templates/report_item.sample in dradis-nessus-3.21.0 vs templates/report_item.sample in dradis-nessus-3.22.0
- old
+ new
@@ -22,9 +22,11 @@
1.2.2 and above, 1.3 through 1.3.24, and 2.0 through 2.0.36 are affected, the remote server may be running a patched version of Apache.</description>
<plugin_publication_date>2002/06/17</plugin_publication_date>
<metasploit_name>Apache Win32 Chunked Encoding</metasploit_name>
<cvss3_base_score>3.7</cvss3_base_score>
+ <cvss3_temporal_score>6.8</cvss3_temporal_score>
+ <cvss3_temporal_vector>CVSS:3.0/E:U/RL:O/RC:C</cvss3_temporal_vector>
<cvss3_vector>CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N</cvss3_vector>
<cvss_vector>CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P</cvss_vector>
<synopsis>The remote web server is vulnerable to a remote code execution attack.</synopsis>
<plugin_type>remote</plugin_type>
<see_also>http://httpd.apache.org/info/security_bulletin_20020617.txt</see_also>