You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: docs/dyn/securitycenter_v1.folders.securityHealthAnalyticsSettings.customModules.html
+13Lines changed: 13 additions & 0 deletions
Original file line number
Diff line number
Diff line change
@@ -1232,6 +1232,17 @@ <h3>Method Details</h3>
1232
1232
"upstreamFixAvailable": True or False, # Whether upstream fix is available for the CVE.
1233
1233
"zeroDay": True or False, # Whether or not the vulnerability was zero day when the finding was published.
1234
1234
},
1235
+
"cwes": [ # Represents one or more Common Weakness Enumeration (CWE) information on this vulnerability.
1236
+
{ # CWE stands for Common Weakness Enumeration. Information about this weakness, as described by [CWE](https://cwe.mitre.org/).
1237
+
"id": "A String", # The CWE identifier, e.g. CWE-94
1238
+
"references": [ # Any reference to the details on the CWE, for example, https://cwe.mitre.org/data/definitions/94.html
1239
+
{ # Additional Links
1240
+
"source": "A String", # Source of the reference e.g. NVD
1241
+
"uri": "A String", # Uri for the mentioned source e.g. https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-34527.
1242
+
},
1243
+
],
1244
+
},
1245
+
],
1235
1246
"fixedPackage": { # Package is a generic definition of a package. # The fixed package is relevant to the finding.
1236
1247
"cpeUri": "A String", # The CPE URI where the vulnerability was detected.
1237
1248
"packageName": "A String", # The name of the package where the vulnerability was detected.
@@ -1244,6 +1255,8 @@ <h3>Method Details</h3>
1244
1255
"packageType": "A String", # Type of package, for example, os, maven, or go.
1245
1256
"packageVersion": "A String", # The version of the package.
1246
1257
},
1258
+
"providerRiskScore": "A String", # Provider provided risk_score based on multiple factors. The higher the risk score, the more risky the vulnerability is.
1259
+
"reachable": True or False, # Represents whether the vulnerability is reachable (detected via static analysis)
1247
1260
"securityBulletin": { # SecurityBulletin are notifications of vulnerabilities of Google products. # The security bulletin is relevant to this finding.
1248
1261
"bulletinId": "A String", # ID of the bulletin corresponding to the vulnerability.
1249
1262
"submissionTime": "A String", # Submission time of this Security Bulletin.
Copy file name to clipboardExpand all lines: docs/dyn/securitycenter_v1.folders.sources.findings.html
+65Lines changed: 65 additions & 0 deletions
Original file line number
Diff line number
Diff line change
@@ -801,6 +801,17 @@ <h3>Method Details</h3>
801
801
"upstreamFixAvailable": True or False, # Whether upstream fix is available for the CVE.
802
802
"zeroDay": True or False, # Whether or not the vulnerability was zero day when the finding was published.
803
803
},
804
+
"cwes": [ # Represents one or more Common Weakness Enumeration (CWE) information on this vulnerability.
805
+
{ # CWE stands for Common Weakness Enumeration. Information about this weakness, as described by [CWE](https://cwe.mitre.org/).
806
+
"id": "A String", # The CWE identifier, e.g. CWE-94
807
+
"references": [ # Any reference to the details on the CWE, for example, https://cwe.mitre.org/data/definitions/94.html
808
+
{ # Additional Links
809
+
"source": "A String", # Source of the reference e.g. NVD
810
+
"uri": "A String", # Uri for the mentioned source e.g. https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-34527.
811
+
},
812
+
],
813
+
},
814
+
],
804
815
"fixedPackage": { # Package is a generic definition of a package. # The fixed package is relevant to the finding.
805
816
"cpeUri": "A String", # The CPE URI where the vulnerability was detected.
806
817
"packageName": "A String", # The name of the package where the vulnerability was detected.
@@ -813,6 +824,8 @@ <h3>Method Details</h3>
813
824
"packageType": "A String", # Type of package, for example, os, maven, or go.
814
825
"packageVersion": "A String", # The version of the package.
815
826
},
827
+
"providerRiskScore": "A String", # Provider provided risk_score based on multiple factors. The higher the risk score, the more risky the vulnerability is.
828
+
"reachable": True or False, # Represents whether the vulnerability is reachable (detected via static analysis)
816
829
"securityBulletin": { # SecurityBulletin are notifications of vulnerabilities of Google products. # The security bulletin is relevant to this finding.
817
830
"bulletinId": "A String", # ID of the bulletin corresponding to the vulnerability.
818
831
"submissionTime": "A String", # Submission time of this Security Bulletin.
@@ -1526,6 +1539,17 @@ <h3>Method Details</h3>
1526
1539
"upstreamFixAvailable": True or False, # Whether upstream fix is available for the CVE.
1527
1540
"zeroDay": True or False, # Whether or not the vulnerability was zero day when the finding was published.
1528
1541
},
1542
+
"cwes": [ # Represents one or more Common Weakness Enumeration (CWE) information on this vulnerability.
1543
+
{ # CWE stands for Common Weakness Enumeration. Information about this weakness, as described by [CWE](https://cwe.mitre.org/).
