Class: Google::Cloud::SecurityCenter::V1::Cve
- Inherits:
-
Object
- Object
- Google::Cloud::SecurityCenter::V1::Cve
- Extended by:
- Protobuf::MessageExts::ClassMethods
- Includes:
- Protobuf::MessageExts
- Defined in:
- proto_docs/google/cloud/securitycenter/v1/vulnerability.rb
Overview
CVE stands for Common Vulnerabilities and Exposures. Information from the CVE record that describes this vulnerability.
Defined Under Namespace
Modules: ExploitationActivity, RiskRating
Instance Attribute Summary collapse
-
#cvssv3 ⇒ ::Google::Cloud::SecurityCenter::V1::Cvssv3
Describe Common Vulnerability Scoring System specified at https://www.first.org/cvss/v3.1/specification-document.
-
#exploit_release_date ⇒ ::Google::Protobuf::Timestamp
Date the first publicly available exploit or PoC was released.
-
#exploitation_activity ⇒ ::Google::Cloud::SecurityCenter::V1::Cve::ExploitationActivity
The exploitation activity of the vulnerability in the wild.
-
#id ⇒ ::String
The unique identifier for the vulnerability.
-
#impact ⇒ ::Google::Cloud::SecurityCenter::V1::Cve::RiskRating
The potential impact of the vulnerability if it was to be exploited.
-
#observed_in_the_wild ⇒ ::Boolean
Whether or not the vulnerability has been observed in the wild.
-
#references ⇒ ::Array<::Google::Cloud::SecurityCenter::V1::Reference>
Additional information about the CVE.
-
#upstream_fix_available ⇒ ::Boolean
Whether upstream fix is available for the CVE.
-
#zero_day ⇒ ::Boolean
Whether or not the vulnerability was zero day when the finding was published.
Instance Attribute Details
#cvssv3 ⇒ ::Google::Cloud::SecurityCenter::V1::Cvssv3
Returns Describe Common Vulnerability Scoring System specified at https://www.first.org/cvss/v3.1/specification-document.
77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 |
# File 'proto_docs/google/cloud/securitycenter/v1/vulnerability.rb', line 77 class Cve include ::Google::Protobuf::MessageExts extend ::Google::Protobuf::MessageExts::ClassMethods # The possible values of impact of the vulnerability if it was to be # exploited. module RiskRating # Invalid or empty value. RISK_RATING_UNSPECIFIED = 0 # Exploitation would have little to no security impact. LOW = 1 # Exploitation would enable attackers to perform activities, or could allow # attackers to have a direct impact, but would require additional steps. MEDIUM = 2 # Exploitation would enable attackers to have a notable direct impact # without needing to overcome any major mitigating factors. HIGH = 3 # Exploitation would fundamentally undermine the security of affected # systems, enable actors to perform significant attacks with minimal # effort, with little to no mitigating factors to overcome. CRITICAL = 4 end # The possible values of exploitation activity of the vulnerability in the # wild. module ExploitationActivity # Invalid or empty value. EXPLOITATION_ACTIVITY_UNSPECIFIED = 0 # Exploitation has been reported or confirmed to widely occur. WIDE = 1 # Limited reported or confirmed exploitation activities. CONFIRMED = 2 # Exploit is publicly available. AVAILABLE = 3 # No known exploitation activity, but has a high potential for # exploitation. ANTICIPATED = 4 # No known exploitation activity. NO_KNOWN = 5 end end |
#exploit_release_date ⇒ ::Google::Protobuf::Timestamp
Returns Date the first publicly available exploit or PoC was released.
