.0", rls:"MNDK_2009.0"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"mozilla-thunderbird-ka", rpm:"mozilla-thunderbird-ka~3.1.14~0.1mdv2009.0", rls:"MNDK_2009.0"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"mozilla-thunderbird-ko", rpm:"mozilla-thunderbird-ko~3.1.14~0.1mdv2009.0", rls:"MNDK_2009.0"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"mozilla-thunderbird-lightning", rpm:"mozilla-thunderbird-lightning~3.1.14~0.1mdv2009.0", rls:"MNDK_2009.0"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"mozilla-thunderbird-lt", rpm:"mozilla-thunderbird-lt~3.1.14~0.1mdv2009.0", rls:"MNDK_2009.0"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"mozilla-thunderbird-nb_NO", rpm:"mozilla-thunderbird-nb_NO~3.1.14~0.1mdv2009.0", rls:"MNDK_2009.0"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"mozilla-thunderbird-nl", rpm:"mozilla-thunderbird-nl~3.1.14~0.1mdv2009.0", rls:"MNDK_2009.0"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"mozilla-thunderbird-nn_NO", rpm:"mozilla-thunderbird-nn_NO~3.1.14~0.1mdv2009.0", rls:"MNDK_2009.0"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"mozilla-thunderbird-pa_IN", rpm:"mozilla-thunderbird-pa_IN~3.1.14~0.1mdv2009.0", rls:"MNDK_2009.0"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"mozilla-thunderbird-pl", rpm:"mozilla-thunderbird-pl~3.1.14~0.1mdv2009.0", rls:"MNDK_2009.0"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"mozilla-thunderbird-pt_BR", rpm:"mozilla-thunderbird-pt_BR~3.1.14~0.1mdv2009.0", rls:"MNDK_2009.0"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"mozilla-thunderbird-pt_PT", rpm:"mozilla-thunderbird-pt_PT~3.1.14~0.1mdv2009.0", rls:"MNDK_2009.0"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"mozilla-thunderbird-ro", rpm:"mozilla-thunderbird-ro~3.1.14~0.1mdv2009.0", rls:"MNDK_2009.0"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"mozilla-thunderbird-ru", rpm:"mozilla-thunderbird-ru~3.1.14~0.1mdv2009.0", rls:"MNDK_2009.0"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"mozilla-thunderbird-si", rpm:"mozilla-thunderbird-si~3.1.14~0.1mdv2009.0", rls:"MNDK_2009.0"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"mozilla-thunderbird-sk", rpm:"mozilla-thunderbird-sk~3.1.14~0.1mdv2009.0", rls:"MNDK_2009.0"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"mozilla-thunderbird-sl", rpm:"mozilla-thunderbird-sl~3.1.14~0.1mdv2009.0", rls:"MNDK_2009.0"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"mozilla-thunderbird-sq", rpm:"mozilla-thunderbird-sq~3.1.14~0.1mdv2009.0", rls:"MNDK_2009.0"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"mozilla-thunderbird-sr", rpm:"mozilla-thunderbird-sr~3.1.14~0.1mdv2009.0", rls:"MNDK_2009.0"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"mozilla-thunderbird-sv_SE", rpm:"mozilla-thunderbird-sv_SE~3.1.14~0.1mdv2009.0", rls:"MNDK_2009.0"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"mozilla-thunderbird-tr", rpm:"mozilla-thunderbird-tr~3.1.14~0.1mdv2009.0", rls:"MNDK_2009.0"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"mozilla-thunderbird-uk", rpm:"mozilla-thunderbird-uk~3.1.14~0.1mdv2009.0", rls:"MNDK_2009.0"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"mozilla-thunderbird-vi", rpm:"mozilla-thunderbird-vi~3.1.14~0.1mdv2009.0", rls:"MNDK_2009.0"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"mozilla-thunderbird-zh_CN", rpm:"mozilla-thunderbird-zh_CN~3.1.14~0.1mdv2009.0", rls:"MNDK_2009.0"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"mozilla-thunderbird-zh_TW", rpm:"mozilla-thunderbird-zh_TW~3.1.14~0.1mdv2009.0", rls:"MNDK_2009.0"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"nsinstall", rpm:"nsinstall~3.1.14~0.1mdv2009.0", rls:"MNDK_2009.0"