aws-sdk-inspector2 1.11.0 → 1.12.0

Sign up to get free protection for your applications and to get access to all the features.
checksums.yaml CHANGED
@@ -1,7 +1,7 @@
1
1
  ---
2
2
  SHA256:
3
- metadata.gz: 76d22a5063b8b38a59b8b39a541bbb859caef45afaf8c9fcc6dce881b2053918
4
- data.tar.gz: 0d49f55c3b42d98e2cf3dd258d094cb2cb375d7710ae5c1739a84f24f5992879
3
+ metadata.gz: 37045386cef6441373fa42145f3ecf648fef0f4322fad6515b80719539a77473
4
+ data.tar.gz: b815de9f7ae4804241a5aabc60fede44880a5ba087b92d4000e179b7c7fee2ca
5
5
  SHA512:
6
- metadata.gz: dd7c51e1e87978abb565408a52163832ffd9daaa38deadb82990391bf647714fc09a2aad78bbe790a6820abf94f125b00f54fd0b4f7aa96b9e925d6256f1a38c
7
- data.tar.gz: f5427e323864a8e6a0caf4b29225931b4dac036f165a049adf2e088f8b2948de9398265258b4eff3dc7b741c38610014e37d6621fa65c66783bd0edc613b43b1
6
+ metadata.gz: 1b1f03de0aaef59011515095e6fbd52e881a1ff9a49c798d7048af053da8d2db939b786a32f263332ebcd01e988d0df84b096f02af018f5c460055216687ab32
7
+ data.tar.gz: a20ac868d3f766413ca6cc2a70ed86276d9fcbeef6db46c9e2d609727c3ac2b2b903b109959141cca536e6d4ee92963af94fd7912f0785a05b110ddbdf26de70
data/CHANGELOG.md CHANGED
@@ -1,6 +1,11 @@
1
1
  Unreleased Changes
2
2
  ------------------
3
3
 
4
+ 1.12.0 (2023-05-05)
5
+ ------------------
6
+
7
+ * Feature - Amazon Inspector now allows customers to search its vulnerability intelligence database if any of the Inspector scanning types are activated.
8
+
4
9
  1.11.0 (2023-05-03)
5
10
  ------------------
6
11
 
data/VERSION CHANGED
@@ -1 +1 @@
1
- 1.11.0
1
+ 1.12.0
@@ -3158,6 +3158,79 @@ module Aws::Inspector2
3158
3158
  req.send_request(options)
3159
3159
  end
3160
3160
 
3161
+ # Lists Amazon Inspector coverage details for a specific vulnerability.
3162
+ #
3163
+ # @option params [required, Types::SearchVulnerabilitiesFilterCriteria] :filter_criteria
3164
+ # The criteria used to filter the results of a vulnerability search.
3165
+ #
3166
+ # @option params [String] :next_token
3167
+ # A token to use for paginating results that are returned in the
3168
+ # response. Set the value of this parameter to null for the first
3169
+ # request to a list action. For subsequent calls, use the `NextToken`
3170
+ # value returned from the previous request to continue listing results
3171
+ # after the first page.
3172
+ #
3173
+ # @return [Types::SearchVulnerabilitiesResponse] Returns a {Seahorse::Client::Response response} object which responds to the following methods:
3174
+ #
3175
+ # * {Types::SearchVulnerabilitiesResponse#next_token #next_token} => String
3176
+ # * {Types::SearchVulnerabilitiesResponse#vulnerabilities #vulnerabilities} => Array<Types::Vulnerability>
3177
+ #
3178
+ # The returned {Seahorse::Client::Response response} is a pageable response and is Enumerable. For details on usage see {Aws::PageableResponse PageableResponse}.
3179
+ #
3180
+ # @example Request syntax with placeholder values
3181
+ #
3182
+ # resp = client.search_vulnerabilities({
3183
+ # filter_criteria: { # required
3184
+ # vulnerability_ids: ["VulnId"], # required
3185
+ # },
3186
+ # next_token: "NextToken",
3187
+ # })
3188
+ #
3189
+ # @example Response structure
3190
+ #
3191
+ # resp.next_token #=> String
3192
+ # resp.vulnerabilities #=> Array
3193
+ # resp.vulnerabilities[0].atig_data.first_seen #=> Time
3194
+ # resp.vulnerabilities[0].atig_data.last_seen #=> Time
3195
+ # resp.vulnerabilities[0].atig_data.targets #=> Array
3196
+ # resp.vulnerabilities[0].atig_data.targets[0] #=> String
3197
+ # resp.vulnerabilities[0].atig_data.ttps #=> Array
3198
+ # resp.vulnerabilities[0].atig_data.ttps[0] #=> String
3199
+ # resp.vulnerabilities[0].cisa_data.action #=> String
3200
+ # resp.vulnerabilities[0].cisa_data.date_added #=> Time
3201
+ # resp.vulnerabilities[0].cisa_data.date_due #=> Time
3202
+ # resp.vulnerabilities[0].cvss2.base_score #=> Float
3203
+ # resp.vulnerabilities[0].cvss2.scoring_vector #=> String
3204
+ # resp.vulnerabilities[0].cvss3.base_score #=> Float
3205
+ # resp.vulnerabilities[0].cvss3.scoring_vector #=> String
3206
+ # resp.vulnerabilities[0].cwes #=> Array
3207
+ # resp.vulnerabilities[0].cwes[0] #=> String
3208
+ # resp.vulnerabilities[0].description #=> String
3209
+ # resp.vulnerabilities[0].detection_platforms #=> Array
3210
+ # resp.vulnerabilities[0].detection_platforms[0] #=> String
3211
+ # resp.vulnerabilities[0].epss.score #=> Float
3212
+ # resp.vulnerabilities[0].exploit_observed.first_seen #=> Time
3213
+ # resp.vulnerabilities[0].exploit_observed.last_seen #=> Time
3214
+ # resp.vulnerabilities[0].id #=> String
3215
+ # resp.vulnerabilities[0].reference_urls #=> Array
3216
+ # resp.vulnerabilities[0].reference_urls[0] #=> String
3217
+ # resp.vulnerabilities[0].related_vulnerabilities #=> Array
3218
+ # resp.vulnerabilities[0].related_vulnerabilities[0] #=> String
3219
+ # resp.vulnerabilities[0].source #=> String, one of "NVD"
3220
+ # resp.vulnerabilities[0].source_url #=> String
3221
+ # resp.vulnerabilities[0].vendor_created_at #=> Time
3222
+ # resp.vulnerabilities[0].vendor_severity #=> String
3223
+ # resp.vulnerabilities[0].vendor_updated_at #=> Time
3224
+ #
3225
+ # @see http://docs.aws.amazon.com/goto/WebAPI/inspector2-2020-06-08/SearchVulnerabilities AWS API Documentation
3226
+ #
3227
+ # @overload search_vulnerabilities(params = {})
3228
+ # @param [Hash] params ({})
3229
+ def search_vulnerabilities(params = {}, options = {})
3230
+ req = build_request(:search_vulnerabilities, params)
3231
+ req.send_request(options)
3232
+ end
3233
+
3161
3234
  # Adds tags to a resource.
3162
3235
  #
3163
3236
  # @option params [required, String] :resource_arn
@@ -3669,7 +3742,7 @@ module Aws::Inspector2
3669
3742
  params: params,
3670
3743
  config: config)
3671
3744
  context[:gem_name] = 'aws-sdk-inspector2'
3672
- context[:gem_version] = '1.11.0'
3745
+ context[:gem_version] = '1.12.0'
3673
3746
  Seahorse::Client::Request.new(handlers, context)
3674
3747
  end
3675
3748
 