77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 |
# File 'proto_docs/google/cloud/securitycenter/v1/vulnerability.rb', line 77 class Cve include ::Google::Protobuf::MessageExts extend ::Google::Protobuf::MessageExts::ClassMethods # The possible values of impact of the vulnerability if it was to be # exploited. module RiskRating # Invalid or empty value. RISK_RATING_UNSPECIFIED = 0 # Exploitation would have little to no security impact. LOW = 1 # Exploitation would enable attackers to perform activities, or could allow # attackers to have a direct impact, but would require additional steps. MEDIUM = 2 # Exploitation would enable attackers to have a notable direct impact # without needing to overcome any major mitigating factors. HIGH = 3 # Exploitation would fundamentally undermine the security of affected # systems, enable actors to perform significant attacks with minimal # effort, with little to no mitigating factors to overcome. CRITICAL = 4 end # The possible values of exploitation activity of the vulnerability in the # wild. module ExploitationActivity # Invalid or empty value. EXPLOITATION_ACTIVITY_UNSPECIFIED = 0 # Exploitation has been reported or confirmed to widely occur. WIDE = 1 # Limited reported or confirmed exploitation activities. CONFIRMED = 2 # Exploit is publicly available. AVAILABLE = 3 # No known exploitation activity, but has a high potential for # exploitation. ANTICIPATED = 4 # No known exploitation activity. NO_KNOWN = 5 end end |
#exploitation_activity ⇒ ::Google::Cloud::SecurityCenter::V1::Cve::ExploitationActivity
Returns The exploitation activity of the vulnerability in the wild.
77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 |
# File 'proto_docs/google/cloud/securitycenter/v1/vulnerability.rb', line 77 class Cve include ::Google::Protobuf::MessageExts extend ::Google::Protobuf::MessageExts::ClassMethods # The possible values of impact of the vulnerability if it was to be # exploited. module RiskRating # Invalid or empty value. RISK_RATING_UNSPECIFIED = 0 # Exploitation would have little to no security impact. LOW = 1 # Exploitation would enable attackers to perform activities, or could allow # attackers to have a direct impact, but would require additional steps. MEDIUM = 2 # Exploitation would enable attackers to have a notable direct impact # without needing to overcome any major mitigating factors. HIGH = 3 # Exploitation would fundamentally undermine the security of affected # systems, enable actors to perform significant attacks with minimal # effort, with little to no mitigating factors to overcome. CRITICAL = 4 end # The possible values of exploitation activity of the vulnerability in the # wild. module ExploitationActivity # Invalid or empty value. EXPLOITATION_ACTIVITY_UNSPECIFIED = 0 # Exploitation has been reported or confirmed to widely occur. WIDE = 1 # Limited reported or confirmed exploitation activities. CONFIRMED = 2 # Exploit is publicly available. AVAILABLE = 3 # No known exploitation activity, but has a high potential for # exploitation. ANTICIPATED = 4 # No known exploitation activity. NO_KNOWN = 5 end end |
#id ⇒ ::String
Returns The unique identifier for the vulnerability. e.g. CVE-2021-34527.
77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 |
# File 'proto_docs/google/cloud/securitycenter/v1/vulnerability.rb', line 77 class Cve include ::Google::Protobuf::MessageExts extend ::Google::Protobuf::MessageExts::ClassMethods # The possible values of impact of the vulnerability if it was to be # exploited. module RiskRating # Invalid or empty value. RISK_RATING_UNSPECIFIED = 0 # Exploitation would have little to no security impact. LOW = 1 # Exploitation would enable attackers to perform activities, or could allow # attackers to have a direct impact, but would require additional steps. MEDIUM = 2 # Exploitation would enable attackers to have a notable direct impact # without needing to overcome any major mitigating factors. HIGH = 3 # Exploitation would fundamentally undermine the security of affected # systems, enable actors to perform significant attacks with minimal # effort, with little to no mitigating factors to overcome. CRITICAL = 4 end # The possible values of exploitation activity of the vulnerability in the # wild. module ExploitationActivity # Invalid or empty value. EXPLOITATION_ACTIVITY_UNSPECIFIED = 0 # Exploitation has been reported or confirmed to widely occur. WIDE = 1 # Limited reported or confirmed exploitation activities. CONFIRMED = 2 # Exploit is publicly available. AVAILABLE = 3 # No known exploitation activity, but has a high potential for # exploitation. ANTICIPATED = 4 # No known exploitation activity. NO_KNOWN = 5 end end |
#impact ⇒ ::Google::Cloud::SecurityCenter::V1::Cve::RiskRating
Returns The potential impact of the vulnerability if it was to be exploited.
