Hi there! Are you looking for the official Deno documentation? Try docs.deno.com for all your Deno learning needs.

Cvssv3

import type { Cvssv3 } from "https://googleapis.deno.dev/v1/securitycenter:v1.ts";

Common Vulnerability Scoring System version 3.

interface Cvssv3 {
attackComplexity?: "ATTACK_COMPLEXITY_UNSPECIFIED" | "ATTACK_COMPLEXITY_LOW" | "ATTACK_COMPLEXITY_HIGH";
attackVector?:
| "ATTACK_VECTOR_UNSPECIFIED"
| "ATTACK_VECTOR_NETWORK"
| "ATTACK_VECTOR_ADJACENT"
| "ATTACK_VECTOR_LOCAL"
| "ATTACK_VECTOR_PHYSICAL";
availabilityImpact?:
| "IMPACT_UNSPECIFIED"
| "IMPACT_HIGH"
| "IMPACT_LOW"
| "IMPACT_NONE";
baseScore?: number;
confidentialityImpact?:
| "IMPACT_UNSPECIFIED"
| "IMPACT_HIGH"
| "IMPACT_LOW"
| "IMPACT_NONE";
integrityImpact?:
| "IMPACT_UNSPECIFIED"
| "IMPACT_HIGH"
| "IMPACT_LOW"
| "IMPACT_NONE";
privilegesRequired?:
| "PRIVILEGES_REQUIRED_UNSPECIFIED"
| "PRIVILEGES_REQUIRED_NONE"
| "PRIVILEGES_REQUIRED_LOW"
| "PRIVILEGES_REQUIRED_HIGH";
scope?: "SCOPE_UNSPECIFIED" | "SCOPE_UNCHANGED" | "SCOPE_CHANGED";
userInteraction?: "USER_INTERACTION_UNSPECIFIED" | "USER_INTERACTION_NONE" | "USER_INTERACTION_REQUIRED";
}

§Properties

§
attackComplexity?: "ATTACK_COMPLEXITY_UNSPECIFIED" | "ATTACK_COMPLEXITY_LOW" | "ATTACK_COMPLEXITY_HIGH"
[src]

This metric describes the conditions beyond the attacker's control that must exist in order to exploit the vulnerability.

§
attackVector?: "ATTACK_VECTOR_UNSPECIFIED" | "ATTACK_VECTOR_NETWORK" | "ATTACK_VECTOR_ADJACENT" | "ATTACK_VECTOR_LOCAL" | "ATTACK_VECTOR_PHYSICAL"
[src]

Base Metrics Represents the intrinsic characteristics of a vulnerability that are constant over time and across user environments. This metric reflects the context by which vulnerability exploitation is possible.

§
availabilityImpact?: "IMPACT_UNSPECIFIED" | "IMPACT_HIGH" | "IMPACT_LOW" | "IMPACT_NONE"
[src]

This metric measures the impact to the availability of the impacted component resulting from a successfully exploited vulnerability.

§
baseScore?: number
[src]

The base score is a function of the base metric scores.

§
confidentialityImpact?: "IMPACT_UNSPECIFIED" | "IMPACT_HIGH" | "IMPACT_LOW" | "IMPACT_NONE"
[src]

This metric measures the impact to the confidentiality of the information resources managed by a software component due to a successfully exploited vulnerability.

§
integrityImpact?: "IMPACT_UNSPECIFIED" | "IMPACT_HIGH" | "IMPACT_LOW" | "IMPACT_NONE"
[src]

This metric measures the impact to integrity of a successfully exploited vulnerability.

§
privilegesRequired?: "PRIVILEGES_REQUIRED_UNSPECIFIED" | "PRIVILEGES_REQUIRED_NONE" | "PRIVILEGES_REQUIRED_LOW" | "PRIVILEGES_REQUIRED_HIGH"
[src]

This metric describes the level of privileges an attacker must possess before successfully exploiting the vulnerability.

§
scope?: "SCOPE_UNSPECIFIED" | "SCOPE_UNCHANGED" | "SCOPE_CHANGED"
[src]

The Scope metric captures whether a vulnerability in one vulnerable component impacts resources in components beyond its security scope.

§
userInteraction?: "USER_INTERACTION_UNSPECIFIED" | "USER_INTERACTION_NONE" | "USER_INTERACTION_REQUIRED"
[src]

This metric captures the requirement for a human user, other than the attacker, to participate in the successful compromise of the vulnerable component.