@@ -39,6 +39,7 @@ module Aws::Inspector2
39
39
  Arn = Shapes::StringShape.new(name: 'Arn')
40
40
  AssociateMemberRequest = Shapes::StructureShape.new(name: 'AssociateMemberRequest')
41
41
  AssociateMemberResponse = Shapes::StructureShape.new(name: 'AssociateMemberResponse')
42
+ AtigData = Shapes::StructureShape.new(name: 'AtigData')
42
43
  AutoEnable = Shapes::StructureShape.new(name: 'AutoEnable')
43
44
  AwsEc2InstanceDetails = Shapes::StructureShape.new(name: 'AwsEc2InstanceDetails')
44
45
  AwsEcrContainerAggregation = Shapes::StructureShape.new(name: 'AwsEcrContainerAggregation')
@@ -59,6 +60,10 @@ module Aws::Inspector2
59
60
  Boolean = Shapes::BooleanShape.new(name: 'Boolean')
60
61
  CancelFindingsReportRequest = Shapes::StructureShape.new(name: 'CancelFindingsReportRequest')
61
62
  CancelFindingsReportResponse = Shapes::StructureShape.new(name: 'CancelFindingsReportResponse')
63
+ CisaAction = Shapes::StringShape.new(name: 'CisaAction')
64
+ CisaData = Shapes::StructureShape.new(name: 'CisaData')
65
+ CisaDateAdded = Shapes::TimestampShape.new(name: 'CisaDateAdded')
66
+ CisaDateDue = Shapes::TimestampShape.new(name: 'CisaDateDue')
62
67
  ClientToken = Shapes::StringShape.new(name: 'ClientToken')
63
68
  Component = Shapes::StringShape.new(name: 'Component')
64
69
  ComponentType = Shapes::StringShape.new(name: 'ComponentType')
@@ -81,11 +86,19 @@ module Aws::Inspector2
81
86
  CreateFindingsReportRequest = Shapes::StructureShape.new(name: 'CreateFindingsReportRequest')
82
87
  CreateFindingsReportResponse = Shapes::StructureShape.new(name: 'CreateFindingsReportResponse')
83
88
  Currency = Shapes::StringShape.new(name: 'Currency')
89
+ Cvss2 = Shapes::StructureShape.new(name: 'Cvss2')
90
+ Cvss2BaseScore = Shapes::FloatShape.new(name: 'Cvss2BaseScore')
91
+ Cvss2ScoringVector = Shapes::StringShape.new(name: 'Cvss2ScoringVector')
92
+ Cvss3 = Shapes::StructureShape.new(name: 'Cvss3')
93
+ Cvss3BaseScore = Shapes::FloatShape.new(name: 'Cvss3BaseScore')
94
+ Cvss3ScoringVector = Shapes::StringShape.new(name: 'Cvss3ScoringVector')
84
95
  CvssScore = Shapes::StructureShape.new(name: 'CvssScore')
85
96
  CvssScoreAdjustment = Shapes::StructureShape.new(name: 'CvssScoreAdjustment')
86
97
  CvssScoreAdjustmentList = Shapes::ListShape.new(name: 'CvssScoreAdjustmentList')
87
98
  CvssScoreDetails = Shapes::StructureShape.new(name: 'CvssScoreDetails')
88
99
  CvssScoreList = Shapes::ListShape.new(name: 'CvssScoreList')
100
+ Cwe = Shapes::StringShape.new(name: 'Cwe')
101
+ Cwes = Shapes::ListShape.new(name: 'Cwes')
89
102
  DateFilter = Shapes::StructureShape.new(name: 'DateFilter')
90
103
  DateFilterList = Shapes::ListShape.new(name: 'DateFilterList')
91
104
  DateTimeTimestamp = Shapes::TimestampShape.new(name: 'DateTimeTimestamp')
@@ -98,6 +111,7 @@ module Aws::Inspector2
98
111
  DescribeOrganizationConfigurationRequest = Shapes::StructureShape.new(name: 'DescribeOrganizationConfigurationRequest')
99
112
  DescribeOrganizationConfigurationResponse = Shapes::StructureShape.new(name: 'DescribeOrganizationConfigurationResponse')
100
113
  Destination = Shapes::StructureShape.new(name: 'Destination')
114
+ DetectionPlatforms = Shapes::ListShape.new(name: 'DetectionPlatforms')
101
115
  DisableDelegatedAdminAccountRequest = Shapes::StructureShape.new(name: 'DisableDelegatedAdminAccountRequest')
102
116
  DisableDelegatedAdminAccountResponse = Shapes::StructureShape.new(name: 'DisableDelegatedAdminAccountResponse')
103
117
  DisableRequest = Shapes::StructureShape.new(name: 'DisableRequest')
@@ -125,10 +139,13 @@ module Aws::Inspector2
125
139
  EnableRequest = Shapes::StructureShape.new(name: 'EnableRequest')
126
140
  EnableResourceTypeList = Shapes::ListShape.new(name: 'EnableResourceTypeList')
127
141
  EnableResponse = Shapes::StructureShape.new(name: 'EnableResponse')
142
+ Epss = Shapes::StructureShape.new(name: 'Epss')
143
+ EpssScore = Shapes::FloatShape.new(name: 'EpssScore')
128
144
  ErrorCode = Shapes::StringShape.new(name: 'ErrorCode')
129
145
  ErrorMessage = Shapes::StringShape.new(name: 'ErrorMessage')
130
146
  ExecutionRoleArn = Shapes::StringShape.new(name: 'ExecutionRoleArn')
131
147
  ExploitAvailable = Shapes::StringShape.new(name: 'ExploitAvailable')
148
+ ExploitObserved = Shapes::StructureShape.new(name: 'ExploitObserved')
132
149
  ExploitabilityDetails = Shapes::StructureShape.new(name: 'ExploitabilityDetails')
133
150
  ExternalReportStatus = Shapes::StringShape.new(name: 'ExternalReportStatus')
134
151
  FailedAccount = Shapes::StructureShape.new(name: 'FailedAccount')
@@ -155,6 +172,7 @@ module Aws::Inspector2
155
172
  FindingTypeAggregation = Shapes::StructureShape.new(name: 'FindingTypeAggregation')
156
173
  FindingTypeAggregationResponse = Shapes::StructureShape.new(name: 'FindingTypeAggregationResponse')
157
174
  FindingTypeSortBy = Shapes::StringShape.new(name: 'FindingTypeSortBy')
175
+ FirstSeen = Shapes::TimestampShape.new(name: 'FirstSeen')
158
176
  FixAvailable = Shapes::StringShape.new(name: 'FixAvailable')
159
177
  FreeTrialAccountInfo = Shapes::StructureShape.new(name: 'FreeTrialAccountInfo')
160
178
  FreeTrialAccountInfoList = Shapes::ListShape.new(name: 'FreeTrialAccountInfoList')
@@ -199,6 +217,7 @@ module Aws::Inspector2
199
217
  LambdaLayerList = Shapes::ListShape.new(name: 'LambdaLayerList')
200
218
  LambdaLayerSortBy = Shapes::StringShape.new(name: 'LambdaLayerSortBy')
201
219
  LambdaVpcConfig = Shapes::StructureShape.new(name: 'LambdaVpcConfig')
220
+ LastSeen = Shapes::TimestampShape.new(name: 'LastSeen')
202
221
  LayerList = Shapes::ListShape.new(name: 'LayerList')
203
222
  ListAccountPermissionsMaxResults = Shapes::IntegerShape.new(name: 'ListAccountPermissionsMaxResults')
204
223
  ListAccountPermissionsRequest = Shapes::StructureShape.new(name: 'ListAccountPermissionsRequest')
@@ -276,6 +295,8 @@ module Aws::Inspector2
276
295
  PortRangeFilter = Shapes::StructureShape.new(name: 'PortRangeFilter')
277
296
  PortRangeFilterList = Shapes::ListShape.new(name: 'PortRangeFilterList')
278
297
  Recommendation = Shapes::StructureShape.new(name: 'Recommendation')
298
+ RelatedVulnerabilities = Shapes::ListShape.new(name: 'RelatedVulnerabilities')
299
+ RelatedVulnerability = Shapes::StringShape.new(name: 'RelatedVulnerability')
279
300
  RelationshipStatus = Shapes::StringShape.new(name: 'RelationshipStatus')
280
301
  Remediation = Shapes::StructureShape.new(name: 'Remediation')
281
302
  ReportFormat = Shapes::StringShape.new(name: 'ReportFormat')
@@ -299,6 +320,9 @@ module Aws::Inspector2
299
320
  ScanStatusCode = Shapes::StringShape.new(name: 'ScanStatusCode')
300
321
  ScanStatusReason = Shapes::StringShape.new(name: 'ScanStatusReason')
301
322
  ScanType = Shapes::StringShape.new(name: 'ScanType')
323
+ SearchVulnerabilitiesFilterCriteria = Shapes::StructureShape.new(name: 'SearchVulnerabilitiesFilterCriteria')
324
+ SearchVulnerabilitiesRequest = Shapes::StructureShape.new(name: 'SearchVulnerabilitiesRequest')
325
+ SearchVulnerabilitiesResponse = Shapes::StructureShape.new(name: 'SearchVulnerabilitiesResponse')
302
326
  SecurityGroupId = Shapes::StringShape.new(name: 'SecurityGroupId')
303
327
  SecurityGroupIdList = Shapes::ListShape.new(name: 'SecurityGroupIdList')
304
328
  Service = Shapes::StringShape.new(name: 'Service')
@@ -327,11 +351,15 @@ module Aws::Inspector2
327
351
  TagMap = Shapes::MapShape.new(name: 'TagMap')
328
352
  TagResourceRequest = Shapes::StructureShape.new(name: 'TagResourceRequest')
329
353
  TagResourceResponse = Shapes::StructureShape.new(name: 'TagResourceResponse')
354
+ Target = Shapes::StringShape.new(name: 'Target')
355
+ Targets = Shapes::ListShape.new(name: 'Targets')
330
356
  ThrottlingException = Shapes::StructureShape.new(name: 'ThrottlingException')
331
357
  Timestamp = Shapes::TimestampShape.new(name: 'Timestamp')
332
358
  TitleAggregation = Shapes::StructureShape.new(name: 'TitleAggregation')
333
359
  TitleAggregationResponse = Shapes::StructureShape.new(name: 'TitleAggregationResponse')
334
360
  TitleSortBy = Shapes::StringShape.new(name: 'TitleSortBy')
361
+ Ttp = Shapes::StringShape.new(name: 'Ttp')
362
+ Ttps = Shapes::ListShape.new(name: 'Ttps')
335
363
  UntagResourceRequest = Shapes::StructureShape.new(name: 'UntagResourceRequest')
336
364
  UntagResourceResponse = Shapes::StructureShape.new(name: 'UntagResourceResponse')
337
365
  UpdateConfigurationRequest = Shapes::StructureShape.new(name: 'UpdateConfigurationRequest')
@@ -356,10 +384,22 @@ module Aws::Inspector2
356
384
  ValidationExceptionField = Shapes::StructureShape.new(name: 'ValidationExceptionField')
357
385
  ValidationExceptionFields = Shapes::ListShape.new(name: 'ValidationExceptionFields')
358
386
  ValidationExceptionReason = Shapes::StringShape.new(name: 'ValidationExceptionReason')
387
+ VendorCreatedAt = Shapes::TimestampShape.new(name: 'VendorCreatedAt')
388
+ VendorSeverity = Shapes::StringShape.new(name: 'VendorSeverity')
389
+ VendorUpdatedAt = Shapes::TimestampShape.new(name: 'VendorUpdatedAt')
359
390
  Version = Shapes::StringShape.new(name: 'Version')
360
391
  VpcId = Shapes::StringShape.new(name: 'VpcId')
392
+ VulnId = Shapes::StringShape.new(name: 'VulnId')
393
+ VulnIdList = Shapes::ListShape.new(name: 'VulnIdList')
394
+ Vulnerabilities = Shapes::ListShape.new(name: 'Vulnerabilities')
395
+ Vulnerability = Shapes::StructureShape.new(name: 'Vulnerability')
396
+ VulnerabilityDescription = Shapes::StringShape.new(name: 'VulnerabilityDescription')
361
397
  VulnerabilityId = Shapes::StringShape.new(name: 'VulnerabilityId')
362
398
  VulnerabilityIdList = Shapes::ListShape.new(name: 'VulnerabilityIdList')
399
+ VulnerabilityReferenceUrl = Shapes::StringShape.new(name: 'VulnerabilityReferenceUrl')
400
+ VulnerabilityReferenceUrls = Shapes::ListShape.new(name: 'VulnerabilityReferenceUrls')
401
+ VulnerabilitySource = Shapes::StringShape.new(name: 'VulnerabilitySource')
402
+ VulnerabilitySourceUrl = Shapes::StringShape.new(name: 'VulnerabilitySourceUrl')
363
403
  VulnerablePackage = Shapes::StructureShape.new(name: 'VulnerablePackage')
364
404
  VulnerablePackageList = Shapes::ListShape.new(name: 'VulnerablePackageList')
365
405
  VulnerablePackageRemediation = Shapes::StringShape.new(name: 'VulnerablePackageRemediation')
@@ -466,6 +506,12 @@ module Aws::Inspector2
466
506
  AssociateMemberResponse.add_member(:account_id, Shapes::ShapeRef.new(shape: AccountId, required: true, location_name: "accountId"))
467
507
  AssociateMemberResponse.struct_class = Types::AssociateMemberResponse
468
508
 
