templates/report_item.sample in dradis-nessus-3.22.0 vs templates/report_item.sample in dradis-nessus-4.0.0
- old
+ new
@@ -5,10 +5,11 @@
severity="3"
pluginID="11030"
pluginName="Apache Chunked Encoding Remote Overflow"
pluginFamily="Web Servers">
+ <age_of_vuln>730 days +</age_of_vuln>
<exploitability_ease>Exploits are available</exploitability_ease>
<vuln_publication_date>2002/06/19</vuln_publication_date>
<exploit_framework_canvas>true</exploit_framework_canvas>
<exploit_framework_metasploit>true</exploit_framework_metasploit>
<cvss_temporal_vector>CVSS2#E:F/RL:OF/RC:C</cvss_temporal_vector>
@@ -27,15 +28,20 @@
<cvss3_temporal_score>6.8</cvss3_temporal_score>
<cvss3_temporal_vector>CVSS:3.0/E:U/RL:O/RC:C</cvss3_temporal_vector>
<cvss3_vector>CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N</cvss3_vector>
<cvss_vector>CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P</cvss_vector>
<synopsis>The remote web server is vulnerable to a remote code execution attack.</synopsis>
+ <threat_intensity_last_28>Very Low</threat_intensity_last_28>
+ <threat_recency>> 365 days</threat_recency>
+ <threat_sources_last_28>No recorded events</threat_sources_last_28>
<plugin_type>remote</plugin_type>
<see_also>http://httpd.apache.org/info/security_bulletin_20020617.txt</see_also>
<see_also>http://httpd.apache.org/info/security_bulletin_20020620.txt</see_also>
<exploit_available>true</exploit_available>
+ <exploit_code_maturity>Unproven</exploit_code_maturity>
<plugin_modification_date>2011/03/08</plugin_modification_date>
<cvss_base_score>7.5</cvss_base_score>
+ <vpr_score>6.7</vpr_score>
<canvas_package>CANVAS</canvas_package>
<cve>CVE-2002-0392</cve>
<bid>5033</bid>
<xref>IAVA:2002-a-0003</xref>
<xref>OSVDB:838</xref>