templates/report_item.sample in dradis-nessus-4.0.0 vs templates/report_item.sample in dradis-nessus-4.1.0
- old
+ new
@@ -26,10 +26,11 @@
<metasploit_name>Apache Win32 Chunked Encoding</metasploit_name>
<cvss3_base_score>3.7</cvss3_base_score>
<cvss3_temporal_score>6.8</cvss3_temporal_score>
<cvss3_temporal_vector>CVSS:3.0/E:U/RL:O/RC:C</cvss3_temporal_vector>
<cvss3_vector>CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N</cvss3_vector>
+ <cvssV3_impactScore>5.9</cvssV3_impactScore>
<cvss_vector>CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P</cvss_vector>
<synopsis>The remote web server is vulnerable to a remote code execution attack.</synopsis>
<threat_intensity_last_28>Very Low</threat_intensity_last_28>
<threat_recency>> 365 days</threat_recency>
<threat_sources_last_28>No recorded events</threat_sources_last_28>
@@ -39,9 +40,10 @@
<exploit_available>true</exploit_available>
<exploit_code_maturity>Unproven</exploit_code_maturity>
<plugin_modification_date>2011/03/08</plugin_modification_date>
<cvss_base_score>7.5</cvss_base_score>
<vpr_score>6.7</vpr_score>
+ <product_coverage>Low</product_coverage>
<canvas_package>CANVAS</canvas_package>
<cve>CVE-2002-0392</cve>
<bid>5033</bid>
<xref>IAVA:2002-a-0003</xref>
<xref>OSVDB:838</xref>