509
+ AtigData.add_member(:first_seen, Shapes::ShapeRef.new(shape: FirstSeen, location_name: "firstSeen"))
510
+ AtigData.add_member(:last_seen, Shapes::ShapeRef.new(shape: LastSeen, location_name: "lastSeen"))
511
+ AtigData.add_member(:targets, Shapes::ShapeRef.new(shape: Targets, location_name: "targets"))
512
+ AtigData.add_member(:ttps, Shapes::ShapeRef.new(shape: Ttps, location_name: "ttps"))
513
+ AtigData.struct_class = Types::AtigData
514
+
469
515
  AutoEnable.add_member(:ec2, Shapes::ShapeRef.new(shape: Boolean, required: true, location_name: "ec2"))
470
516
  AutoEnable.add_member(:ecr, Shapes::ShapeRef.new(shape: Boolean, required: true, location_name: "ecr"))
471
517
  AutoEnable.add_member(:lambda, Shapes::ShapeRef.new(shape: Boolean, location_name: "lambda"))
@@ -562,6 +608,11 @@ module Aws::Inspector2
562
608
  CancelFindingsReportResponse.add_member(:report_id, Shapes::ShapeRef.new(shape: ReportId, required: true, location_name: "reportId"))
563
609
  CancelFindingsReportResponse.struct_class = Types::CancelFindingsReportResponse
564
610
 
