aws-sdk-inspector2 1.11.0 → 1.12.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
checksums.yaml CHANGED
@@ -1,7 +1,7 @@
1
1
  ---
2
2
  SHA256:
3
- metadata.gz: 76d22a5063b8b38a59b8b39a541bbb859caef45afaf8c9fcc6dce881b2053918
4
- data.tar.gz: 0d49f55c3b42d98e2cf3dd258d094cb2cb375d7710ae5c1739a84f24f5992879
3
+ metadata.gz: 37045386cef6441373fa42145f3ecf648fef0f4322fad6515b80719539a77473
4
+ data.tar.gz: b815de9f7ae4804241a5aabc60fede44880a5ba087b92d4000e179b7c7fee2ca
5
5
  SHA512:
6
- metadata.gz: dd7c51e1e87978abb565408a52163832ffd9daaa38deadb82990391bf647714fc09a2aad78bbe790a6820abf94f125b00f54fd0b4f7aa96b9e925d6256f1a38c
7
- data.tar.gz: f5427e323864a8e6a0caf4b29225931b4dac036f165a049adf2e088f8b2948de9398265258b4eff3dc7b741c38610014e37d6621fa65c66783bd0edc613b43b1
6
+ metadata.gz: 1b1f03de0aaef59011515095e6fbd52e881a1ff9a49c798d7048af053da8d2db939b786a32f263332ebcd01e988d0df84b096f02af018f5c460055216687ab32
7
+ data.tar.gz: a20ac868d3f766413ca6cc2a70ed86276d9fcbeef6db46c9e2d609727c3ac2b2b903b109959141cca536e6d4ee92963af94fd7912f0785a05b110ddbdf26de70
data/CHANGELOG.md CHANGED
@@ -1,6 +1,11 @@
1
1
  Unreleased Changes
2
2
  ------------------
3
3
 
4
+ 1.12.0 (2023-05-05)
5
+ ------------------
6
+
7
+ * Feature - Amazon Inspector now allows customers to search its vulnerability intelligence database if any of the Inspector scanning types are activated.
8
+
4
9
  1.11.0 (2023-05-03)
5
10
  ------------------
6
11
 
data/VERSION CHANGED
@@ -1 +1 @@
1
- 1.11.0
1
+ 1.12.0
@@ -3158,6 +3158,79 @@ module Aws::Inspector2
3158
3158
  req.send_request(options)
3159
3159
  end
3160
3160
 
3161
+ # Lists Amazon Inspector coverage details for a specific vulnerability.
3162
+ #
3163
+ # @option params [required, Types::SearchVulnerabilitiesFilterCriteria] :filter_criteria
3164
+ # The criteria used to filter the results of a vulnerability search.
3165
+ #
3166
+ # @option params [String] :next_token
3167
+ # A token to use for paginating results that are returned in the
3168
+ # response. Set the value of this parameter to null for the first
3169
+ # request to a list action. For subsequent calls, use the `NextToken`
3170
+ # value returned from the previous request to continue listing results
3171
+ # after the first page.
3172
+ #
3173
+ # @return [Types::SearchVulnerabilitiesResponse] Returns a {Seahorse::Client::Response response} object which responds to the following methods:
3174
+ #
3175
+ # * {Types::SearchVulnerabilitiesResponse#next_token #next_token} => String
3176
+ # * {Types::SearchVulnerabilitiesResponse#vulnerabilities #vulnerabilities} => Array<Types::Vulnerability>
3177
+ #
3178
+ # The returned {Seahorse::Client::Response response} is a pageable response and is Enumerable. For details on usage see {Aws::PageableResponse PageableResponse}.
3179
+ #
3180
+ # @example Request syntax with placeholder values
3181
+ #
3182
+ # resp = client.search_vulnerabilities({
3183
+ # filter_criteria: { # required
3184
+ # vulnerability_ids: ["VulnId"], # required
3185
+ # },
3186
+ # next_token: "NextToken",
3187
+ # })
3188
+ #
3189
+ # @example Response structure
3190
+ #
3191
+ # resp.next_token #=> String
3192
+ # resp.vulnerabilities #=> Array
3193
+ # resp.vulnerabilities[0].atig_data.first_seen #=> Time
3194
+ # resp.vulnerabilities[0].atig_data.last_seen #=> Time
3195
+ # resp.vulnerabilities[0].atig_data.targets #=> Array
3196
+ # resp.vulnerabilities[0].atig_data.targets[0] #=> String
3197
+ # resp.vulnerabilities[0].atig_data.ttps #=> Array
3198
+ # resp.vulnerabilities[0].atig_data.ttps[0] #=> String
3199
+ # resp.vulnerabilities[0].cisa_data.action #=> String
3200
+ # resp.vulnerabilities[0].cisa_data.date_added #=> Time
3201
+ # resp.vulnerabilities[0].cisa_data.date_due #=> Time
3202
+ # resp.vulnerabilities[0].cvss2.base_score #=> Float
3203
+ # resp.vulnerabilities[0].cvss2.scoring_vector #=> String
3204
+ # resp.vulnerabilities[0].cvss3.base_score #=> Float
3205
+ # resp.vulnerabilities[0].cvss3.scoring_vector #=> String
3206
+ # resp.vulnerabilities[0].cwes #=> Array
3207
+ # resp.vulnerabilities[0].cwes[0] #=> String
3208
+ # resp.vulnerabilities[0].description #=> String
3209
+ # resp.vulnerabilities[0].detection_platforms #=> Array
3210
+ # resp.vulnerabilities[0].detection_platforms[0] #=> String
3211
+ # resp.vulnerabilities[0].epss.score #=> Float
3212
+ # resp.vulnerabilities[0].exploit_observed.first_seen #=> Time
3213
+ # resp.vulnerabilities[0].exploit_observed.last_seen #=> Time
3214
+ # resp.vulnerabilities[0].id #=> String
3215
+ # resp.vulnerabilities[0].reference_urls #=> Array
3216
+ # resp.vulnerabilities[0].reference_urls[0] #=> String
3217
+ # resp.vulnerabilities[0].related_vulnerabilities #=> Array
3218
+ # resp.vulnerabilities[0].related_vulnerabilities[0] #=> String
3219
+ # resp.vulnerabilities[0].source #=> String, one of "NVD"
3220
+ # resp.vulnerabilities[0].source_url #=> String
3221
+ # resp.vulnerabilities[0].vendor_created_at #=> Time
3222
+ # resp.vulnerabilities[0].vendor_severity #=> String
3223
+ # resp.vulnerabilities[0].vendor_updated_at #=> Time
3224
+ #
3225
+ # @see http://docs.aws.amazon.com/goto/WebAPI/inspector2-2020-06-08/SearchVulnerabilities AWS API Documentation
3226
+ #
3227
+ # @overload search_vulnerabilities(params = {})
3228
+ # @param [Hash] params ({})
3229
+ def search_vulnerabilities(params = {}, options = {})
3230
+ req = build_request(:search_vulnerabilities, params)
3231
+ req.send_request(options)
3232
+ end
3233
+
3161
3234
  # Adds tags to a resource.
3162
3235
  #
3163
3236
  # @option params [required, String] :resource_arn
@@ -3669,7 +3742,7 @@ module Aws::Inspector2
3669
3742
  params: params,
3670
3743
  config: config)
3671
3744
  context[:gem_name] = 'aws-sdk-inspector2'
3672
- context[:gem_version] = '1.11.0'
3745
+ context[:gem_version] = '1.12.0'
3673
3746
  Seahorse::Client::Request.new(handlers, context)
3674
3747
  end
3675
3748
 
