-
Notifications
You must be signed in to change notification settings - Fork 80
/
cve_details.go
75 lines (55 loc) · 2.44 KB
/
cve_details.go
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
// Copyright (c) 2016, 2018, 2024, Oracle and/or its affiliates. All rights reserved.
// This software is dual-licensed to you under the Universal Permissive License (UPL) 1.0 as shown at https://oss.oracle.com/licenses/upl or Apache License 2.0 as shown at http://www.apache.org/licenses/LICENSE-2.0. You may choose either license.
// Code generated. DO NOT EDIT.
// Scanning API
//
// Use the Vulnerability Scanning Service (VSS) API to manage scan recipes, targets, and reports. For more information, see the Vulnerability Scanning documentation (https://docs.cloud.oracle.com/iaas/scanning/home.htm).
//
package vulnerabilityscanning
import (
"fmt"
"github.com/oracle/oci-go-sdk/v65/common"
"strings"
)
// CveDetails Details on a CVE.
type CveDetails struct {
// CVE ID.
CveReference *string `mandatory:"true" json:"cveReference"`
// Vulnerability title.
Title *string `mandatory:"true" json:"title"`
// CVSS 3 Score.
Cvss3 *string `mandatory:"true" json:"cvss3"`
// Date/time the CVE was published.
TimePublished *common.SDKTime `mandatory:"true" json:"timePublished"`
// Date/time the CVE was last modified.
TimeUpdated *common.SDKTime `mandatory:"true" json:"timeUpdated"`
// CVE description.
Description *string `mandatory:"false" json:"description"`
// ID of related CVE, if applicable.
RelatedCveReference *string `mandatory:"false" json:"relatedCveReference"`
// Threat this item poses to resource.
Threat *string `mandatory:"false" json:"threat"`
// Impact on resource if this vulnerability is exploited.
Impact *string `mandatory:"false" json:"impact"`
// Recommended solution to fix this vulnerability.
Solution *string `mandatory:"false" json:"solution"`
// Can this vulnerability be patched.
Patchable *string `mandatory:"false" json:"patchable"`
// Can this vulnerability be exploited.
Exploitable *string `mandatory:"false" json:"exploitable"`
// Reference link to know more about this vulnerability.
ReferenceUrl *string `mandatory:"false" json:"referenceUrl"`
}
func (m CveDetails) String() string {
return common.PointerString(m)
}
// ValidateEnumValue returns an error when providing an unsupported enum value
// This function is being called during constructing API request process
// Not recommended for calling this function directly
func (m CveDetails) ValidateEnumValue() (bool, error) {
errMessage := []string{}
if len(errMessage) > 0 {
return true, fmt.Errorf(strings.Join(errMessage, "\n"))
}
return false, nil
}