611
+ CisaData.add_member(:action, Shapes::ShapeRef.new(shape: CisaAction, location_name: "action"))
612
+ CisaData.add_member(:date_added, Shapes::ShapeRef.new(shape: CisaDateAdded, location_name: "dateAdded"))
613
+ CisaData.add_member(:date_due, Shapes::ShapeRef.new(shape: CisaDateDue, location_name: "dateDue"))
614
+ CisaData.struct_class = Types::CisaData
615
+
565
616
  ConflictException.add_member(:message, Shapes::ShapeRef.new(shape: String, required: true, location_name: "message"))
566
617
  ConflictException.add_member(:resource_id, Shapes::ShapeRef.new(shape: String, required: true, location_name: "resourceId"))
567
618
  ConflictException.add_member(:resource_type, Shapes::ShapeRef.new(shape: String, required: true, location_name: "resourceType"))
@@ -629,6 +680,14 @@ module Aws::Inspector2
629
680
  CreateFindingsReportResponse.add_member(:report_id, Shapes::ShapeRef.new(shape: ReportId, location_name: "reportId"))
630
681
  CreateFindingsReportResponse.struct_class = Types::CreateFindingsReportResponse
631
682
 
683
+ Cvss2.add_member(:base_score, Shapes::ShapeRef.new(shape: Cvss2BaseScore, location_name: "baseScore"))
684
+ Cvss2.add_member(:scoring_vector, Shapes::ShapeRef.new(shape: Cvss2ScoringVector, location_name: "scoringVector"))
685
+ Cvss2.struct_class = Types::Cvss2
686
+
687
+ Cvss3.add_member(:base_score, Shapes::ShapeRef.new(shape: Cvss3BaseScore, location_name: "baseScore"))
688
+ Cvss3.add_member(:scoring_vector, Shapes::ShapeRef.new(shape: Cvss3ScoringVector, location_name: "scoringVector"))
689
+ Cvss3.struct_class = Types::Cvss3
690
+
632
691
  CvssScore.add_member(:base_score, Shapes::ShapeRef.new(shape: Double, required: true, location_name: "baseScore"))
633
692
  CvssScore.add_member(:scoring_vector, Shapes::ShapeRef.new(shape: NonEmptyString, required: true, location_name: "scoringVector"))
634
693
  CvssScore.add_member(:source, Shapes::ShapeRef.new(shape: NonEmptyString, required: true, location_name: "source"))
@@ -651,6 +710,8 @@ module Aws::Inspector2
651
710
 
652
711
  CvssScoreList.member = Shapes::ShapeRef.new(shape: CvssScore)
653
712
 
713
+ Cwes.member = Shapes::ShapeRef.new(shape: Cwe)
714
+
654
715
  DateFilter.add_member(:end_inclusive, Shapes::ShapeRef.new(shape: Timestamp, location_name: "endInclusive"))
655
716
  DateFilter.add_member(:start_inclusive, Shapes::ShapeRef.new(shape: Timestamp, location_name: "startInclusive"))
656
717
  DateFilter.struct_class = Types::DateFilter
@@ -684,6 +745,8 @@ module Aws::Inspector2
684
745
  Destination.add_member(:kms_key_arn, Shapes::ShapeRef.new(shape: String, required: true, location_name: "kmsKeyArn"))
685
746
  Destination.struct_class = Types::Destination
686
747
 
748
+ DetectionPlatforms.member = Shapes::ShapeRef.new(shape: NonEmptyString)
749
+
687
750
  DisableDelegatedAdminAccountRequest.add_member(:delegated_admin_account_id, Shapes::ShapeRef.new(shape: AccountId, required: true, location_name: "delegatedAdminAccountId"))
688
751
  DisableDelegatedAdminAccountRequest.struct_class = Types::DisableDelegatedAdminAccountRequest
689
752
 
