GoogleApi.SecurityCenter.V1.Model.Cve (google_api_security_center v0.39.0)
View SourceCVE stands for Common Vulnerabilities and Exposures. Information from the CVE record that describes this vulnerability.
Attributes
-
cvssv3
(type:GoogleApi.SecurityCenter.V1.Model.Cvssv3.t
, default:nil
) - Describe Common Vulnerability Scoring System specified at https://www.first.org/cvss/v3.1/specification-document -
exploitReleaseDate
(type:DateTime.t
, default:nil
) - Date the first publicly available exploit or PoC was released. -
exploitationActivity
(type:String.t
, default:nil
) - The exploitation activity of the vulnerability in the wild. -
firstExploitationDate
(type:DateTime.t
, default:nil
) - Date of the earliest known exploitation. -
id
(type:String.t
, default:nil
) - The unique identifier for the vulnerability. e.g. CVE-2021-34527 -
impact
(type:String.t
, default:nil
) - The potential impact of the vulnerability if it was to be exploited. -
observedInTheWild
(type:boolean()
, default:nil
) - Whether or not the vulnerability has been observed in the wild. -
references
(type:list(GoogleApi.SecurityCenter.V1.Model.Reference.t)
, default:nil
) - Additional information about the CVE. e.g. https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-34527 -
upstreamFixAvailable
(type:boolean()
, default:nil
) - Whether upstream fix is available for the CVE. -
zeroDay
(type:boolean()
, default:nil
) - Whether or not the vulnerability was zero day when the finding was published.
Summary
Functions
Unwrap a decoded JSON object into its complex fields.
Types
@type t() :: %GoogleApi.SecurityCenter.V1.Model.Cve{ cvssv3: GoogleApi.SecurityCenter.V1.Model.Cvssv3.t() | nil, exploitReleaseDate: DateTime.t() | nil, exploitationActivity: String.t() | nil, firstExploitationDate: DateTime.t() | nil, id: String.t() | nil, impact: String.t() | nil, observedInTheWild: boolean() | nil, references: [GoogleApi.SecurityCenter.V1.Model.Reference.t()] | nil, upstreamFixAvailable: boolean() | nil, zeroDay: boolean() | nil }