77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 |
# File 'proto_docs/google/cloud/securitycenter/v1/vulnerability.rb', line 77 class Cve include ::Google::Protobuf::MessageExts extend ::Google::Protobuf::MessageExts::ClassMethods # The possible values of impact of the vulnerability if it was to be # exploited. module RiskRating # Invalid or empty value. RISK_RATING_UNSPECIFIED = 0 # Exploitation would have little to no security impact. LOW = 1 # Exploitation would enable attackers to perform activities, or could allow # attackers to have a direct impact, but would require additional steps. MEDIUM = 2 # Exploitation would enable attackers to have a notable direct impact # without needing to overcome any major mitigating factors. HIGH = 3 # Exploitation would fundamentally undermine the security of affected # systems, enable actors to perform significant attacks with minimal # effort, with little to no mitigating factors to overcome. CRITICAL = 4 end # The possible values of exploitation activity of the vulnerability in the # wild. module ExploitationActivity # Invalid or empty value. EXPLOITATION_ACTIVITY_UNSPECIFIED = 0 # Exploitation has been reported or confirmed to widely occur. WIDE = 1 # Limited reported or confirmed exploitation activities. CONFIRMED = 2 # Exploit is publicly available. AVAILABLE = 3 # No known exploitation activity, but has a high potential for # exploitation. ANTICIPATED = 4 # No known exploitation activity. NO_KNOWN = 5 end end |
#observed_in_the_wild ⇒ ::Boolean
Returns Whether or not the vulnerability has been observed in the wild.
77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 |
# File 'proto_docs/google/cloud/securitycenter/v1/vulnerability.rb', line 77 class Cve include ::Google::Protobuf::MessageExts extend ::Google::Protobuf::MessageExts::ClassMethods # The possible values of impact of the vulnerability if it was to be # exploited. module RiskRating # Invalid or empty value. RISK_RATING_UNSPECIFIED = 0 # Exploitation would have little to no security impact. LOW = 1 # Exploitation would enable attackers to perform activities, or could allow # attackers to have a direct impact, but would require additional steps. MEDIUM = 2 # Exploitation would enable attackers to have a notable direct impact # without needing to overcome any major mitigating factors. HIGH = 3 # Exploitation would fundamentally undermine the security of affected # systems, enable actors to perform significant attacks with minimal # effort, with little to no mitigating factors to overcome. CRITICAL = 4 end # The possible values of exploitation activity of the vulnerability in the # wild. module ExploitationActivity # Invalid or empty value. EXPLOITATION_ACTIVITY_UNSPECIFIED = 0 # Exploitation has been reported or confirmed to widely occur. WIDE = 1 # Limited reported or confirmed exploitation activities. CONFIRMED = 2 # Exploit is publicly available. AVAILABLE = 3 # No known exploitation activity, but has a high potential for # exploitation. ANTICIPATED = 4 # No known exploitation activity. NO_KNOWN = 5 end end |
#references ⇒ ::Array<::Google::Cloud::SecurityCenter::V1::Reference>
Returns Additional information about the CVE. e.g. https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-34527.