@@ -764,6 +827,13 @@ module Aws::Inspector2
764
827
  EnableResponse.add_member(:failed_accounts, Shapes::ShapeRef.new(shape: FailedAccountList, location_name: "failedAccounts"))
765
828
  EnableResponse.struct_class = Types::EnableResponse
766
829
 
830
+ Epss.add_member(:score, Shapes::ShapeRef.new(shape: EpssScore, location_name: "score"))
831
+ Epss.struct_class = Types::Epss
832
+
833
+ ExploitObserved.add_member(:first_seen, Shapes::ShapeRef.new(shape: FirstSeen, location_name: "firstSeen"))
834
+ ExploitObserved.add_member(:last_seen, Shapes::ShapeRef.new(shape: LastSeen, location_name: "lastSeen"))
835
+ ExploitObserved.struct_class = Types::ExploitObserved
836
+
767
837
  ExploitabilityDetails.add_member(:last_known_exploit_at, Shapes::ShapeRef.new(shape: DateTimeTimestamp, location_name: "lastKnownExploitAt"))
768
838
  ExploitabilityDetails.struct_class = Types::ExploitabilityDetails
769
839
 
@@ -1192,6 +1262,8 @@ module Aws::Inspector2
1192
1262
  Recommendation.add_member(:text, Shapes::ShapeRef.new(shape: NonEmptyString, location_name: "text"))
1193
1263
  Recommendation.struct_class = Types::Recommendation
1194
1264
 
1265
+ RelatedVulnerabilities.member = Shapes::ShapeRef.new(shape: RelatedVulnerability)
1266
+
1195
1267
  Remediation.add_member(:recommendation, Shapes::ShapeRef.new(shape: Recommendation, location_name: "recommendation"))
1196
1268
  Remediation.struct_class = Types::Remediation
1197
1269
 
@@ -1244,6 +1316,17 @@ module Aws::Inspector2
1244
1316
  ScanStatus.add_member(:status_code, Shapes::ShapeRef.new(shape: ScanStatusCode, required: true, location_name: "statusCode"))
1245
1317
  ScanStatus.struct_class = Types::ScanStatus
1246
1318
 
1319
+ SearchVulnerabilitiesFilterCriteria.add_member(:vulnerability_ids, Shapes::ShapeRef.new(shape: VulnIdList, required: true, location_name: "vulnerabilityIds"))
1320
+ SearchVulnerabilitiesFilterCriteria.struct_class = Types::SearchVulnerabilitiesFilterCriteria
1321
+
1322
+ SearchVulnerabilitiesRequest.add_member(:filter_criteria, Shapes::ShapeRef.new(shape: SearchVulnerabilitiesFilterCriteria, required: true, location_name: "filterCriteria"))
1323
+ SearchVulnerabilitiesRequest.add_member(:next_token, Shapes::ShapeRef.new(shape: NextToken, location_name: "nextToken"))
1324
+ SearchVulnerabilitiesRequest.struct_class = Types::SearchVulnerabilitiesRequest
1325
+
1326
+ SearchVulnerabilitiesResponse.add_member(:next_token, Shapes::ShapeRef.new(shape: NextToken, location_name: "nextToken"))
1327
+ SearchVulnerabilitiesResponse.add_member(:vulnerabilities, Shapes::ShapeRef.new(shape: Vulnerabilities, required: true, location_name: "vulnerabilities"))
1328
+ SearchVulnerabilitiesResponse.struct_class = Types::SearchVulnerabilitiesResponse
1329
+
1247
1330
  SecurityGroupIdList.member = Shapes::ShapeRef.new(shape: SecurityGroupId)
1248
1331
 
1249
1332
  ServiceQuotaExceededException.add_member(:message, Shapes::ShapeRef.new(shape: String, required: true, location_name: "message"))
@@ -1294,6 +1377,8 @@ module Aws::Inspector2
1294
1377
 
1295
1378
  TagResourceResponse.struct_class = Types::TagResourceResponse
1296
1379
 
1380
+ Targets.member = Shapes::ShapeRef.new(shape: Target)
1381
+
1297
1382
  ThrottlingException.add_member(:message, Shapes::ShapeRef.new(shape: String, required: true, location_name: "message"))
1298
1383
  ThrottlingException.add_member(:retry_after_seconds, Shapes::ShapeRef.new(shape: Integer, location: "header", location_name: "Retry-After"))
1299
1384
  ThrottlingException.struct_class = Types::ThrottlingException
@@ -1311,6 +1396,8 @@ module Aws::Inspector2
1311
1396
  TitleAggregationResponse.add_member(:vulnerability_id, Shapes::ShapeRef.new(shape: String, location_name: "vulnerabilityId"))
1312
1397
  TitleAggregationResponse.struct_class = Types::TitleAggregationResponse
1313
1398
 
1399
+ Ttps.member = Shapes::ShapeRef.new(shape: Ttp)
1400
+
1314
1401
  UntagResourceRequest.add_member(:resource_arn, Shapes::ShapeRef.new(shape: Arn, required: true, location: "uri", location_name: "resourceArn"))
1315
1402
  UntagResourceRequest.add_member(:tag_keys, Shapes::ShapeRef.new(shape: TagKeyList, required: true, location: "querystring", location_name: "tagKeys"))
1316
1403
  UntagResourceRequest.struct_class = Types::UntagResourceRequest
@@ -1381,8 +1468,33 @@ module Aws::Inspector2
1381
1468
 
1382
1469
  ValidationExceptionFields.member = Shapes::ShapeRef.new(shape: ValidationExceptionField)
1383
1470
 
