templates/report_item.sample in dradis-nessus-3.22.0 vs templates/report_item.sample in dradis-nessus-4.0.0

- old
+ new

@@ -5,10 +5,11 @@ severity="3" pluginID="11030" pluginName="Apache Chunked Encoding Remote Overflow" pluginFamily="Web Servers"> + <age_of_vuln>730 days +</age_of_vuln> <exploitability_ease>Exploits are available</exploitability_ease> <vuln_publication_date>2002/06/19</vuln_publication_date> <exploit_framework_canvas>true</exploit_framework_canvas> <exploit_framework_metasploit>true</exploit_framework_metasploit> <cvss_temporal_vector>CVSS2#E:F/RL:OF/RC:C</cvss_temporal_vector> @@ -27,15 +28,20 @@ <cvss3_temporal_score>6.8</cvss3_temporal_score> <cvss3_temporal_vector>CVSS:3.0/E:U/RL:O/RC:C</cvss3_temporal_vector> <cvss3_vector>CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N</cvss3_vector> <cvss_vector>CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P</cvss_vector> <synopsis>The remote web server is vulnerable to a remote code execution attack.</synopsis> + <threat_intensity_last_28>Very Low</threat_intensity_last_28> + <threat_recency>&gt; 365 days</threat_recency> + <threat_sources_last_28>No recorded events</threat_sources_last_28> <plugin_type>remote</plugin_type> <see_also>http://httpd.apache.org/info/security_bulletin_20020617.txt</see_also> <see_also>http://httpd.apache.org/info/security_bulletin_20020620.txt</see_also> <exploit_available>true</exploit_available> + <exploit_code_maturity>Unproven</exploit_code_maturity> <plugin_modification_date>2011/03/08</plugin_modification_date> <cvss_base_score>7.5</cvss_base_score> + <vpr_score>6.7</vpr_score> <canvas_package>CANVAS</canvas_package> <cve>CVE-2002-0392</cve> <bid>5033</bid> <xref>IAVA:2002-a-0003</xref> <xref>OSVDB:838</xref>