Package-level declarations

Types

Link copied to clipboard

Provides the state of this Vulnerability assessment.

Link copied to clipboard

The type of the key, either stored in public_key or referenced in key_id

Link copied to clipboard

The severity level of this CIS benchmark check.

Link copied to clipboard

Defined in CVSS v3, CVSS v2

Link copied to clipboard

Base Metrics Represents the intrinsic characteristics of a vulnerability that are constant over time and across user environments. Defined in CVSS v3, CVSS v2

Link copied to clipboard

Defined in CVSS v2

Link copied to clipboard

Defined in CVSS v3, CVSS v2

Link copied to clipboard

Defined in CVSS v3, CVSS v2

Link copied to clipboard

Defined in CVSS v3, CVSS v2

Link copied to clipboard

Defined in CVSS v3

Link copied to clipboard

Defined in CVSS v3

Link copied to clipboard

Defined in CVSS v3

Link copied to clipboard

Platform hosting this deployment.

Link copied to clipboard

The status of discovery for the resource.

Link copied to clipboard

Whether the resource is continuously analyzed.

Link copied to clipboard

The kind of analysis that is handled by this discovery.

Link copied to clipboard

The CPU architecture for which packages in this distribution channel were built

Link copied to clipboard

An External Reference allows a Package to reference an external source of additional information, metadata, enumerations, asset identifiers, or downloadable content believed to be relevant to the Package

Link copied to clipboard

This field provides information about the type of file identified

Link copied to clipboard

The type of hash that was performed.

Link copied to clipboard

The field that is set in the API proto.

Link copied to clipboard

The justification type for this vulnerability.

Link copied to clipboard

The recovered Dockerfile directive used to construct this layer.

Link copied to clipboard

The CPU architecture for which packages in this distribution channel were built. Architecture will be blank for language packages.

Link copied to clipboard

Type (for example schema) of the attestation payload that was signed. The verifier must ensure that the provided type is one that the verifier supports, and that the attestation payload is a valid instantiation of that type (for example by validating a JSON schema).

Link copied to clipboard

The type of relationship between the source and target SPDX elements

Link copied to clipboard

The type of remediation that can be applied.

Link copied to clipboard

Distinguish between sentinel MIN/MAX versions and normal versions. If kind is not NORMAL, then the other fields are ignored.

Link copied to clipboard

Provides the state of this Vulnerability assessment.

Link copied to clipboard

The distro assigned severity for this vulnerability when that is available and note provider assigned severity when distro has not yet assigned a severity for this vulnerability. When there are multiple package issues for this vulnerability, they can have different effective severities because some might come from the distro and some might come from installed language packs (e.g. Maven JARs or Go binaries). For this reason, it is advised to use the effective severity on the PackageIssue level, as this field may eventually be deprecated. In the case where multiple PackageIssues have different effective severities, the one set here will be the highest severity of any of the PackageIssues.

Link copied to clipboard

CVSS version used to populate cvss_score and severity.

Link copied to clipboard

Note provider assigned impact of the vulnerability