1471
+ VulnIdList.member = Shapes::ShapeRef.new(shape: VulnId)
1472
+
1473
+ Vulnerabilities.member = Shapes::ShapeRef.new(shape: Vulnerability)
1474
+
1475
+ Vulnerability.add_member(:atig_data, Shapes::ShapeRef.new(shape: AtigData, location_name: "atigData"))
1476
+ Vulnerability.add_member(:cisa_data, Shapes::ShapeRef.new(shape: CisaData, location_name: "cisaData"))
1477
+ Vulnerability.add_member(:cvss2, Shapes::ShapeRef.new(shape: Cvss2, location_name: "cvss2"))
1478
+ Vulnerability.add_member(:cvss3, Shapes::ShapeRef.new(shape: Cvss3, location_name: "cvss3"))
1479
+ Vulnerability.add_member(:cwes, Shapes::ShapeRef.new(shape: Cwes, location_name: "cwes"))
1480
+ Vulnerability.add_member(:description, Shapes::ShapeRef.new(shape: VulnerabilityDescription, location_name: "description"))
1481
+ Vulnerability.add_member(:detection_platforms, Shapes::ShapeRef.new(shape: DetectionPlatforms, location_name: "detectionPlatforms"))
1482
+ Vulnerability.add_member(:epss, Shapes::ShapeRef.new(shape: Epss, location_name: "epss"))
1483
+ Vulnerability.add_member(:exploit_observed, Shapes::ShapeRef.new(shape: ExploitObserved, location_name: "exploitObserved"))
1484
+ Vulnerability.add_member(:id, Shapes::ShapeRef.new(shape: NonEmptyString, required: true, location_name: "id"))
1485
+ Vulnerability.add_member(:reference_urls, Shapes::ShapeRef.new(shape: VulnerabilityReferenceUrls, location_name: "referenceUrls"))
1486
+ Vulnerability.add_member(:related_vulnerabilities, Shapes::ShapeRef.new(shape: RelatedVulnerabilities, location_name: "relatedVulnerabilities"))
1487
+ Vulnerability.add_member(:source, Shapes::ShapeRef.new(shape: VulnerabilitySource, location_name: "source"))
1488
+ Vulnerability.add_member(:source_url, Shapes::ShapeRef.new(shape: VulnerabilitySourceUrl, location_name: "sourceUrl"))
1489
+ Vulnerability.add_member(:vendor_created_at, Shapes::ShapeRef.new(shape: VendorCreatedAt, location_name: "vendorCreatedAt"))
1490
+ Vulnerability.add_member(:vendor_severity, Shapes::ShapeRef.new(shape: VendorSeverity, location_name: "vendorSeverity"))
1491
+ Vulnerability.add_member(:vendor_updated_at, Shapes::ShapeRef.new(shape: VendorUpdatedAt, location_name: "vendorUpdatedAt"))
1492
+ Vulnerability.struct_class = Types::Vulnerability
1493
+
1384
1494
  VulnerabilityIdList.member = Shapes::ShapeRef.new(shape: VulnerabilityId)
1385
1495
 
1496
+ VulnerabilityReferenceUrls.member = Shapes::ShapeRef.new(shape: VulnerabilityReferenceUrl)
1497
+
1386
1498
  VulnerablePackage.add_member(:arch, Shapes::ShapeRef.new(shape: PackageArchitecture, location_name: "arch"))
1387
1499
  VulnerablePackage.add_member(:epoch, Shapes::ShapeRef.new(shape: PackageEpoch, location_name: "epoch"))
1388
1500
  VulnerablePackage.add_member(:file_path, Shapes::ShapeRef.new(shape: FilePath, location_name: "filePath"))
@@ -1840,6 +1952,23 @@ module Aws::Inspector2
1840
1952
  )
1841
1953
  end)
1842
1954
 
1955
+ api.add_operation(:search_vulnerabilities, Seahorse::Model::Operation.new.tap do |o|
1956
+ o.name = "SearchVulnerabilities"
1957
+ o.http_method = "POST"
1958
+ o.http_request_uri = "/vulnerabilities/search"
1959
+ o.input = Shapes::ShapeRef.new(shape: SearchVulnerabilitiesRequest)
1960
+ o.output = Shapes::ShapeRef.new(shape: SearchVulnerabilitiesResponse)
1961
+ o.errors << Shapes::ShapeRef.new(shape: ValidationException)
1962
+ o.errors << Shapes::ShapeRef.new(shape: AccessDeniedException)
1963
+ o.errors << Shapes::ShapeRef.new(shape: ThrottlingException)
1964
+ o.errors << Shapes::ShapeRef.new(shape: InternalServerException)
1965
+ o[:pager] = Aws::Pager.new(
1966
+ tokens: {
1967
+ "next_token" => "next_token"
1968
+ }
1969
+ )
1970
+ end)
1971
+
1843
1972
  api.add_operation(:tag_resource, Seahorse::Model::Operation.new.tap do |o|
1844
1973
  o.name = "TagResource"
1845
1974
  o.http_method = "POST"
@@ -431,6 +431,20 @@ module Aws::Inspector2
431
431
  end
432
432
  end
433
433
 
434
+ class SearchVulnerabilities
435
+ def self.build(context)
436
+ unless context.config.regional_endpoint
437
+ endpoint = context.config.endpoint.to_s
438
+ end
439
+ Aws::Inspector2::EndpointParameters.new(
440
+ region: context.config.region,
441
+ use_dual_stack: context.config.use_dualstack_endpoint,
442
+ use_fips: context.config.use_fips_endpoint,
443
+ endpoint: endpoint,
444
+ )
445
+ end
446
+ end
447
+
434
448
  class TagResource
435
449
  def self.build(context)
436
450
  unless context.config.regional_endpoint
@@ -116,6 +116,8 @@ module Aws::Inspector2
116
116
  Aws::Inspector2::Endpoints::ListTagsForResource.build(context)
117
117
  when :list_usage_totals
118
118
  Aws::Inspector2::Endpoints::ListUsageTotals.build(context)
119
+ when :search_vulnerabilities
120
+ Aws::Inspector2::Endpoints::SearchVulnerabilities.build(context)
119
121
  when :tag_resource
120
122
  Aws::Inspector2::Endpoints::TagResource.build(context)
121
123
  when :untag_resource
@@ -384,6 +384,41 @@ module Aws::Inspector2
384
384
  include Aws::Structure
385
385
  end
386
386
 
387
+ # The Amazon Web Services Threat Intel Group (ATIG) details for a
388
+ # specific vulnerability.
389
+ #
390
+ # @!attribute [rw] first_seen
391
+ # The date and time this vulnerability was first observed.
392
+ # @return [Time]
393
+ #
394
+ # @!attribute [rw] last_seen
395
+ # The date and time this vulnerability was last observed.
396
+ # @return [Time]
397
+ #
398
+ # @!attribute [rw] targets
399
+ # The commercial sectors this vulnerability targets.
400
+ # @return [Array<String>]
401
+ #
402
+ # @!attribute [rw] ttps
403
+ # The [MITRE ATT&amp;CK][1] tactics, techniques, and procedures (TTPs)
404
+ # associated with vulnerability.
405
+ #
406
+ #
407
+ #
408
+ # [1]: https://attack.mitre.org/
409
+ # @return [Array<String>]
410
+ #
411
+ # @see http://docs.aws.amazon.com/goto/WebAPI/inspector2-2020-06-08/AtigData AWS API Documentation
412
+ #
413
+ class AtigData < Struct.new(
414
+ :first_seen,
415
+ :last_seen,
416
+ :targets,
417
+ :ttps)
418
+ SENSITIVE = []
419
+ include Aws::Structure
420
+ end
421
+
387
422
  # Represents which scan types are automatically enabled for new members
388
423
  # of your Amazon Inspector organization.
389
424
  #
@@ -850,6 +885,32 @@ module Aws::Inspector2
850
885
  include Aws::Structure
851
886
  end
852
887
 
