+97
-44
lines changedFilter options
+97
-44
lines changed Original file line number Diff line number Diff line change
@@ -70,6 +70,10 @@ export interface SearchVulnerabilitiesCommandOutput extends SearchVulnerabilitie
70
70
* // ],
71
71
* // },
72
72
* // vendorSeverity: "STRING_VALUE",
73
+
* // cvss4: { // Cvss4
74
+
* // baseScore: Number("double"),
75
+
* // scoringVector: "STRING_VALUE",
76
+
* // },
73
77
* // cvss3: { // Cvss3
74
78
* // baseScore: Number("double"),
75
79
* // scoringVector: "STRING_VALUE",
Original file line number Diff line number Diff line change
@@ -5280,7 +5280,7 @@ export interface ScanStatus {
5280
5280
* Amazon Inspector service will automatically resolve the issue and resume the scanning. No action
5281
5281
* required from the user.</p>
5282
5282
* <p>
5283
-
* <code>NO INVENTORY</code> - Amazon Inspector couldn't find software application inventory to scan
5283
+
* <code>NO_INVENTORY</code> - Amazon Inspector couldn't find software application inventory to scan
5284
5284
* for vulnerabilities. This might be caused due to required Amazon Inspector associations being deleted
5285
5285
* or failing to run on your resource. Please verify the status of
5286
5286
* <code>InspectorInventoryCollection-do-not-delete</code> association in the SSM console
@@ -7402,6 +7402,24 @@ export interface Cvss3 {
7402
7402
scoringVector?: string | undefined;
7403
7403
}
7404
7404
7405
+
/**
7406
+
* <p>The Common Vulnerability Scoring System (CVSS) version 4 details for the vulnerability.</p>
7407
+
* @public
7408
+
*/
7409
+
export interface Cvss4 {
7410
+
/**
7411
+
* <p>The base CVSS v4 score for the vulnerability finding, which rates the severity of the vulnerability on a scale from 0 to 10.</p>
7412
+
* @public
7413
+
*/
7414
+
baseScore?: number | undefined;
7415
+
7416
+
/**
7417
+
* <p>The CVSS v4 scoring vector, which contains the metrics and measurements that were used to calculate the base score.</p>
7418
+
* @public
7419
+
*/
7420
+
scoringVector?: string | undefined;
7421
+
}
7422
+
7405
7423
/**
7406
7424
* <p>The CVSS score for a finding.</p>
7407
7425
* @public
@@ -8055,18 +8073,6 @@ export interface EnableDelegatedAdminAccountResponse {
8055
8073
delegatedAdminAccountId: string | undefined;
8056
8074
}
8057
8075
8058
-
/**
8059
-
* <p>Details about the Exploit Prediction Scoring System (EPSS) score.</p>
8060
-
* @public
8061
-
*/
8062
-
export interface Epss {
8063
-
/**
8064
-
* <p>The Exploit Prediction Scoring System (EPSS) score.</p>
8065
-
* @public
8066
-
*/
8067
-
score?: number | undefined;
8068
-
}
8069
-
8070
8076
/**
8071
8077
* @internal
8072
8078
*/
Original file line number Diff line number Diff line change
@@ -50,6 +50,7 @@ import {
50
50
Currency,
51
51
Cvss2,
52
52
Cvss3,
53
+
Cvss4,
53
54
CvssScore,
54
55
CvssScoreDetails,
55
56
DelegatedAdmin,
@@ -60,7 +61,6 @@ import {
60
61
Ec2DeepInspectionStatus,
61
62
EcrConfiguration,
62
63
EcrConfigurationState,
63
-
Epss,
64
64
ExploitObserved,
65
65
FilterAction,
66
66
FilterCriteria,
@@ -78,6 +78,18 @@ import {
78
78
TagFilter,
79
79
} from "./models_0";
80
80
81
+
/**
82
+
* <p>Details about the Exploit Prediction Scoring System (EPSS) score.</p>
83
+
* @public
84
+
*/
85
+
export interface Epss {
86
+
/**
87
+
* <p>The Exploit Prediction Scoring System (EPSS) score.</p>
88
+
* @public
89
+
*/
90
+
score?: number | undefined;
91
+
}
92
+
81
93
/**
82
94
* <p>Details about the Exploit Prediction Scoring System (EPSS) score for a finding.</p>
83
95
* @public
@@ -2719,6 +2731,12 @@ export interface Vulnerability {
2719
2731
*/
2720
2732
vendorSeverity?: string | undefined;
2721
2733
2734
+
/**
2735
+
* <p>An object that contains the Common Vulnerability Scoring System (CVSS) Version 4 details for the vulnerability.</p>
2736
+
* @public
2737
+
*/
2738
+
cvss4?: Cvss4 | undefined;
2739
+
2722
2740
/**
2723
2741
* <p>An object that contains the Common Vulnerability Scoring System (CVSS) Version 3 details
2724
2742
* for the vulnerability.</p>
Original file line number Diff line number Diff line change
@@ -315,6 +315,7 @@ import {
315
315
CreateIntegrationDetail,
316
316
Cvss2,
317
317
Cvss3,
318
+
Cvss4,
318
319
CvssScore,
319
320
CvssScoreDetails,
320
321
DailySchedule,
@@ -328,7 +329,6 @@ import {
328
329
EcrConfigurationState,
329
330
EcrContainerImageMetadata,
330
331
EcrRescanDurationState,
331
-
Epss,
332
332
ExploitObserved,
333
333
FilterCriteria,
334
334
FindingDetail,
@@ -369,6 +369,7 @@ import {
369
369
WeeklySchedule,
370
370
} from "../models/models_0";
371
371
import {
372
+
Epss,
372
373
EpssDetails,
373
374
ExploitabilityDetails,
374
375
Filter,
@@ -4847,6 +4848,16 @@ const de_Cvss3 = (output: any, context: __SerdeContext): Cvss3 => {
4847
4848
}) as any;
4848
4849
};
4849
4850
4851
+
/**
4852
+
* deserializeAws_restJson1Cvss4
4853
+
*/
4854
+
const de_Cvss4 = (output: any, context: __SerdeContext): Cvss4 => {
4855
+
return take(output, {
4856
+
baseScore: __limitedParseDouble,
4857
+
scoringVector: __expectString,
4858
+
}) as any;
4859
+
};
4860
+
4850
4861
/**
4851
4862
* deserializeAws_restJson1CvssScore
4852
4863
*/
@@ -5632,6 +5643,7 @@ const de_Vulnerability = (output: any, context: __SerdeContext): Vulnerability =
5632
5643
cisaData: (_: any) => de_CisaData(_, context),
5633
5644
cvss2: (_: any) => de_Cvss2(_, context),
5634
5645
cvss3: (_: any) => de_Cvss3(_, context),
5646
+
cvss4: (_: any) => de_Cvss4(_, context),
5635
5647
cwes: _json,
5636
5648
description: __expectString,
5637
5649
detectionPlatforms: _json,
You can’t perform that action at this time.
RetroSearch is an open source project built by @garambo | Open a GitHub Issue
Search and Browse the WWW like it's 1997 | Search results from DuckDuckGo
HTML:
3.2
| Encoding:
UTF-8
| Version:
0.7.4