A RetroSearch Logo

Home - News ( United States | United Kingdom | Italy | Germany ) - Football scores

Search Query:

Showing content from https://github.com/aws/aws-sdk-js-v3/commit/c6f993820b38710642e7ef4d2d530c653bcd842a below:

Add CVSSV4 to Vulnerability Search API and u… · aws/aws-sdk-js-v3@c6f9938 · GitHub

File tree Expand file treeCollapse file tree 5 files changed

+97

-44

lines changed

Filter options

Expand file treeCollapse file tree 5 files changed

+97

-44

lines changed Original file line number Diff line number Diff line change

@@ -70,6 +70,10 @@ export interface SearchVulnerabilitiesCommandOutput extends SearchVulnerabilitie

70 70

* // ],

71 71

* // },

72 72

* // vendorSeverity: "STRING_VALUE",

73 +

* // cvss4: { // Cvss4

74 +

* // baseScore: Number("double"),

75 +

* // scoringVector: "STRING_VALUE",

76 +

* // },

73 77

* // cvss3: { // Cvss3

74 78

* // baseScore: Number("double"),

75 79

* // scoringVector: "STRING_VALUE",

Original file line number Diff line number Diff line change

@@ -5280,7 +5280,7 @@ export interface ScanStatus {

5280 5280

* Amazon Inspector service will automatically resolve the issue and resume the scanning. No action

5281 5281

* required from the user.</p>

5282 5282

* <p>

5283 -

* <code>NO INVENTORY</code> - Amazon Inspector couldn't find software application inventory to scan

5283 +

* <code>NO_INVENTORY</code> - Amazon Inspector couldn't find software application inventory to scan

5284 5284

* for vulnerabilities. This might be caused due to required Amazon Inspector associations being deleted

5285 5285

* or failing to run on your resource. Please verify the status of

5286 5286

* <code>InspectorInventoryCollection-do-not-delete</code> association in the SSM console

@@ -7402,6 +7402,24 @@ export interface Cvss3 {

7402 7402

scoringVector?: string | undefined;

7403 7403

}

7404 7404 7405 +

/**

7406 +

* <p>The Common Vulnerability Scoring System (CVSS) version 4 details for the vulnerability.</p>

7407 +

* @public

7408 +

*/

7409 +

export interface Cvss4 {

7410 +

/**

7411 +

* <p>The base CVSS v4 score for the vulnerability finding, which rates the severity of the vulnerability on a scale from 0 to 10.</p>

7412 +

* @public

7413 +

*/

7414 +

baseScore?: number | undefined;

7415 + 7416 +

/**

7417 +

* <p>The CVSS v4 scoring vector, which contains the metrics and measurements that were used to calculate the base score.</p>

7418 +

* @public

7419 +

*/

7420 +

scoringVector?: string | undefined;

7421 +

}

7422 + 7405 7423

/**

7406 7424

* <p>The CVSS score for a finding.</p>

7407 7425

* @public

@@ -8055,18 +8073,6 @@ export interface EnableDelegatedAdminAccountResponse {

8055 8073

delegatedAdminAccountId: string | undefined;

8056 8074

}

8057 8075 8058 -

/**

8059 -

* <p>Details about the Exploit Prediction Scoring System (EPSS) score.</p>

8060 -

* @public

8061 -

*/

8062 -

export interface Epss {

8063 -

/**

8064 -

* <p>The Exploit Prediction Scoring System (EPSS) score.</p>

8065 -

* @public

8066 -

*/

8067 -

score?: number | undefined;