77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 |
# File 'proto_docs/google/cloud/securitycenter/v1/vulnerability.rb', line 77 class Cve include ::Google::Protobuf::MessageExts extend ::Google::Protobuf::MessageExts::ClassMethods # The possible values of impact of the vulnerability if it was to be # exploited. module RiskRating # Invalid or empty value. RISK_RATING_UNSPECIFIED = 0 # Exploitation would have little to no security impact. LOW = 1 # Exploitation would enable attackers to perform activities, or could allow # attackers to have a direct impact, but would require additional steps. MEDIUM = 2 # Exploitation would enable attackers to have a notable direct impact # without needing to overcome any major mitigating factors. HIGH = 3 # Exploitation would fundamentally undermine the security of affected # systems, enable actors to perform significant attacks with minimal # effort, with little to no mitigating factors to overcome. CRITICAL = 4 end # The possible values of exploitation activity of the vulnerability in the # wild. module ExploitationActivity # Invalid or empty value. EXPLOITATION_ACTIVITY_UNSPECIFIED = 0 # Exploitation has been reported or confirmed to widely occur. WIDE = 1 # Limited reported or confirmed exploitation activities. CONFIRMED = 2 # Exploit is publicly available. AVAILABLE = 3 # No known exploitation activity, but has a high potential for # exploitation. ANTICIPATED = 4 # No known exploitation activity. NO_KNOWN = 5 end end |
#upstream_fix_available ⇒ ::Boolean
Returns Whether upstream fix is available for the CVE.
77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 |
# File 'proto_docs/google/cloud/securitycenter/v1/vulnerability.rb', line 77 class Cve include ::Google::Protobuf::MessageExts extend ::Google::Protobuf::MessageExts::ClassMethods # The possible values of impact of the vulnerability if it was to be # exploited. module RiskRating # Invalid or empty value. RISK_RATING_UNSPECIFIED = 0 # Exploitation would have little to no security impact. LOW = 1 # Exploitation would enable attackers to perform activities, or could allow # attackers to have a direct impact, but would require additional steps. MEDIUM = 2 # Exploitation would enable attackers to have a notable direct impact # without needing to overcome any major mitigating factors. HIGH = 3 # Exploitation would fundamentally undermine the security of affected # systems, enable actors to perform significant attacks with minimal # effort, with little to no mitigating factors to overcome. CRITICAL = 4 end # The possible values of exploitation activity of the vulnerability in the # wild. module ExploitationActivity # Invalid or empty value. EXPLOITATION_ACTIVITY_UNSPECIFIED = 0 # Exploitation has been reported or confirmed to widely occur. WIDE = 1 # Limited reported or confirmed exploitation activities. CONFIRMED = 2 # Exploit is publicly available. AVAILABLE = 3 # No known exploitation activity, but has a high potential for # exploitation. ANTICIPATED = 4 # No known exploitation activity. NO_KNOWN = 5 end end |
#zero_day ⇒ ::Boolean
Returns Whether or not the vulnerability was zero day when the finding was published.
77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 |
# File 'proto_docs/google/cloud/securitycenter/v1/vulnerability.rb', line 77 class Cve include ::Google::Protobuf::MessageExts extend ::Google::Protobuf::MessageExts::ClassMethods # The possible values of impact of the vulnerability if it was to be # exploited. module RiskRating # Invalid or empty value. RISK_RATING_UNSPECIFIED = 0 # Exploitation would have little to no security impact. LOW = 1 # Exploitation would enable attackers to perform activities, or could allow # attackers to have a direct impact, but would require additional steps. MEDIUM = 2 # Exploitation would enable attackers to have a notable direct impact # without needing to overcome any major mitigating factors. HIGH = 3 # Exploitation would fundamentally undermine the security of affected # systems, enable actors to perform significant attacks with minimal # effort, with little to no mitigating factors to overcome. CRITICAL = 4 end # The possible values of exploitation activity of the vulnerability in the # wild. module ExploitationActivity # Invalid or empty value. EXPLOITATION_ACTIVITY_UNSPECIFIED = 0 # Exploitation has been reported or confirmed to widely occur. WIDE = 1 # Limited reported or confirmed exploitation activities. CONFIRMED = 2 # Exploit is publicly available. AVAILABLE = 3 # No known exploitation activity, but has a high potential for # exploitation. ANTICIPATED = 4 # No known exploitation activity. NO_KNOWN = 5 end end |