GoogleApi.ContainerAnalysis.V1beta1.Model.Vulnerability (google_api_container_analysis v0.11.0) View Source
Vulnerability provides metadata about a security vulnerability in a Note.
Attributes
-
cvssScore
(type:number()
, default:nil
) - The CVSS score for this vulnerability. -
cvssV3
(type:GoogleApi.ContainerAnalysis.V1beta1.Model.CVSSv3.t
, default:nil
) - The full description of the CVSSv3. -
details
(type:list(GoogleApi.ContainerAnalysis.V1beta1.Model.Detail.t)
, default:nil
) - All information about the package to specifically identify this vulnerability. One entry per (version range and cpe_uri) the package vulnerability has manifested in. -
severity
(type:String.t
, default:nil
) - Note provider assigned impact of the vulnerability. -
sourceUpdateTime
(type:DateTime.t
, default:nil
) - The time this information was last changed at the source. This is an upstream timestamp from the underlying information source - e.g. Ubuntu security tracker. -
windowsDetails
(type:list(GoogleApi.ContainerAnalysis.V1beta1.Model.WindowsDetail.t)
, default:nil
) - Windows details get their own format because the information format and model don't match a normal detail. Specifically Windows updates are done as patches, thus Windows vulnerabilities really are a missing package, rather than a package being at an incorrect version.
Link to this section Summary
Functions
Unwrap a decoded JSON object into its complex fields.
Link to this section Types
Specs
t() :: %GoogleApi.ContainerAnalysis.V1beta1.Model.Vulnerability{ cvssScore: number() | nil, cvssV3: GoogleApi.ContainerAnalysis.V1beta1.Model.CVSSv3.t() | nil, details: [GoogleApi.ContainerAnalysis.V1beta1.Model.Detail.t()] | nil, severity: String.t() | nil, sourceUpdateTime: DateTime.t() | nil, windowsDetails: [GoogleApi.ContainerAnalysis.V1beta1.Model.WindowsDetail.t()] | nil }
Link to this section Functions
Specs
Unwrap a decoded JSON object into its complex fields.