1544
+
"id": "A String", # The CWE identifier, e.g. CWE-94
1545
+
"references": [ # Any reference to the details on the CWE, for example, https://cwe.mitre.org/data/definitions/94.html
1546
+
{ # Additional Links
1547
+
"source": "A String", # Source of the reference e.g. NVD
1548
+
"uri": "A String", # Uri for the mentioned source e.g. https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-34527.
1549
+
},
1550
+
],
1551
+
},
1552
+
],
1529
1553
"fixedPackage": { # Package is a generic definition of a package. # The fixed package is relevant to the finding.
1530
1554
"cpeUri": "A String", # The CPE URI where the vulnerability was detected.
1531
1555
"packageName": "A String", # The name of the package where the vulnerability was detected.
@@ -1538,6 +1562,8 @@ <h3>Method Details</h3>
1538
1562
"packageType": "A String", # Type of package, for example, os, maven, or go.
1539
1563
"packageVersion": "A String", # The version of the package.
1540
1564
},
1565
+
"providerRiskScore": "A String", # Provider provided risk_score based on multiple factors. The higher the risk score, the more risky the vulnerability is.
1566
+
"reachable": True or False, # Represents whether the vulnerability is reachable (detected via static analysis)
1541
1567
"securityBulletin": { # SecurityBulletin are notifications of vulnerabilities of Google products. # The security bulletin is relevant to this finding.
1542
1568
"bulletinId": "A String", # ID of the bulletin corresponding to the vulnerability.
1543
1569
"submissionTime": "A String", # Submission time of this Security Bulletin.
@@ -2165,6 +2191,17 @@ <h3>Method Details</h3>
2165
2191
"upstreamFixAvailable": True or False, # Whether upstream fix is available for the CVE.
2166
2192
"zeroDay": True or False, # Whether or not the vulnerability was zero day when the finding was published.
2167
2193
},
2194
+
"cwes": [ # Represents one or more Common Weakness Enumeration (CWE) information on this vulnerability.
2195
+
{ # CWE stands for Common Weakness Enumeration. Information about this weakness, as described by [CWE](https://cwe.mitre.org/).
2196
+
"id": "A String", # The CWE identifier, e.g. CWE-94
2197
+
"references": [ # Any reference to the details on the CWE, for example, https://cwe.mitre.org/data/definitions/94.html
2198
+
{ # Additional Links
2199
+
"source": "A String", # Source of the reference e.g. NVD
2200
+
"uri": "A String", # Uri for the mentioned source e.g. https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-34527.
2201
+
},
2202
+
],
2203
+
},
2204
+
],
2168
2205
"fixedPackage": { # Package is a generic definition of a package. # The fixed package is relevant to the finding.
2169
2206
"cpeUri": "A String", # The CPE URI where the vulnerability was detected.
2170
2207
"packageName": "A String", # The name of the package where the vulnerability was detected.
@@ -2177,6 +2214,8 @@ <h3>Method Details</h3>
2177
2214
"packageType": "A String", # Type of package, for example, os, maven, or go.
2178
2215
"packageVersion": "A String", # The version of the package.
2179
2216
},
2217
+
"providerRiskScore": "A String", # Provider provided risk_score based on multiple factors. The higher the risk score, the more risky the vulnerability is.
2218
+
"reachable": True or False, # Represents whether the vulnerability is reachable (detected via static analysis)
2180
2219
"securityBulletin": { # SecurityBulletin are notifications of vulnerabilities of Google products. # The security bulletin is relevant to this finding.
2181
2220
"bulletinId": "A String", # ID of the bulletin corresponding to the vulnerability.
2182
2221
"submissionTime": "A String", # Submission time of this Security Bulletin.
@@ -2817,6 +2856,17 @@ <h3>Method Details</h3>
2817
2856
"upstreamFixAvailable": True or False, # Whether upstream fix is available for the CVE.
2818
2857
"zeroDay": True or False, # Whether or not the vulnerability was zero day when the finding was published.
2819
2858
},
2859
+
"cwes": [ # Represents one or more Common Weakness Enumeration (CWE) information on this vulnerability.
2860
+
{ # CWE stands for Common Weakness Enumeration. Information about this weakness, as described by [CWE](https://cwe.mitre.org/).
2861
+
"id": "A String", # The CWE identifier, e.g. CWE-94
2862
+
"references": [ # Any reference to the details on the CWE, for example, https://cwe.mitre.org/data/definitions/94.html
2863
+
{ # Additional Links
2864
+
"source": "A String", # Source of the reference e.g. NVD
2865
+
"uri": "A String", # Uri for the mentioned source e.g. https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-34527.
2866
+
},
2867
+
],
2868
+
},
2869
+
],
2820
2870
"fixedPackage": { # Package is a generic definition of a package. # The fixed package is relevant to the finding.
2821
2871
"cpeUri": "A String", # The CPE URI where the vulnerability was detected.
2822
2872
"packageName": "A String", # The name of the package where the vulnerability was detected.
@@ -2829,6 +2879,8 @@ <h3>Method Details</h3>
2829
2879
"packageType": "A String", # Type of package, for example, os, maven, or go.
