On Montag, 6. April 2009, Tim Brown wrote:
> Cross posted to openvas-plugins as it makes more sense to ask the question
> here.
true.
> My personal view is that we should start cleaning out the legacy code from
> the
> scripts where we can do so safely, this is a good example of something that
> can easily be retired.
:-)
Below is the list of NASL_LEVEL use.
Thomas: quite a number comes from your debian scripts.
Should we simply remove the code lines or do you prefer
to update yourself (via your automized processing) ?
Anyone else out there interested to assist elimination?
(I will start now)
Best
Jan
$ find . -name "*.nasl" | xargs grep NASL_LEVEL
./scripts/deb_1018_2.nasl: if(NASL_LEVEL>=2191) {
./scripts/deb_779_2.nasl: if(NASL_LEVEL>=2191) {
./scripts/firewall_detect.nasl:if ( NASL_LEVEL < 2205 ) exit(0);
./scripts/deb_1046_1.nasl: if(NASL_LEVEL>=2191) {
./scripts/deb_781_1.nasl: if(NASL_LEVEL>=2191) {
./scripts/glsa_200804_20.nasl: if(NASL_LEVEL>=2191) {
./scripts/glsa_200606_21.nasl: if(NASL_LEVEL>=2191) {
./scripts/deb_639_1.nasl: if(NASL_LEVEL>=2191) {
./scripts/nmap.nasl: if (NASL_LEVEL < 2181) exit(0); # Cannot run
./scripts/nmap.nasl: if (NASL_LEVEL > 2200)
./scripts/nmap.nasl: if (NASL_LEVEL > 2200)
./scripts/nmap.nasl:if (NASL_LEVEL < 2181 || ! defined_func("pread") || !
defined_func("get_preference"))
./scripts/deb_1017_1.nasl: if(NASL_LEVEL>=2191) {
./scripts/glsa_200701_04.nasl: if(NASL_LEVEL>=2191) {
./scripts/deb_868_1.nasl: if(NASL_LEVEL>=2191) {
./scripts/deb_1336_1.nasl: if(NASL_LEVEL>=2191) {
./scripts/deb_1681_1.nasl: if(NASL_LEVEL>=2191) {
./scripts/http_ids_evasion.nasl:if ( NASL_LEVEL >= 3000 ) exit(0);
./scripts/freebsd_firefox18.nasl: if(NASL_LEVEL>=2191) {
./scripts/deb_1444_2.nasl: if(NASL_LEVEL>=2191) {
./scripts/portscan-strobe.nasl: if (NASL_LEVEL < 2181) exit(0); # Cannot run
./scripts/portscan-strobe.nasl:if (NASL_LEVEL < 2181 || ! defined_func("pread")
|| ! defined_func("get_preference"))
./scripts/deb_1534_2.nasl: if(NASL_LEVEL>=2191) {
./scripts/glsa_200703_21.nasl: if(NASL_LEVEL>=2191) {
./scripts/glsa_200608_04.nasl: if(NASL_LEVEL>=2191) {
./scripts/glsa_200703_04.nasl: if(NASL_LEVEL>=2191) {
./scripts/glsa_200711_23.nasl: if(NASL_LEVEL>=2191) {
./scripts/deb_1356_1.nasl: if(NASL_LEVEL>=2191) {
./scripts/amap.nasl: if (NASL_LEVEL < 2181) exit(0); # Cannot run
./scripts/amap.nasl:if (NASL_LEVEL < 2181 || ! defined_func("pread") || !