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"nss", rpm:"nss~3.12.11~0.4mdv2009.0", rls:"MNDK_2009.0"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"rootcerts", rpm:"rootcerts~20110902.00~1mdv2009.0", rls:"MNDK_2009.0"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"rootcerts-java", rpm:"rootcerts-java~20110902.00~1mdv2009.0", rls:"MNDK_2009.0"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"xulrunner", rpm:"xulrunner~1.9.2.22~0.1mdv2009.0", rls:"MNDK_2009.0"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"yelp", rpm:"yelp~2.24.0~3.32mdv2009.0", rls:"MNDK_2009.0"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"firefox-l10n", rpm:"firefox-l10n~3.6.22~0.1mdv2009.0", rls:"MNDK_2009.0"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"mozilla-thunderbird-l10n", rpm:"mozilla-thunderbird-l10n~3.1.14~0.1mdv2009.0", rls:"MNDK_2009.0"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"lib64devhelp-1_0", rpm:"lib64devhelp-1_0~0.21~3.29mdv2009.0", rls:"MNDK_2009.0"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"lib64devhelp-1-devel", rpm:"lib64devhelp-1-devel~0.21~3.29mdv2009.0", rls:"MNDK_2009.0"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"lib64nss3", rpm:"lib64nss3~3.12.11~0.4mdv2009.0", rls:"MNDK_2009.0"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"lib64nss-devel", rpm:"lib64nss-devel~3.12.11~0.4mdv2009.0", rls:"MNDK_2009.0"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"lib64nss-static-devel", rpm:"lib64nss-static-devel~3.12.11~0.4mdv2009.0", rls:"MNDK_2009.0"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"lib64xulrunner1.9.2.22", rpm:"lib64xulrunner1.9.2.22~1.9.2.22~0.1mdv2009.0", rls:"MNDK_2009.0"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"lib64xulrunner-devel", rpm:"lib64xulrunner-devel~1.9.2.22~0.1mdv2009.0", rls:"MNDK_2009.0"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
\ No newline at end of file

Added: trunk/openvas-plugins/scripts/gb_mandriva_MDVSA_2011_134.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_mandriva_MDVSA_2011_134.nasl	2011-09-12 13:54:55 UTC (rev 11601)
+++ trunk/openvas-plugins/scripts/gb_mandriva_MDVSA_2011_134.nasl	2011-09-12 14:29:49 UTC (rev 11602)
@@ -0,0 +1,132 @@
+###############################################################################
+# OpenVAS Vulnerability Test
+#
+# Mandriva Update for rsyslog MDVSA-2011:134 (rsyslog)
+#
+# Authors:
+# System Generated Check
+#
+# Copyright:
+# Copyright (c) 2011 Greenbone Networks GmbH, http://www.greenbone.net
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2
+# (or any later version), as published by the Free Software Foundation.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+###############################################################################
+
+if(description)
+{
+  script_id(831452);
+  script_version("$Revision$: 1.0");
+  script_tag(name:"cvss_base", value:"5.0");
+  script_tag(name:"risk_factor", value:"Medium");
+  script_xref(name: "MDVSA", value: "2011:134");
+  script_cve_id("CVE-2011-3200");
+  script_name("Mandriva Update for rsyslog MDVSA-2011:134 (rsyslog)");
+  desc = "
+
+  Vulnerability Insight:
+
+  A vulnerability was discovered and corrected in rsyslog:
+  
+  Stack-based buffer overflow in the parseLegacySyslogMsg function
+  in tools/syslogd.c in rsyslogd in rsyslog 4.6.x before 4.6.8 and
+  5.2.0 through 5.8.4 might allow remote attackers to cause a denial of
+  service (application exit) via a long TAG in a legacy syslog message
+  (CVE-2011-3200).
+  
+  The updated packages have been patched to correct this issue.
+
+  Affected Software/OS:
+  rsyslog on Mandriva Linux 2010.1,
+  Mandriva Linux 2010.1/X86_64
+
+  Fix: Please Install the Updated Packages.