8068 -

}

8069 - 8070 8076

/**

8071 8077

* @internal

8072 8078

*/

Original file line number Diff line number Diff line change

@@ -50,6 +50,7 @@ import {

50 50

Currency,

51 51

Cvss2,

52 52

Cvss3,

53 +

Cvss4,

53 54

CvssScore,

54 55

CvssScoreDetails,

55 56

DelegatedAdmin,

@@ -60,7 +61,6 @@ import {

60 61

Ec2DeepInspectionStatus,

61 62

EcrConfiguration,

62 63

EcrConfigurationState,

63 -

Epss,

64 64

ExploitObserved,

65 65

FilterAction,

66 66

FilterCriteria,

@@ -78,6 +78,18 @@ import {

78 78

TagFilter,

79 79

} from "./models_0";

80 80 81 +

/**

82 +

* <p>Details about the Exploit Prediction Scoring System (EPSS) score.</p>

83 +

* @public

84 +

*/

85 +

export interface Epss {

86 +

/**

87 +

* <p>The Exploit Prediction Scoring System (EPSS) score.</p>

88 +

* @public

89 +

*/

90 +

score?: number | undefined;

91 +

}

92 + 81 93

/**

82 94

* <p>Details about the Exploit Prediction Scoring System (EPSS) score for a finding.</p>

83 95

* @public

@@ -2719,6 +2731,12 @@ export interface Vulnerability {

2719 2731

*/

2720 2732

vendorSeverity?: string | undefined;

2721 2733 2734 +

/**

2735 +

* <p>An object that contains the Common Vulnerability Scoring System (CVSS) Version 4 details for the vulnerability.</p>

2736 +

* @public

2737 +

*/

2738 +

cvss4?: Cvss4 | undefined;

2739 + 2722 2740

/**

2723 2741

* <p>An object that contains the Common Vulnerability Scoring System (CVSS) Version 3 details

2724 2742

* for the vulnerability.</p>

Original file line number Diff line number Diff line change

@@ -315,6 +315,7 @@ import {

315 315

CreateIntegrationDetail,

316 316

Cvss2,

317 317

Cvss3,

318 +

Cvss4,

318 319

CvssScore,

319 320

CvssScoreDetails,

320 321

DailySchedule,

@@ -328,7 +329,6 @@ import {

328 329

EcrConfigurationState,

329 330

EcrContainerImageMetadata,

330 331

EcrRescanDurationState,

331 -

Epss,

332 332

ExploitObserved,

333 333

FilterCriteria,

334 334

FindingDetail,

@@ -369,6 +369,7 @@ import {

369 369

WeeklySchedule,

370 370

} from "../models/models_0";

371 371

import {

372 +

Epss,

372 373

EpssDetails,

373 374

ExploitabilityDetails,

374 375

Filter,

@@ -4847,6 +4848,16 @@ const de_Cvss3 = (output: any, context: __SerdeContext): Cvss3 => {

4847 4848

}) as any;

4848 4849

};

4849 4850 4851 +

/**

4852 +

* deserializeAws_restJson1Cvss4

4853 +

*/

4854 +

const de_Cvss4 = (output: any, context: __SerdeContext): Cvss4 => {

4855 +

return take(output, {

4856 +

baseScore: __limitedParseDouble,

4857 +

scoringVector: __expectString,

4858 +

}) as any;

4859 +

};

4860 + 4850 4861

/**

4851 4862

* deserializeAws_restJson1CvssScore

4852 4863

*/

@@ -5632,6 +5643,7 @@ const de_Vulnerability = (output: any, context: __SerdeContext): Vulnerability =

5632 5643

cisaData: (_: any) => de_CisaData(_, context),

5633 5644

cvss2: (_: any) => de_Cvss2(_, context),

5634 5645

cvss3: (_: any) => de_Cvss3(_, context),

5646 +

cvss4: (_: any) => de_Cvss4(_, context),

5635 5647

cwes: _json,

5636 5648

description: __expectString,

5637 5649

detectionPlatforms: _json,

You can’t perform that action at this time.


RetroSearch is an open source project built by @garambo | Open a GitHub Issue

Search and Browse the WWW like it's 1997 | Search results from DuckDuckGo

HTML: 3.2 | Encoding: UTF-8 | Version: 0.7.4