defined_func("get_preference"))
./scripts/sambar_xss.nasl: if (NASL_LEVEL >= 2200)
./scripts/deb_1649_1.nasl: if(NASL_LEVEL>=2191) {
./scripts/glsa_200808_03.nasl: if(NASL_LEVEL>=2191) {
./scripts/deb_1304_1.nasl: if(NASL_LEVEL>=2191) {
./scripts/deb_810_1.nasl: if(NASL_LEVEL>=2191) {
./scripts/freebsd_firefox25.nasl: if(NASL_LEVEL>=2191) {
./scripts/glsa_200703_08.nasl: if(NASL_LEVEL>=2191) {
./scripts/poptop_negative_read.nasl:pptp_vendor = mkword(NASL_LEVEL) +
# Firmware revision
./scripts/glsa_200711_30.nasl: if(NASL_LEVEL>=2191) {
./scripts/deb_1489_1.nasl: if(NASL_LEVEL>=2191) {
./scripts/deb_1669_1.nasl: if(NASL_LEVEL>=2191) {
./scripts/freebsd_ethereal7.nasl: if(NASL_LEVEL>=2191) {
./scripts/deb_1283_1.nasl: if(NASL_LEVEL>=2191) {
./scripts/deb_1504_1.nasl: if(NASL_LEVEL>=2191) {
./scripts/deb_1118_1.nasl: if(NASL_LEVEL>=2191) {
./scripts/glsa_200802_04.nasl: if(NASL_LEVEL>=2191) {
./scripts/deb_1396_1.nasl: if(NASL_LEVEL>=2191) {
./scripts/deb_1051_1.nasl: if(NASL_LEVEL>=2191) {
./scripts/deb_1097_1.nasl: if(NASL_LEVEL>=2191) {
./scripts/glsa_200604_12.nasl: if(NASL_LEVEL>=2191) {
./scripts/hydra_options.nasl: if ( NASL_LEVEL < 2201 ) return logins; # fwrite
broken
./scripts/deb_1570_1.nasl: if(NASL_LEVEL>=2191) {
./scripts/deb_1184_1.nasl: if(NASL_LEVEL>=2191) {
./scripts/portbunny.nasl: if (NASL_LEVEL < 2181) exit(0); # Cannot run
./scripts/portbunny.nasl:if (NASL_LEVEL < 2181 || ! defined_func("pread") || !
defined_func("get_preference"))
./scripts/freebsd_firefox22.nasl: if(NASL_LEVEL>=2191) {
./scripts/glsa_200503_30.nasl: if(NASL_LEVEL>=2191) {
./scripts/glsa_200606_12.nasl: if(NASL_LEVEL>=2191) {
./scripts/doublecheck_std_services.nasl:if (NASL_LEVEL < 2200 ) exit(0);
./scripts/http_w98_devname_dos.nasl: if (NASL_LEVEL >= 2200 )
script_cve_id("CVE-2001-0386", "CVE-2001-0493", "CVE-2001-0391",
"CVE-2001-0558", "CVE-2002-0200", "CVE-2000-0168", "CVE-2003-0016",
"CVE-2001-0602");
./scripts/glsa_200705_19.nasl: if(NASL_LEVEL>=2191) {
./scripts/gather-package-list.nasl: if(NASL_LEVEL>=2300){
./scripts/glsa_200811_01.nasl: if(NASL_LEVEL>=2191) {
./scripts/deb_1103_1.nasl: if(NASL_LEVEL>=2191) {
./scripts/freebsd_firefox26.nasl: if(NASL_LEVEL>=2191) {
./scripts/glsa_200709_15.nasl: if(NASL_LEVEL>=2191) {
./scripts/deb_1535_1.nasl: if(NASL_LEVEL>=2191) {
./scripts/deb_1082_1.nasl: if(NASL_LEVEL>=2191) {
./scripts/deb_925_1.nasl: if(NASL_LEVEL>=2191) {
./scripts/glsa_200701_02.nasl: if(NASL_LEVEL>=2191) {
./scripts/glsa_200710_02.nasl: if(NASL_LEVEL>=2191) {
./scripts/glsa_200811_05.nasl: if(NASL_LEVEL>=2191) {
./scripts/deb_1532_1.nasl: if(NASL_LEVEL>=2191) {
./scripts/deb_423_1.nasl: if(NASL_LEVEL>=2191) {