+
+  References:
+  http://lists.mandriva.com/security-announce/2011-09/msg00008.php
+
+  ";
+
+  script_description(desc);
+  script_summary("Check for the Version of rsyslog");
+  script_category(ACT_GATHER_INFO);
+  script_copyright("Copyright (c) 2011 Greenbone Networks GmbH");
+  script_family("Mandrake Local Security Checks");
+  script_dependencies("gather-package-list.nasl");
+  script_require_keys("ssh/login/release");
+  exit(0);
+}
+
+
+include("pkg-lib-rpm.inc");
+include("revisions-lib.inc");
+
+release = get_kb_item("ssh/login/release");
+
+if(release == NULL){
+  exit(0);
+}
+
+if(release == "MNDK_2010.1")
+{
+
+  if(isrpmvuln(pkg:"rsyslog", rpm:"rsyslog~4.6.2~3.1mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"rsyslog-dbi", rpm:"rsyslog-dbi~4.6.2~3.1mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"rsyslog-docs", rpm:"rsyslog-docs~4.6.2~3.1mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"rsyslog-gssapi", rpm:"rsyslog-gssapi~4.6.2~3.1mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"rsyslog-mysql", rpm:"rsyslog-mysql~4.6.2~3.1mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"rsyslog-pgsql", rpm:"rsyslog-pgsql~4.6.2~3.1mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"rsyslog-relp", rpm:"rsyslog-relp~4.6.2~3.1mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"rsyslog-snmp", rpm:"rsyslog-snmp~4.6.2~3.1mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
\ No newline at end of file

Added: trunk/openvas-plugins/scripts/gb_ubuntu_USN_1197_3.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_ubuntu_USN_1197_3.nasl	2011-09-12 13:54:55 UTC (rev 11601)
+++ trunk/openvas-plugins/scripts/gb_ubuntu_USN_1197_3.nasl	2011-09-12 14:29:49 UTC (rev 11602)
@@ -0,0 +1,139 @@
+###############################################################################
+# OpenVAS Vulnerability Test
+#
+# Ubuntu Update for firefox USN-1197-3
+#
+# Authors:
+# System Generated Check
+#
+# Copyright:
+# Copyright (c) 2011 Greenbone Networks GmbH, http://www.greenbone.net
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2
+# (or any later version), as published by the Free Software Foundation.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+###############################################################################
+
+if(description)
+{
+  script_id(840735);
+  script_version("$Revision$: 1.0");
+  script_tag(name:"risk_factor", value:"High");
+  script_xref(name: "USN", value: "1197-3");
+  script_name("Ubuntu Update for firefox USN-1197-3");
+  desc = "
+
+  Vulnerability Insight:
+
+  USN-1197-1 partially addressed an issue with Dutch Certificate Authority
+  DigiNotar mis-issuing fraudulent certificates. This update actively
+  distrusts the DigiNotar root certificate as well as several intermediary
+  certificates. Also included in this list of distrusted certificates are the
+  Staat der Nederlanden root certificates.
+  
+  Original advisory details:
+  
+  It was discovered that Dutch Certificate Authority DigiNotar, had
+  mis-issued multiple fraudulent certificates. These certificates could allow
+  an attacker to perform a &quot;man in the middle&quot; (MITM) attack which would make
+  the user believe their connection is secure, but is actually being
+  monitored.
+  
+  For the protection of its users, Mozilla has removed the DigiNotar
+  certificate. Sites using certificates issued by DigiNotar will need to seek
+  another certificate vendor.
+  
+  We are currently aware of a regression that blocks one of two Staat der
+  Nederlanden root certificates which are believed to still be secure. This
+  regression is being tracked at <A HREF='https://launchpad.net/bugs/838322.'>https://launchpad.net/bugs/838322.</A>
+
+  Affected Software/OS:
+  firefox on Ubuntu 11.04 ,
+  Ubuntu 10.10 ,
+  Ubuntu 10.04 LTS
+
+  Fix: Please Install the Updated Packages.
