profile:
name=Name
scan=Scan
new_scan=New Scan
scanning=Scanning...
stop=Stop Scan
scan_log=Scan Log
last_log=Last Scan Log
history=Scan History
target=Target Server
url=URLs Found
alert=Alerts Found
time=Scan Time
end_time=End Time
viewreport=View the scan report
viewlog=View the detail scan log
deletereport=Delete the scan report
deleteprompt=Are you sure delete this scan report?
scan_mode=Scan Mode
mode_normal=Enhanced Mode
mode_carefully=Basic Mode
download=Download Report File
html=HTML Format:
xml=XML Format:
mht=MHT Format:
pdf=PDF Format:
rtf=RTF Format:
txt=TXT Format:
viewReport=View
downReport=Download
req_timeout=Request Timeout
pause=Delay Between Each Request
scan_target=Scan Target
scan_template=Scan Template
advanced_options=Advanced Options
general=General
crawl=Crawl
authentication=Authentication
cookie_jar_file=Cookie Jar File
ignore_session_cookies=Ignore Session Cookies
custom_headers=Custom Headers
sub_path_limit=Sub Path Limit Per URL
max_scan_time=Max Scan Time
max_crawl_time=Max Crawl Time
minutes=Minutes
bytes=Bytes
max_params_limit=Max Params Limit Per URL
max_file_size=Max File Size
max_http_retries=Max HTTP Retries
http_basic_authentication=HTTP Basic Authentication
basic_user=User
basic_password=Password
form_based_authentication=Form Based Authentication
form_username=Username
form_password=Password
username_field=Username Field
password_field=Password Field
err_custom_headers=Up to 10 lines can be entered.
request_count=Request Count
request_per_minute=Requests per Minute
total_alerts_found=Total Alerts Found
alerts_found=Alerts Found
data_format=Data Format
session_check_url=Session Check URL
session_check_string=Session Check String

edit=Edit Web Vulnerability Scan Profile
new=New Web Vulnerability Scan Profile
new_scan=New Web Vulnerability Scan
hostname_url=Hostname/IP or URL
host_eg=(e.g. "www.mytestwvs.com", "http://www.mytestwvs.com:8080/test/login.php") 
scan=Scan
common_vul=Common Web Server Vulnerability
xss=XSS (Cross-site Scripting)
sql_injection=SQL Injection
src_disclosure=Source-code Disclosure
os_commanding=OS Commanding
scan_mode=Scan Mode
mode_normal=Enhanced Mode
mode_carefully=Basic Mode
mode_note=("Enhanced Mode" will post test data to web server.)
login_option=Login Option
http_login=Login with HTTP Authentication
user=User
pass=Password
url_login=Login with specified URL/data
auth_url=Authenticate URL
auth_url_eg=(e.g. "/logincheck")
auth_data=Authenticate Data
auth_data_eg=(e.g. "username=admin&secretkey=admin123")
req_timeout=Request Timeout
pause=Delay Between Each Request
seconds=Seconds
hostname=Hostname/IP
url_option=Scan Web Site URLs Option
auto_crawl=Crawl entire web site automatically
crawl_limit=Crawl URLs Limit
specify_url=Specify URLs for scanning
urlie=(specify web site URLs, each URL per line, e.g. "/product/catalog.php")
exclude_url=Exclude scanning following URLs
exurlie=(specify URL or keyword, each URL per line, e.g. "/product/buy.php", "shutdown")
err_space=The space character is not allowed.
err_char=The following characters are not allowed: ~ ` !  @ # $ % ^ & * () \\ | ; ?  / \' \" < > - + =
auth_url_tip=Enter full URL such as http://www.mytestwvs.com:8080/test/login.php
err_request_timeout= is an invalid value.Please enter a value between 0 and 30.
err_sub_path_limit= is an invalid value.Please enter a value between 1 and 200.
err_max_scan_time= is an invalid value.Please enter a value between 1 and 480.
err_max_crawl_time= is an invalid value.Please enter a value between 1 and 240.
err_max_params_limit= is an invalid value.Please enter a value between 1 and 100.
err_max_file_size= is an invalid value.Please enter a value between 1 and 40000000.
err_max_http_retries= is an invalid value.Please enter a value between 1 and 10.
err_more_than= must more than 

report:
title=Web Vulnerability Scan Report
printable=Printable
close=Close
summary=Summary
scan_summary=Scan Summary
alerts_found=Alerts Found
affected_pages=Affected Pages
affected_app=Affected Pages/Applications
app_vul=Application Vulnerabilities
no_vul_found=No vulnerability found
common_vul=Common Vulnerabilities
server_info=Server Information
web_server=Web Server
web_server_info=Web Server Information
pages_found=URLs/Pages Found
urls_have_input=URLs That Have Input
ext_link=External Links
by_cat=By Category
by_sev=By Severity
falsepositive=False Positive
is_falsepositive=(False Positive)
mark_falsepositive=Mark this vulnerability as false positive
vul=Vulnerability
sev=Severity
uri=URI
url=URL
description=Description
method=Method
post_data=Post Data
res_header=Response Header
res_data=Response data
view_res_data=View Response Data
view=[View]