./scripts/deb_1671_1.nasl: if(NASL_LEVEL>=2191) {
./scripts/deb_1506_1.nasl: if(NASL_LEVEL>=2191) {
./scripts/deb_1120_1.nasl: if(NASL_LEVEL>=2191) {
./scripts/deb_922_1.nasl: if(NASL_LEVEL>=2191) {
./scripts/glsa_200608_02.nasl: if(NASL_LEVEL>=2191) {
./scripts/deb_1233_1.nasl: if(NASL_LEVEL>=2191) {
./scripts/glsa_200505_03.nasl: if(NASL_LEVEL>=2191) {
./scripts/deb_1503_1.nasl: if(NASL_LEVEL>=2191) {
./scripts/freebsd_phpbb9.nasl: if(NASL_LEVEL>=2191) {
./scripts/deb_1485_1.nasl: if(NASL_LEVEL>=2191) {
./scripts/glsa_200503_10.nasl: if(NASL_LEVEL>=2191) {
./scripts/deb_1184_2.nasl: if(NASL_LEVEL>=2191) {
./scripts/deb_1392_1.nasl: if(NASL_LEVEL>=2191) {
./scripts/glsa_200712_23.nasl: if(NASL_LEVEL>=2191) {
./scripts/deb_1070_1.nasl: if(NASL_LEVEL>=2191) {
./scripts/freebsd_php51.nasl: if(NASL_LEVEL>=2191) {
./scripts/freebsd_ethereal5.nasl: if(NASL_LEVEL>=2191) {
./scripts/deb_1044_1.nasl: if(NASL_LEVEL>=2191) {
./scripts/glsa_200604_17.nasl: if(NASL_LEVEL>=2191) {
./scripts/deb_1134_1.nasl: if(NASL_LEVEL>=2191) {
./scripts/deb_936_1.nasl: if(NASL_LEVEL>=2191) {
./scripts/snmpwalk_portscan.nasl:if (NASL_LEVEL < 2181) exit(0); #
Cannot run
./scripts/snmpwalk_portscan.nasl:if (NASL_LEVEL < 2181) exit(0); #
Cannot run
./scripts/deb_1018_1.nasl: if(NASL_LEVEL>=2191) {
./scripts/deb_779_1.nasl: if(NASL_LEVEL>=2191) {
./scripts/deb_1067_1.nasl: if(NASL_LEVEL>=2191) {
./scripts/deb_1607_1.nasl: if(NASL_LEVEL>=2191) {
./scripts/scan_info.nasl: if ( ! defined_func("pread") && NASL_LEVEL >=
2202 )
./scripts/scan_info.nasl: version = "Unknown (NASL_LEVEL=" +
NASL_LEVEL + ")";
./scripts/deb_1401_1.nasl: if(NASL_LEVEL>=2191) {
./scripts/ids_evasion.nasl:if ( NASL_LEVEL >= 3000 ) exit(0);
./scripts/deb_866_1.nasl: if(NASL_LEVEL>=2191) {
./scripts/unknown_services.nasl: if (NASL_LEVEL >= 3000)
./scripts/glsa_200510_25.nasl: if(NASL_LEVEL>=2191) {
./scripts/freebsd_firefox34.nasl: if(NASL_LEVEL>=2191) {
./scripts/deb_1506_2.nasl: if(NASL_LEVEL>=2191) {
./scripts/glsa_200805_18.nasl: if(NASL_LEVEL>=2191) {
./scripts/deb_1444_1.nasl: if(NASL_LEVEL>=2191) {
./scripts/deb_1534_1.nasl: if(NASL_LEVEL>=2191) {
./scripts/freebsd_linux-flashplugin2.nasl: if(NASL_LEVEL>=2191) {
./scripts/glsa_200608_03.nasl: if(NASL_LEVEL>=2191) {
./scripts/deb_358_1.nasl: if(NASL_LEVEL>=2191) {
./scripts/deb_1503_2.nasl: if(NASL_LEVEL>=2191) {
./scripts/glsa_200605_09.nasl: if(NASL_LEVEL>=2191) {
./scripts/deb_1485_2.nasl: if(NASL_LEVEL>=2191) {
./scripts/deb_1621_1.nasl: if(NASL_LEVEL>=2191) {
./scripts/pnscan.nasl: if (NASL_LEVEL < 2181) exit(0); # Cannot run
./scripts/pnscan.nasl:if (NASL_LEVEL < 2181 || ! defined_func("pread") || !