+
+  References:
+  https://lists.ubuntu.com/archives/ubuntu-security-announce/2011-September/001407.html
+
+  ";
+
+  script_description(desc);
+  script_summary("Check for the Version of firefox");
+  script_category(ACT_GATHER_INFO);
+  script_copyright("Copyright (c) 2011 Greenbone Networks GmbH");
+  script_family("Ubuntu Local Security Checks");
+  script_dependencies("gather-package-list.nasl");
+  script_require_keys("ssh/login/release");
+  exit(0);
+}
+
+
+include("pkg-lib-deb.inc");
+include("revisions-lib.inc");
+
+release = get_kb_item("ssh/login/release");
+
+if(release == NULL){
+  exit(0);
+}
+
+if(release == "UBUNTU10.10")
+{
+
+  if(isdpkgvuln(pkg:"firefox", ver:"3.6.22+build2+nobinonly-0ubuntu0.10.10.1", rls:"UBUNTU10.10"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isdpkgvuln(pkg:"xulrunner-1.9.2", ver:"1.9.2.22+build2+nobinonly-0ubuntu0.10.10.1", rls:"UBUNTU10.10"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "UBUNTU10.04 LTS")
+{
+
+  if(isdpkgvuln(pkg:"firefox", ver:"3.6.22+build2+nobinonly-0ubuntu0.10.04.1", rls:"UBUNTU10.04 LTS"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isdpkgvuln(pkg:"xulrunner-1.9.2", ver:"1.9.2.22+build2+nobinonly-0ubuntu0.10.04.1", rls:"UBUNTU10.04 LTS"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "UBUNTU11.04")
+{
+
+  if(isdpkgvuln(pkg:"firefox", ver:"6.0.2+build2+nobinonly-0ubuntu0.11.04.1", rls:"UBUNTU11.04"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
\ No newline at end of file

Added: trunk/openvas-plugins/scripts/gb_ubuntu_USN_1197_4.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_ubuntu_USN_1197_4.nasl	2011-09-12 13:54:55 UTC (rev 11601)
+++ trunk/openvas-plugins/scripts/gb_ubuntu_USN_1197_4.nasl	2011-09-12 14:29:49 UTC (rev 11602)
@@ -0,0 +1,136 @@
+###############################################################################
+# OpenVAS Vulnerability Test
+#
+# Ubuntu Update for nss USN-1197-4
+#
+# Authors:
+# System Generated Check
+#
+# Copyright:
+# Copyright (c) 2011 Greenbone Networks GmbH, http://www.greenbone.net
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2
+# (or any later version), as published by the Free Software Foundation.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+###############################################################################
+
+if(description)
+{
+  script_id(840736);
+  script_version("$Revision$: 1.0");
+  script_tag(name:"risk_factor", value:"High");
+  script_xref(name: "USN", value: "1197-4");
+  script_name("Ubuntu Update for nss USN-1197-4");
+  desc = "
+
+  Vulnerability Insight:
+
+  USN-1197-1 and USN-1197-3 addressed an issue in Firefox and Xulrunner
+  pertaining to the Dutch Certificate Authority DigiNotar mis-issuing
+  fraudulent certificates. This update provides the corresponding update
+  for the Network Security Service libraries (NSS).
+  
+  Original advisory details:
+  USN-1197-1
+  
+  It was discovered that Dutch Certificate Authority DigiNotar, had
+  mis-issued multiple fraudulent certificates. These certificates could allow
+  an attacker to perform a &quot;man in the middle&quot; (MITM) attack which would make
+  the user believe their connection is secure, but is actually being
+  monitored.
+  
+  For the protection of its users, Mozilla has removed the DigiNotar
+  certificate. Sites using certificates issued by DigiNotar will need to seek
+  another certificate vendor.
+  
+  We are currently aware of a regression that blocks one of two Staat der
+  Nederlanden root certificates which are believed to still be secure. This
+  regression is being tracked at <A HREF='https://launchpad.net/bugs/838322.'>https://launchpad.net/bugs/838322.</A>
+  
+  USN-1197-3
+  
+  USN-1197-1 partially addressed an issue with Dutch Certificate Authority
+  DigiNotar mis-issuing fraudulent certificates. This update actively
+  distrusts the DigiNotar root certificate as well as several intermediary
+  certificates. Also included in this list of distrusted certificates are the
+  &quot;PKIOverheid&quot; (PKIGovernment) intermediates under DigiNotar's control that
+  did not chain to DigiNotar's root and were not previously blocked.
