Hi there! Are you looking for the official Deno documentation? Try docs.deno.com for all your Deno learning needs.

InbandVulnerability

import type { InbandVulnerability } from "https://googleapis.deno.dev/v1/threatintelligence:v1beta.ts";

Fleshed out vulnerability object that includes enough details to fill out a vulnerability specific view for an issue.

interface InbandVulnerability {
affectedSoftware?: AffectedSoftware[];
authors?: string[];
cveId?: string;
cvssV31Score?: number;
cvssV31ScoreTemporal?: number;
description?: string;
disclosureTime?: Date;
exploitationState?: string;
externalVulnerabilityId?: string;
isExploitedWild?: boolean;
referenceUrls?: string[];
remediation?: string;
riskRating?: string;
title?: string;
}

§Properties

§
affectedSoftware?: AffectedSoftware[]
[src]

Optional. The software that is affected by the vulnerability.

§
authors?: string[]
[src]

Optional. The authors of the vulnerability detection.

§
cveId?: string
[src]

Required. The CVE ID of the vulnerability.

§
cvssV31Score?: number
[src]

Required. The CVSS V3.1 score (Base score)for the vulnerability. ( )

§
cvssV31ScoreTemporal?: number
[src]

Optional. Temporal CVSS V3.1 score for the vulnerability.

§
description?: string
[src]

Optional. The human readable description. This can be basic HTML formatted text.

§
disclosureTime?: Date
[src]

Optional. The date the vulnerability was first disclosed.

§
exploitationState?: string
[src]

Optional. Exploitation state of the vulnerability, for example "Available".

§
externalVulnerabilityId?: string
[src]

Required. The external ID of the vulnerability.

§
isExploitedWild?: boolean
[src]

Optional. Whether this is exploited in the wild.

§
referenceUrls?: string[]
[src]

Optional. Reference URLs to the vulnerability.

§
remediation?: string
[src]

Optional. The human readable remediation recommendation. This can be basic HTML formatted text.

§
riskRating?: string
[src]

Optional. Risk rating for the vulnerability, for example "High".

§
title?: string
[src]

Optional. Human readable name for the vulnerability.