Hi there! Are you looking for the official Deno documentation? Try docs.deno.com for all your Deno learning needs.

Cve

import type { Cve } from "https://googleapis.deno.dev/v1/securitycenter:v1.ts";

CVE stands for Common Vulnerabilities and Exposures. Information from the CVE record that describes this vulnerability.

interface Cve {
cvssv3?: Cvssv3;
exploitationActivity?:
| "EXPLOITATION_ACTIVITY_UNSPECIFIED"
| "WIDE"
| "CONFIRMED"
| "AVAILABLE"
| "ANTICIPATED"
| "NO_KNOWN";
id?: string;
impact?:
| "RISK_RATING_UNSPECIFIED"
| "LOW"
| "MEDIUM"
| "HIGH"
| "CRITICAL";
observedInTheWild?: boolean;
references?: Reference[];
upstreamFixAvailable?: boolean;
zeroDay?: boolean;
}

§Properties

§
cvssv3?: Cvssv3
[src]

Describe Common Vulnerability Scoring System specified at https://www.first.org/cvss/v3.1/specification-document

§
exploitationActivity?: "EXPLOITATION_ACTIVITY_UNSPECIFIED" | "WIDE" | "CONFIRMED" | "AVAILABLE" | "ANTICIPATED" | "NO_KNOWN"
[src]

The exploitation activity of the vulnerability in the wild.

§
id?: string
[src]

The unique identifier for the vulnerability. e.g. CVE-2021-34527

§
impact?: "RISK_RATING_UNSPECIFIED" | "LOW" | "MEDIUM" | "HIGH" | "CRITICAL"
[src]

The potential impact of the vulnerability if it was to be exploited.

§
observedInTheWild?: boolean
[src]

Whether or not the vulnerability has been observed in the wild.

§
references?: Reference[]
[src]

Additional information about the CVE. e.g. https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-34527

§
upstreamFixAvailable?: boolean
[src]

Whether upstream fix is available for the CVE.

§
zeroDay?: boolean
[src]

Whether or not the vulnerability was zero day when the finding was published.