+
+  Affected Software/OS:
+  nss on Ubuntu 11.04 ,
+  Ubuntu 10.10 ,
+  Ubuntu 10.04 LTS
+
+  Fix: Please Install the Updated Packages.
+
+  References:
+  https://lists.ubuntu.com/archives/ubuntu-security-announce/2011-September/001408.html
+
+  ";
+
+  script_description(desc);
+  script_summary("Check for the Version of nss");
+  script_category(ACT_GATHER_INFO);
+  script_copyright("Copyright (c) 2011 Greenbone Networks GmbH");
+  script_family("Ubuntu Local Security Checks");
+  script_dependencies("gather-package-list.nasl");
+  script_require_keys("ssh/login/release");
+  exit(0);
+}
+
+
+include("pkg-lib-deb.inc");
+include("revisions-lib.inc");
+
+release = get_kb_item("ssh/login/release");
+
+if(release == NULL){
+  exit(0);
+}
+
+if(release == "UBUNTU10.10")
+{
+
+  if(isdpkgvuln(pkg:"libnss3-1d", ver:"3.12.9+ckbi-1.82-0ubuntu0.10.10.3", rls:"UBUNTU10.10"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "UBUNTU10.04 LTS")
+{
+
+  if(isdpkgvuln(pkg:"libnss3-1d", ver:"3.12.9+ckbi-1.82-0ubuntu0.10.04.3", rls:"UBUNTU10.04 LTS"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "UBUNTU11.04")
+{
+
+  if(isdpkgvuln(pkg:"libnss3", ver:"3.12.9+ckbi-1.82-0ubuntu2.1", rls:"UBUNTU11.04"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
\ No newline at end of file

Added: trunk/openvas-plugins/scripts/gb_ubuntu_USN_1197_5.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_ubuntu_USN_1197_5.nasl	2011-09-12 13:54:55 UTC (rev 11601)
+++ trunk/openvas-plugins/scripts/gb_ubuntu_USN_1197_5.nasl	2011-09-12 14:29:49 UTC (rev 11602)
@@ -0,0 +1,125 @@
+###############################################################################
+# OpenVAS Vulnerability Test
+#
+# Ubuntu Update for ca-certificates USN-1197-5
+#
+# Authors:
+# System Generated Check
+#
+# Copyright:
+# Copyright (c) 2011 Greenbone Networks GmbH, http://www.greenbone.net
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2
+# (or any later version), as published by the Free Software Foundation.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+###############################################################################
+
+if(description)
+{
+  script_id(840738);
+  script_version("$Revision$: 1.0");
+  script_tag(name:"risk_factor", value:"High");
+  script_xref(name: "USN", value: "1197-5");
+  script_name("Ubuntu Update for ca-certificates USN-1197-5");
+  desc = "
+
+  Vulnerability Insight:
+
+  USN-1197-1 addressed an issue in Firefox and Xulrunner pertaining to the
+  Dutch Certificate Authority DigiNotar mis-issuing fraudulent certificates.
+  This update provides the corresponding update for ca-certificates.
+  
+  Original advisory details:
+  
+  It was discovered that Dutch Certificate Authority DigiNotar, had
+  mis-issued multiple fraudulent certificates. These certificates could allow
+  an attacker to perform a &quot;man in the middle&quot; (MITM) attack which would make
+  the user believe their connection is secure, but is actually being
+  monitored.
+  
+  For the protection of its users, Mozilla has removed the DigiNotar
+  certificate. Sites using certificates issued by DigiNotar will need to seek
+  another certificate vendor.
+  
+  We are currently aware of a regression that blocks one of two Staat der
+  Nederlanden root certificates which are believed to still be secure. This
+  regression is being tracked at https://launchpad.net/bugs/838322
+
+  Affected Software/OS:
+  ca-certificates on Ubuntu 11.04 ,
+  Ubuntu 10.10 ,
+  Ubuntu 10.04 LTS
+
+  Fix: Please Install the Updated Packages.
