View Source GoogleApi.ContainerAnalysis.V1.Model.VulnerabilityNote (google_api_container_analysis v0.26.0)

A security vulnerability that can be found in resources.

Attributes

  • cvssScore (type: number(), default: nil) - The CVSS score of this vulnerability. CVSS score is on a scale of 0 - 10 where 0 indicates low severity and 10 indicates high severity.
  • cvssV3 (type: GoogleApi.ContainerAnalysis.V1.Model.CVSSv3.t, default: nil) - The full description of the CVSSv3 for this vulnerability.
  • details (type: list(GoogleApi.ContainerAnalysis.V1.Model.Detail.t), default: nil) - Details of all known distros and packages affected by this vulnerability.
  • severity (type: String.t, default: nil) - The note provider assigned severity of this vulnerability.
  • sourceUpdateTime (type: DateTime.t, default: nil) - The time this information was last changed at the source. This is an upstream timestamp from the underlying information source - e.g. Ubuntu security tracker.
  • windowsDetails (type: list(GoogleApi.ContainerAnalysis.V1.Model.WindowsDetail.t), default: nil) - Windows details get their own format because the information format and model don't match a normal detail. Specifically Windows updates are done as patches, thus Windows vulnerabilities really are a missing package, rather than a package being at an incorrect version.

Link to this section Summary

Functions

Unwrap a decoded JSON object into its complex fields.

Link to this section Types

Specs

t() :: %GoogleApi.ContainerAnalysis.V1.Model.VulnerabilityNote{
  cvssScore: number() | nil,
  cvssV3: GoogleApi.ContainerAnalysis.V1.Model.CVSSv3.t() | nil,
  details: [GoogleApi.ContainerAnalysis.V1.Model.Detail.t()] | nil,
  severity: String.t() | nil,
  sourceUpdateTime: DateTime.t() | nil,
  windowsDetails: [GoogleApi.ContainerAnalysis.V1.Model.WindowsDetail.t()] | nil
}

Link to this section Functions

Specs

decode(struct(), keyword()) :: struct()

Unwrap a decoded JSON object into its complex fields.