defined_func("get_preference"))
./scripts/deb_921_1.nasl: if(NASL_LEVEL>=2191) {
./scripts/freebsd_firefox24.nasl: if(NASL_LEVEL>=2191) {
./scripts/deb_442_1.nasl: if(NASL_LEVEL>=2191) {
./scripts/deb_1049_1.nasl: if(NASL_LEVEL>=2191) {
./scripts/deb_1484_1.nasl: if(NASL_LEVEL>=2191) {
./scripts/deb_1615_1.nasl: if(NASL_LEVEL>=2191) {
./scripts/glsa_200604_18.nasl: if(NASL_LEVEL>=2191) {
./scripts/smb_nt_ms02-005.nasl: if ( NASL_LEVEL >= 2191 )
script_bugtraq_id(10473, 8565, 9009, 9012, 9013, 9014, 9015, 9182, 9663, 9798,
12477, 12475, 12473, 12530, 13123, 13117, 13120);
./scripts/smb_nt_ms02-005.nasl: if ( NASL_LEVEL >= 2191 )
script_cve_id("CAN-2003-0814", "CAN-2003-0815", "CAN-2003-0816",
"CAN-2003-0817", "CAN-2003-0823", "CAN-2004-0549", "CAN-2004-0566",
"CAN-2003-1048", "CAN-2001-1325", "CAN-2001-0149", "CAN-2001-0727",
"CAN-2001-0875", "CVE-2001-1325", "CVE-2001-0149", "CVE-2001-0727",
"CVE-2001-0875", "CVE-2001-0339", "CVE-2001-0002", "CAN-2002-0190",
"CVE-2002-0026", "CAN-2003-1326", "CVE-2002-0027", "CVE-2002-0022",
"CAN-2003-1328", "CAN-2002-1262", "CAN-2002-0193", "CAN-1999-1016",
"CVE-2003-0344", "CAN-2003-0233", "CAN-2003-0309", "CAN-2003-0113",
"CAN-2003-0114", "CAN-2003-0115", "CAN-2003-0116", "CAN-2003-0531",
"CAN-2003-0809", "CAN-2003-0530", "CAN-2003-1025", "CAN-2003-1026",
"CAN-2003-1027", "CAN-2005-0554", "CAN-2005-0555");
./scripts/deb_1687_1.nasl: if(NASL_LEVEL>=2191) {
./scripts/glsa_200812_17.nasl: if(NASL_LEVEL>=2191) {
./scripts/ubuntu_698_2.nasl: if(NASL_LEVEL>=2191) {
./scripts/ubuntu_697_1.nasl: if(NASL_LEVEL>=2191) {
./scripts/ubuntu_699_1.nasl: if(NASL_LEVEL>=2191) {
./scripts/RHSA_2009_0002.nasl: if(NASL_LEVEL>=2191) {
./scripts/RHSA_2008_0787.nasl: if(NASL_LEVEL>=2191) {
./scripts/RHSA_2009_0001.nasl: if(NASL_LEVEL>=2191) {
./scripts/ovcesa2009_0002.nasl: if(NASL_LEVEL>=2191) {
./scripts/suse_sa_2009_001.nasl: if(NASL_LEVEL>=2191) {
./scripts/deb_1697_1.nasl: if(NASL_LEVEL>=2191) {
./scripts/deb_1696_1.nasl: if(NASL_LEVEL>=2191) {
./scripts/suse_sa_2009_003.nasl: if(NASL_LEVEL>=2191) {
./scripts/suse_sr_2009_002.nasl: if(NASL_LEVEL>=2191) {