+
+  References:
+  https://lists.ubuntu.com/archives/ubuntu-security-announce/2011-September/001409.html
+
+  ";
+
+  script_description(desc);
+  script_summary("Check for the Version of ca-certificates");
+  script_category(ACT_GATHER_INFO);
+  script_copyright("Copyright (c) 2011 Greenbone Networks GmbH");
+  script_family("Ubuntu Local Security Checks");
+  script_dependencies("gather-package-list.nasl");
+  script_require_keys("ssh/login/release");
+  exit(0);
+}
+
+
+include("pkg-lib-deb.inc");
+include("revisions-lib.inc");
+
+release = get_kb_item("ssh/login/release");
+
+if(release == NULL){
+  exit(0);
+}
+
+if(release == "UBUNTU10.10")
+{
+
+  if(isdpkgvuln(pkg:"ca-certificates", ver:"20090814ubuntu0.10.10.1", rls:"UBUNTU10.10"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "UBUNTU10.04 LTS")
+{
+
+  if(isdpkgvuln(pkg:"ca-certificates", ver:"20090814ubuntu0.10.04.1", rls:"UBUNTU10.04 LTS"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "UBUNTU11.04")
+{
+
+  if(isdpkgvuln(pkg:"ca-certificates", ver:"20090814+nmu2ubuntu0.1", rls:"UBUNTU11.04"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
\ No newline at end of file

Added: trunk/openvas-plugins/scripts/gb_ubuntu_USN_1200_1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_ubuntu_USN_1200_1.nasl	2011-09-12 13:54:55 UTC (rev 11601)
+++ trunk/openvas-plugins/scripts/gb_ubuntu_USN_1200_1.nasl	2011-09-12 14:29:49 UTC (rev 11602)
@@ -0,0 +1,109 @@
+###############################################################################
+# OpenVAS Vulnerability Test
+#
+# Ubuntu Update for quassel USN-1200-1
+#
+# Authors:
+# System Generated Check
+#
+# Copyright:
+# Copyright (c) 2011 Greenbone Networks GmbH, http://www.greenbone.net
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2
+# (or any later version), as published by the Free Software Foundation.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+###############################################################################
+
+if(description)
+{
+  script_id(840737);
+  script_version("$Revision$: 1.0");
+  script_tag(name:"risk_factor", value:"High");
+  script_xref(name: "USN", value: "1200-1");
+  script_name("Ubuntu Update for quassel USN-1200-1");
+  desc = "
+
+  Vulnerability Insight:
+
+  It was discovered that Quassel did not properly handle CTCP requests. A
+  remote attacker could exploit this to cause a denial of service via
+  application crash.
+
+  Affected Software/OS:
+  quassel on Ubuntu 11.04 ,
+  Ubuntu 10.10 ,
+  Ubuntu 10.04 LTS
+
+  Fix: Please Install the Updated Packages.
+
+  References:
+  https://lists.ubuntu.com/archives/ubuntu-security-announce/2011-September/001410.html
+
+  ";
+
+  script_description(desc);
+  script_summary("Check for the Version of quassel");
+  script_category(ACT_GATHER_INFO);
+  script_copyright("Copyright (c) 2011 Greenbone Networks GmbH");
+  script_family("Ubuntu Local Security Checks");
+  script_dependencies("gather-package-list.nasl");
+  script_require_keys("ssh/login/release");
+  exit(0);
+}
+
+
+include("pkg-lib-deb.inc");
+include("revisions-lib.inc");
+
+release = get_kb_item("ssh/login/release");
+
+if(release == NULL){
+  exit(0);
+}
+
+if(release == "UBUNTU10.10")
+{
+
+  if(isdpkgvuln(pkg:"quassel-core", ver:"0.7.1-0ubuntu1.1", rls:"UBUNTU10.10"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "UBUNTU10.04 LTS")
+{
+
+  if(isdpkgvuln(pkg:"quassel-core", ver:"0.6.1-0ubuntu1.2", rls:"UBUNTU10.04 LTS"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "UBUNTU11.04")
+{
+
+  if(isdpkgvuln(pkg:"quassel-core", ver:"0.7.2-0ubuntu2.2", rls:"UBUNTU11.04"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
\ No newline at end of file



More information about the Openvas-commits mailing list