pub struct Vulnerability {
pub cvss_score: Option<f32>,
pub cvss_v2: Option<CVSS>,
pub cvss_v3: Option<CVSSv3>,
pub cvss_version: Option<String>,
pub cwe: Option<Vec<String>>,
pub details: Option<Vec<Detail>>,
pub severity: Option<String>,
pub source_update_time: Option<DateTime<Utc>>,
pub windows_details: Option<Vec<WindowsDetail>>,
}Expand description
Vulnerability provides metadata about a security vulnerability in a Note.
This type is not used in any activity, and only used as part of another schema.
Fields§
§cvss_score: Option<f32>The CVSS score for this vulnerability.
cvss_v2: Option<CVSS>The full description of the CVSS for version 2.
cvss_v3: Option<CVSSv3>The full description of the CVSS for version 3.
cvss_version: Option<String>CVSS version used to populate cvss_score and severity.
cwe: Option<Vec<String>>A list of CWE for this vulnerability. For details, see: https://cwe.mitre.org/index.html
details: Option<Vec<Detail>>All information about the package to specifically identify this vulnerability. One entry per (version range and cpe_uri) the package vulnerability has manifested in.
severity: Option<String>Note provider assigned impact of the vulnerability.
source_update_time: Option<DateTime<Utc>>The time this information was last changed at the source. This is an upstream timestamp from the underlying information source - e.g. Ubuntu security tracker.
windows_details: Option<Vec<WindowsDetail>>Windows details get their own format because the information format and model don’t match a normal detail. Specifically Windows updates are done as patches, thus Windows vulnerabilities really are a missing package, rather than a package being at an incorrect version.
Trait Implementations§
Source§impl Clone for Vulnerability
impl Clone for Vulnerability
Source§fn clone(&self) -> Vulnerability
fn clone(&self) -> Vulnerability
1.0.0 · Source§fn clone_from(&mut self, source: &Self)
fn clone_from(&mut self, source: &Self)
source. Read more