affects
Optional
analysis?: VulnerabilityAnalysisAn assessment of the impact and exploitability of the vulnerability.
Optional
bomRef?: stringAn optional identifier which can be used to reference the vulnerability elsewhere in the BOM. Uniqueness is enforced within all elements and children of the root-level bom element.
Optional
created?: TimestampThe date and time (timestamp) when the vulnerability record was created in the vulnerability database.
Optional
credits?: VulnerabilityCreditsIndividuals or organizations credited with the discovery of the vulnerability.
List of Common Weaknesses Enumerations (CWEs) codes that describe this vulnerability. For example, 399 (of https://cwe.mitre.org/data/definitions/399.html)
Optional
description?: stringA description of the vulnerability as provided by the source.
Optional
detail?: stringIf available, an in-depth description of the vulnerability as provided by the source organization. Details often include information useful in understanding the root cause.
Optional
id?: stringThe identifier that uniquely identifies the vulnerability.
Optional
proofOfConcept?: ProofOfConceptEvidence used to reproduce the vulnerability.
Specifies optional, custom, properties
Optional
published?: TimestampThe date and time (timestamp) when the vulnerability record was first published.
List of vulnerability ratings
Optional
recommendation?: stringRecommendations of how the vulnerability can be remediated or mitigated.
Zero or more pointers to vulnerabilities that are the equivalent of the vulnerability specified. Oftentimes, the same vulnerability may exist in multiple sources of vulnerability intelligence but have different identifiers. References provide a way to correlate vulnerabilities across multiple sources of vulnerability intelligence.
Optional
rejected?: TimestampThe date and time (timestamp) when the vulnerability record was rejected (if applicable).
Optional
source?: SourceThe source that published the vulnerability.
Optional
tools?: ToolThe tool(s) used to identify, confirm, or score the vulnerability.
Optional
updated?: TimestampThe date and time (timestamp) when the vulnerability record was last updated.
Optional
workaround?: stringA bypass, usually temporary, of the vulnerability that reduces its likelihood and/or impact. Workarounds often involve changes to configuration or deployments.
Published advisories of the vulnerability if provided.