2830
2880
"packageVersion": "A String", # The version of the package.
2831
2881
},
2882
+
"providerRiskScore": "A String", # Provider provided risk_score based on multiple factors. The higher the risk score, the more risky the vulnerability is.
2883
+
"reachable": True or False, # Represents whether the vulnerability is reachable (detected via static analysis)
2832
2884
"securityBulletin": { # SecurityBulletin are notifications of vulnerabilities of Google products. # The security bulletin is relevant to this finding.
2833
2885
"bulletinId": "A String", # ID of the bulletin corresponding to the vulnerability.
2834
2886
"submissionTime": "A String", # Submission time of this Security Bulletin.
@@ -3470,6 +3522,17 @@ <h3>Method Details</h3>
3470
3522
"upstreamFixAvailable": True or False, # Whether upstream fix is available for the CVE.
3471
3523
"zeroDay": True or False, # Whether or not the vulnerability was zero day when the finding was published.
3472
3524
},
3525
+
"cwes": [ # Represents one or more Common Weakness Enumeration (CWE) information on this vulnerability.
3526
+
{ # CWE stands for Common Weakness Enumeration. Information about this weakness, as described by [CWE](https://cwe.mitre.org/).
3527
+
"id": "A String", # The CWE identifier, e.g. CWE-94
3528
+
"references": [ # Any reference to the details on the CWE, for example, https://cwe.mitre.org/data/definitions/94.html
3529
+
{ # Additional Links
3530
+
"source": "A String", # Source of the reference e.g. NVD
3531
+
"uri": "A String", # Uri for the mentioned source e.g. https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-34527.
3532
+
},
3533
+
],
3534
+
},
3535
+
],
3473
3536
"fixedPackage": { # Package is a generic definition of a package. # The fixed package is relevant to the finding.
3474
3537
"cpeUri": "A String", # The CPE URI where the vulnerability was detected.
3475
3538
"packageName": "A String", # The name of the package where the vulnerability was detected.
@@ -3482,6 +3545,8 @@ <h3>Method Details</h3>
3482
3545
"packageType": "A String", # Type of package, for example, os, maven, or go.
3483
3546
"packageVersion": "A String", # The version of the package.
3484
3547
},
3548
+
"providerRiskScore": "A String", # Provider provided risk_score based on multiple factors. The higher the risk score, the more risky the vulnerability is.
3549
+
"reachable": True or False, # Represents whether the vulnerability is reachable (detected via static analysis)
3485
3550
"securityBulletin": { # SecurityBulletin are notifications of vulnerabilities of Google products. # The security bulletin is relevant to this finding.
3486
3551
"bulletinId": "A String", # ID of the bulletin corresponding to the vulnerability.
3487
3552
"submissionTime": "A String", # Submission time of this Security Bulletin.
Copy file name to clipboardExpand all lines: docs/dyn/securitycenter_v1.organizations.securityHealthAnalyticsSettings.customModules.html
+13Lines changed: 13 additions & 0 deletions
Original file line number
Diff line number
Diff line change
@@ -1232,6 +1232,17 @@ <h3>Method Details</h3>
1232
1232
"upstreamFixAvailable": True or False, # Whether upstream fix is available for the CVE.
1233
1233
"zeroDay": True or False, # Whether or not the vulnerability was zero day when the finding was published.
1234
1234
},
1235
+
"cwes": [ # Represents one or more Common Weakness Enumeration (CWE) information on this vulnerability.
1236
+
{ # CWE stands for Common Weakness Enumeration. Information about this weakness, as described by [CWE](https://cwe.mitre.org/).
1237
+
"id": "A String", # The CWE identifier, e.g. CWE-94
1238
+
"references": [ # Any reference to the details on the CWE, for example, https://cwe.mitre.org/data/definitions/94.html
1239
+
{ # Additional Links
1240
+
"source": "A String", # Source of the reference e.g. NVD
1241
+
"uri": "A String", # Uri for the mentioned source e.g. https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-34527.
1242
+
},
1243
+
],
1244
+
},
1245
+
],
1235
1246
"fixedPackage": { # Package is a generic definition of a package. # The fixed package is relevant to the finding.
1236
1247
"cpeUri": "A String", # The CPE URI where the vulnerability was detected.
1237
1248
"packageName": "A String", # The name of the package where the vulnerability was detected.
@@ -1244,6 +1255,8 @@ <h3>Method Details</h3>
1244
1255
"packageType": "A String", # Type of package, for example, os, maven, or go.
1245
1256
"packageVersion": "A String", # The version of the package.
1246
1257
},
1258
+
"providerRiskScore": "A String", # Provider provided risk_score based on multiple factors. The higher the risk score, the more risky the vulnerability is.
1259
+
"reachable": True or False, # Represents whether the vulnerability is reachable (detected via static analysis)
1247
1260
"securityBulletin": { # SecurityBulletin are notifications of vulnerabilities of Google products. # The security bulletin is relevant to this finding.
1248
1261
"bulletinId": "A String", # ID of the bulletin corresponding to the vulnerability.
1249
1262
"submissionTime": "A String", # Submission time of this Security Bulletin.
0 commit comments