./scripts/suse_sr_2009_001a.nasl: if(NASL_LEVEL>=2191) {
./scripts/RHSA_2009_0015.nasl: if(NASL_LEVEL>=2191) {
./scripts/deb_1707_1.nasl: if(NASL_LEVEL>=2191) {
./scripts/suse_sr_2009_001b.nasl: if(NASL_LEVEL>=2191) {
./scripts/RHSA_2009_0016.nasl: if(NASL_LEVEL>=2191) {
./scripts/suse_sa_2009_002.nasl: if(NASL_LEVEL>=2191) {
./scripts/suse_sr_2009_001.nasl: if(NASL_LEVEL>=2191) {
./scripts/ubuntu_708_1.nasl: if(NASL_LEVEL>=2191) {
./scripts/mdksa_2009_023.nasl: if(NASL_LEVEL>=2191) {
./scripts/mdksa_2009_020.nasl: if(NASL_LEVEL>=2191) {
./scripts/ubuntu_713_1.nasl: if(NASL_LEVEL>=2191) {
./scripts/ubuntu_710_1.nasl: if(NASL_LEVEL>=2191) {
./scripts/suse_sr_2009_003.nasl: if(NASL_LEVEL>=2191) {
./scripts/ubuntu_712_1.nasl: if(NASL_LEVEL>=2191) {
./scripts/ubuntu_711_1.nasl: if(NASL_LEVEL>=2191) {
./scripts/ovcesa2009_0001_01.nasl: if(NASL_LEVEL>=2191) {
./scripts/suse_sr_2009_004.nasl: if(NASL_LEVEL>=2191) {
./scripts/suse_sa_2009_010.nasl: if(NASL_LEVEL>=2191) {
./scripts/suse_sr_2009_005.nasl: if(NASL_LEVEL>=2191) {
./scripts/ubuntu_726_1.nasl: if(NASL_LEVEL>=2191) {
./scripts/ubuntu_727_1.nasl: if(NASL_LEVEL>=2191) {
./scripts/RHSA_2009_0313.nasl: if(NASL_LEVEL>=2191) {
./scripts/ubuntu_731_1.nasl: if(NASL_LEVEL>=2191) {
./scripts/glsa_200903_23.nasl: if(NASL_LEVEL>=2191) {
./scripts/suse_sr_2009_006.nasl: if(NASL_LEVEL>=2191) {
./scripts/ovcesa2009_0313.nasl: if(NASL_LEVEL>=2191) {
./scripts/ubuntu_732_1.nasl: if(NASL_LEVEL>=2191) {
./scripts/ubuntu_736_1.nasl: if(NASL_LEVEL>=2191) {
./scripts/RHSA_2009_0394.nasl: if(NASL_LEVEL>=2191) {
./scripts/suse_sr_2009_007.nasl: if(NASL_LEVEL>=2191) {
./scripts/deb_1749_1.nasl: if(NASL_LEVEL>=2191) {
./scripts/ubuntu_742_1.nasl: if(NASL_LEVEL>=2191) {
./scripts/RHSA_2009_0392.nasl: if(NASL_LEVEL>=2191) {
--
Dr. Jan-Oliver Wagner | ++49-541-335083-0 | http://www.intevation.de/
Intevation GmbH, Neuer Graben 17, 49074 Osnabrück | AG Osnabrück, HR B 18998
Geschäftsführer: Frank Koormann, Bernhard Reiter, Dr. Jan-Oliver Wagner
_______________________________________________
Openvas-plugins mailing list
[email protected]
http://lists.wald.intevation.org/mailman/listinfo/openvas-plugins