GoogleApi.ContainerAnalysis.V1beta1.Model.Vulnerability (google_api_container_analysis v0.14.0) View Source

Vulnerability provides metadata about a security vulnerability in a Note.


  • cvssScore (type: number(), default: nil) - The CVSS score for this vulnerability.
  • cvssV3 (type: GoogleApi.ContainerAnalysis.V1beta1.Model.CVSSv3.t, default: nil) - The full description of the CVSSv3.
  • details (type: list(GoogleApi.ContainerAnalysis.V1beta1.Model.Detail.t), default: nil) - All information about the package to specifically identify this vulnerability. One entry per (version range and cpe_uri) the package vulnerability has manifested in.
  • severity (type: String.t, default: nil) - Note provider assigned impact of the vulnerability.
  • sourceUpdateTime (type: DateTime.t, default: nil) - The time this information was last changed at the source. This is an upstream timestamp from the underlying information source - e.g. Ubuntu security tracker.
  • windowsDetails (type: list(GoogleApi.ContainerAnalysis.V1beta1.Model.WindowsDetail.t), default: nil) - Windows details get their own format because the information format and model don't match a normal detail. Specifically Windows updates are done as patches, thus Windows vulnerabilities really are a missing package, rather than a package being at an incorrect version.

Link to this section Summary


Unwrap a decoded JSON object into its complex fields.

Link to this section Types


t() :: %GoogleApi.ContainerAnalysis.V1beta1.Model.Vulnerability{
  cvssScore: number() | nil,
  cvssV3: GoogleApi.ContainerAnalysis.V1beta1.Model.CVSSv3.t() | nil,
  details: [GoogleApi.ContainerAnalysis.V1beta1.Model.Detail.t()] | nil,
  severity: String.t() | nil,
  sourceUpdateTime: DateTime.t() | nil,
    [GoogleApi.ContainerAnalysis.V1beta1.Model.WindowsDetail.t()] | nil

Link to this section Functions


decode(struct(), keyword()) :: struct()

Unwrap a decoded JSON object into its complex fields.