888
+ # The Cybersecurity and Infrastructure Security Agency (CISA) details
889
+ # for a specific vulnerability.
890
+ #
891
+ # @!attribute [rw] action
892
+ # The remediation action recommended by CISA for this vulnerability.
893
+ # @return [String]
894
+ #
895
+ # @!attribute [rw] date_added
896
+ # The date and time CISA added this vulnerability to their catalogue.
897
+ # @return [Time]
898
+ #
899
+ # @!attribute [rw] date_due
900
+ # The date and time CISA expects a fix to have been provided
901
+ # vulnerability.
902
+ # @return [Time]
903
+ #
904
+ # @see http://docs.aws.amazon.com/goto/WebAPI/inspector2-2020-06-08/CisaData AWS API Documentation
905
+ #
906
+ class CisaData < Struct.new(
907
+ :action,
908
+ :date_added,
909
+ :date_due)
910
+ SENSITIVE = []
911
+ include Aws::Structure
912
+ end
913
+
853
914
  # A conflict occurred.
854
915
  #
855
916
  # @!attribute [rw] message
@@ -1140,6 +1201,46 @@ module Aws::Inspector2
1140
1201
  include Aws::Structure
1141
1202
  end
1142
1203
 
1204
+ # The Common Vulnerability Scoring System (CVSS) version 2 details for
1205
+ # the vulnerability.
1206
+ #
1207
+ # @!attribute [rw] base_score
1208
+ # The CVSS v2 base score for the vulnerability.
1209
+ # @return [Float]
1210
+ #
1211
+ # @!attribute [rw] scoring_vector
1212
+ # The scoring vector associated with the CVSS v2 score.
1213
+ # @return [String]
1214
+ #
1215
+ # @see http://docs.aws.amazon.com/goto/WebAPI/inspector2-2020-06-08/Cvss2 AWS API Documentation
1216
+ #
1217
+ class Cvss2 < Struct.new(
1218
+ :base_score,
1219
+ :scoring_vector)
1220
+ SENSITIVE = []
1221
+ include Aws::Structure
1222
+ end
1223
+
1224
+ # The Common Vulnerability Scoring System (CVSS) version 3 details for
1225
+ # the vulnerability.
1226
+ #
1227
+ # @!attribute [rw] base_score
1228
+ # The CVSS v3 base score for the vulnerability.
1229
+ # @return [Float]
1230
+ #
1231
+ # @!attribute [rw] scoring_vector
1232
+ # The scoring vector associated with the CVSS v3 score.
1233
+ # @return [String]
1234
+ #
1235
+ # @see http://docs.aws.amazon.com/goto/WebAPI/inspector2-2020-06-08/Cvss3 AWS API Documentation
1236
+ #
1237
+ class Cvss3 < Struct.new(
1238
+ :base_score,
1239
+ :scoring_vector)
1240
+ SENSITIVE = []
1241
+ include Aws::Structure
1242
+ end
1243
+
1143
1244
  # The CVSS score for a finding.
1144
1245
  #
1145
1246
  # @!attribute [rw] base_score
@@ -1743,6 +1844,39 @@ module Aws::Inspector2
1743
1844
  include Aws::Structure
1744
1845
  end
1745
1846
 
1847
+ # Details about the Exploit Prediction Scoring System (EPSS) score.
1848
+ #
1849
+ # @!attribute [rw] score
1850
+ # The Exploit Prediction Scoring System (EPSS) score.
1851
+ # @return [Float]
1852
+ #
1853
+ # @see http://docs.aws.amazon.com/goto/WebAPI/inspector2-2020-06-08/Epss AWS API Documentation
1854
+ #
1855
+ class Epss < Struct.new(
1856
+ :score)
1857
+ SENSITIVE = []
1858
+ include Aws::Structure
1859
+ end
1860
+
1861
+ # Contains information on when this exploit was observed.
1862
+ #
1863
+ # @!attribute [rw] first_seen
1864
+ # The date an time when the exploit was first seen.
1865
+ # @return [Time]
1866
+ #
1867
+ # @!attribute [rw] last_seen
1868
+ # The date an time when the exploit was last seen.
1869
+ # @return [Time]
1870
+ #
1871
+ # @see http://docs.aws.amazon.com/goto/WebAPI/inspector2-2020-06-08/ExploitObserved AWS API Documentation
1872
+ #
1873
+ class ExploitObserved < Struct.new(
1874
+ :first_seen,
1875
+ :last_seen)
1876
+ SENSITIVE = []
1877
+ include Aws::Structure
1878
+ end
1879
+
1746
1880
  # The details of an exploit available for a finding discovered in your
1747
1881
  # environment.
1748
1882
  #
@@ -3960,6 +4094,60 @@ module Aws::Inspector2
3960
4094
  include Aws::Structure
3961
4095
  end
3962
4096
 
4097
+ # Details on the criteria used to define the filter for a vulnerability
4098
+ # search.
4099
+ #
4100
+ # @!attribute [rw] vulnerability_ids
4101
+ # The IDs for specific vulnerabilities.
4102
+ # @return [Array<String>]
4103
+ #
4104
+ # @see http://docs.aws.amazon.com/goto/WebAPI/inspector2-2020-06-08/SearchVulnerabilitiesFilterCriteria AWS API Documentation
4105
+ #
4106
+ class SearchVulnerabilitiesFilterCriteria < Struct.new(
4107
+ :vulnerability_ids)
4108
+ SENSITIVE = []
4109
+ include Aws::Structure
4110
+ end
4111
+
4112
+ # @!attribute [rw] filter_criteria
4113
+ # The criteria used to filter the results of a vulnerability search.
4114
+ # @return [Types::SearchVulnerabilitiesFilterCriteria]
4115
+ #
4116
+ # @!attribute [rw] next_token
4117
+ # A token to use for paginating results that are returned in the
4118
+ # response. Set the value of this parameter to null for the first
4119
+ # request to a list action. For subsequent calls, use the `NextToken`
4120
+ # value returned from the previous request to continue listing results
4121
+ # after the first page.
4122
+ # @return [String]
4123
+ #
4124
+ # @see http://docs.aws.amazon.com/goto/WebAPI/inspector2-2020-06-08/SearchVulnerabilitiesRequest AWS API Documentation
4125
+ #
4126
+ class SearchVulnerabilitiesRequest < Struct.new(
4127
+ :filter_criteria,
4128
+ :next_token)
4129
+ SENSITIVE = []
4130
+ include Aws::Structure
4131
+ end
4132
+
4133
+ # @!attribute [rw] next_token
4134
+ # The pagination parameter to be used on the next list operation to
4135
+ # retrieve more items.
4136
+ # @return [String]
4137
+ #
4138
+ # @!attribute [rw] vulnerabilities
4139
+ # Details about the listed vulnerability.
4140
+ # @return [Array<Types::Vulnerability>]
4141
+ #
4142
+ # @see http://docs.aws.amazon.com/goto/WebAPI/inspector2-2020-06-08/SearchVulnerabilitiesResponse AWS API Documentation
4143
+ #
4144
+ class SearchVulnerabilitiesResponse < Struct.new(
4145
+ :next_token,
4146
+ :vulnerabilities)
4147
+ SENSITIVE = []
4148
+ include Aws::Structure
4149
+ end
4150
+
3963
4151
  # You have exceeded your service quota. To perform the requested action,
3964
4152
  # remove some of the relevant resources, or use Service Quotas to
3965
4153
  # request a service quota increase.
@@ -4476,6 +4664,108 @@ module Aws::Inspector2
4476
4664
  include Aws::Structure
4477
4665
  end
4478
4666
 
