affects
Optionalanalysis?: VulnerabilityAnalysisAn assessment of the impact and exploitability of the vulnerability.
OptionalbomRef?: stringAn optional identifier which can be used to reference the vulnerability elsewhere in the BOM. Uniqueness is enforced within all elements and children of the root-level bom element.
Optionalcreated?: TimestampThe date and time (timestamp) when the vulnerability record was created in the vulnerability database.
Optionalcredits?: VulnerabilityCreditsIndividuals or organizations credited with the discovery of the vulnerability.
List of Common Weaknesses Enumerations (CWEs) codes that describe this vulnerability. For example, 399 (of https://cwe.mitre.org/data/definitions/399.html)
Optionaldescription?: stringA description of the vulnerability as provided by the source.
Optionaldetail?: stringIf available, an in-depth description of the vulnerability as provided by the source organization. Details often include information useful in understanding the root cause.
Optionalid?: stringThe identifier that uniquely identifies the vulnerability.
OptionalproofOfConcept?: ProofOfConceptEvidence used to reproduce the vulnerability.
Specifies optional, custom, properties
Optionalpublished?: TimestampThe date and time (timestamp) when the vulnerability record was first published.
List of vulnerability ratings
Optionalrecommendation?: stringRecommendations of how the vulnerability can be remediated or mitigated.
Zero or more pointers to vulnerabilities that are the equivalent of the vulnerability specified. Oftentimes, the same vulnerability may exist in multiple sources of vulnerability intelligence but have different identifiers. References provide a way to correlate vulnerabilities across multiple sources of vulnerability intelligence.
Optionalrejected?: TimestampThe date and time (timestamp) when the vulnerability record was rejected (if applicable).
Optionalsource?: SourceThe source that published the vulnerability.
Optionaltools?: ToolThe tool(s) used to identify, confirm, or score the vulnerability.
Optionalupdated?: TimestampThe date and time (timestamp) when the vulnerability record was last updated.
Optionalworkaround?: stringA bypass, usually temporary, of the vulnerability that reduces its likelihood and/or impact. Workarounds often involve changes to configuration or deployments.
Published advisories of the vulnerability if provided.