GoogleApi.ContainerAnalysis.V1beta1.Model.Vulnerability (google_api_container_analysis v0.14.0) View Source
Vulnerability provides metadata about a security vulnerability in a Note.
Attributes
-
cvssScore(type:number(), default:nil) - The CVSS score for this vulnerability. -
cvssV3(type:GoogleApi.ContainerAnalysis.V1beta1.Model.CVSSv3.t, default:nil) - The full description of the CVSSv3. -
details(type:list(GoogleApi.ContainerAnalysis.V1beta1.Model.Detail.t), default:nil) - All information about the package to specifically identify this vulnerability. One entry per (version range and cpe_uri) the package vulnerability has manifested in. -
severity(type:String.t, default:nil) - Note provider assigned impact of the vulnerability. -
sourceUpdateTime(type:DateTime.t, default:nil) - The time this information was last changed at the source. This is an upstream timestamp from the underlying information source - e.g. Ubuntu security tracker. -
windowsDetails(type:list(GoogleApi.ContainerAnalysis.V1beta1.Model.WindowsDetail.t), default:nil) - Windows details get their own format because the information format and model don't match a normal detail. Specifically Windows updates are done as patches, thus Windows vulnerabilities really are a missing package, rather than a package being at an incorrect version.
Link to this section Summary
Functions
Unwrap a decoded JSON object into its complex fields.
Link to this section Types
Specs
t() :: %GoogleApi.ContainerAnalysis.V1beta1.Model.Vulnerability{
cvssScore: number() | nil,
cvssV3: GoogleApi.ContainerAnalysis.V1beta1.Model.CVSSv3.t() | nil,
details: [GoogleApi.ContainerAnalysis.V1beta1.Model.Detail.t()] | nil,
severity: String.t() | nil,
sourceUpdateTime: DateTime.t() | nil,
windowsDetails:
[GoogleApi.ContainerAnalysis.V1beta1.Model.WindowsDetail.t()] | nil
}
Link to this section Functions
Specs
Unwrap a decoded JSON object into its complex fields.