4667
+ # Contains details about a specific vulnerability Amazon Inspector can
4668
+ # detect.
4669
+ #
4670
+ # @!attribute [rw] atig_data
4671
+ # An object that contains information about the Amazon Web Services
4672
+ # Threat Intel Group (ATIG) details for the vulnerability.
4673
+ # @return [Types::AtigData]
4674
+ #
4675
+ # @!attribute [rw] cisa_data
4676
+ # An object that contains the Cybersecurity and Infrastructure
4677
+ # Security Agency (CISA) details for the vulnerability.
4678
+ # @return [Types::CisaData]
4679
+ #
4680
+ # @!attribute [rw] cvss2
4681
+ # An object that contains the Common Vulnerability Scoring System
4682
+ # (CVSS) Version 2 details for the vulnerability.
4683
+ # @return [Types::Cvss2]
4684
+ #
4685
+ # @!attribute [rw] cvss3
4686
+ # An object that contains the Common Vulnerability Scoring System
4687
+ # (CVSS) Version 3 details for the vulnerability.
4688
+ # @return [Types::Cvss3]
4689
+ #
4690
+ # @!attribute [rw] cwes
4691
+ # The Common Weakness Enumeration (CWE) associated with the
4692
+ # vulnerability.
4693
+ # @return [Array<String>]
4694
+ #
4695
+ # @!attribute [rw] description
4696
+ # A description of the vulnerability.
4697
+ # @return [String]
4698
+ #
4699
+ # @!attribute [rw] detection_platforms
4700
+ # Platforms that the vulnerability can be detected on.
4701
+ # @return [Array<String>]
4702
+ #
4703
+ # @!attribute [rw] epss
4704
+ # An object that contains the Exploit Prediction Scoring System (EPSS)
4705
+ # score.
4706
+ # @return [Types::Epss]
4707
+ #
4708
+ # @!attribute [rw] exploit_observed
4709
+ # An object that contains details on when the exploit was observed.
4710
+ # @return [Types::ExploitObserved]
4711
+ #
4712
+ # @!attribute [rw] id
4713
+ # The ID for the specific vulnerability.
4714
+ # @return [String]
4715
+ #
4716
+ # @!attribute [rw] reference_urls
4717
+ # Links to various resources with more information on this
4718
+ # vulnerability.
4719
+ # @return [Array<String>]
4720
+ #
4721
+ # @!attribute [rw] related_vulnerabilities
4722
+ # A list of related vulnerabilities.
4723
+ # @return [Array<String>]
4724
+ #
4725
+ # @!attribute [rw] source
4726
+ # The source of the vulnerability information.
4727
+ # @return [String]
4728
+ #
4729
+ # @!attribute [rw] source_url
4730
+ # A link to the official source material for this vulnerability.
4731
+ # @return [String]
4732
+ #
4733
+ # @!attribute [rw] vendor_created_at
4734
+ # The date and time when the vendor created this vulnerability.
4735
+ # @return [Time]
4736
+ #
4737
+ # @!attribute [rw] vendor_severity
4738
+ # The severity assigned by the vendor.
4739
+ # @return [String]
4740
+ #
4741
+ # @!attribute [rw] vendor_updated_at
4742
+ # The date and time when the vendor last updated this vulnerability.
4743
+ # @return [Time]
4744
+ #
4745
+ # @see http://docs.aws.amazon.com/goto/WebAPI/inspector2-2020-06-08/Vulnerability AWS API Documentation
4746
+ #
4747
+ class Vulnerability < Struct.new(
4748
+ :atig_data,
4749
+ :cisa_data,
4750
+ :cvss2,
4751
+ :cvss3,
4752
+ :cwes,
4753
+ :description,
4754
+ :detection_platforms,
4755
+ :epss,
4756
+ :exploit_observed,
4757
+ :id,
4758
+ :reference_urls,
4759
+ :related_vulnerabilities,
4760
+ :source,
4761
+ :source_url,
4762
+ :vendor_created_at,
4763
+ :vendor_severity,
4764
+ :vendor_updated_at)
4765
+ SENSITIVE = []
4766
+ include Aws::Structure
4767
+ end
4768
+
4479
4769
  # Information on the vulnerable package identified by a finding.
4480
4770
  #
4481
4771
  # @!attribute [rw] arch
@@ -52,6 +52,6 @@ require_relative 'aws-sdk-inspector2/customizations'
52
52
  # @!group service
53
53
  module Aws::Inspector2
54
54
 
55
- GEM_VERSION = '1.11.0'
55
+ GEM_VERSION = '1.12.0'
56
56
 
57
57
  end
metadata CHANGED
@@ -1,14 +1,14 @@
1
1
  --- !ruby/object:Gem::Specification
2
2
  name: aws-sdk-inspector2
3
3
  version: !ruby/object:Gem::Version
4
- version: 1.11.0
4
+ version: 1.12.0
5
5
  platform: ruby
6
6
  authors:
7
7
  - Amazon Web Services
8
8
  autorequire:
9
9
  bindir: bin
10
10
  cert_chain: []
11
- date: 2023-05-03 00:00:00.000000000 Z
11
+ date: 2023-05-05 00:00:00.000000000 Z
12
12
  dependencies:
13
13
  - !ruby/object:Gem::Dependency
14
14
  name: aws-sdk-core