@@ -39,6 +39,7 @@ module Aws::Inspector2
39
39
  Arn = Shapes::StringShape.new(name: 'Arn')
40
40
  AssociateMemberRequest = Shapes::StructureShape.new(name: 'AssociateMemberRequest')
41
41
  AssociateMemberResponse = Shapes::StructureShape.new(name: 'AssociateMemberResponse')
42
+ AtigData = Shapes::StructureShape.new(name: 'AtigData')
42
43
  AutoEnable = Shapes::StructureShape.new(name: 'AutoEnable')
43
44
  AwsEc2InstanceDetails = Shapes::StructureShape.new(name: 'AwsEc2InstanceDetails')
44
45
  AwsEcrContainerAggregation = Shapes::StructureShape.new(name: 'AwsEcrContainerAggregation')
@@ -59,6 +60,10 @@ module Aws::Inspector2
59
60
  Boolean = Shapes::BooleanShape.new(name: 'Boolean')
60
61
  CancelFindingsReportRequest = Shapes::StructureShape.new(name: 'CancelFindingsReportRequest')
61
62
  CancelFindingsReportResponse = Shapes::StructureShape.new(name: 'CancelFindingsReportResponse')
63
+ CisaAction = Shapes::StringShape.new(name: 'CisaAction')
64
+ CisaData = Shapes::StructureShape.new(name: 'CisaData')
65
+ CisaDateAdded = Shapes::TimestampShape.new(name: 'CisaDateAdded')
66
+ CisaDateDue = Shapes::TimestampShape.new(name: 'CisaDateDue')
62
67
  ClientToken = Shapes::StringShape.new(name: 'ClientToken')
63
68
  Component = Shapes::StringShape.new(name: 'Component')
64
69
  ComponentType = Shapes::StringShape.new(name: 'ComponentType')
@@ -81,11 +86,19 @@ module Aws::Inspector2
81
86
  CreateFindingsReportRequest = Shapes::StructureShape.new(name: 'CreateFindingsReportRequest')
82
87
  CreateFindingsReportResponse = Shapes::StructureShape.new(name: 'CreateFindingsReportResponse')
83
88
  Currency = Shapes::StringShape.new(name: 'Currency')
89
+ Cvss2 = Shapes::StructureShape.new(name: 'Cvss2')
90
+ Cvss2BaseScore = Shapes::FloatShape.new(name: 'Cvss2BaseScore')
91
+ Cvss2ScoringVector = Shapes::StringShape.new(name: 'Cvss2ScoringVector')
92
+ Cvss3 = Shapes::StructureShape.new(name: 'Cvss3')
93
+ Cvss3BaseScore = Shapes::FloatShape.new(name: 'Cvss3BaseScore')
94
+ Cvss3ScoringVector = Shapes::StringShape.new(name: 'Cvss3ScoringVector')
84
95
  CvssScore = Shapes::StructureShape.new(name: 'CvssScore')
85
96
  CvssScoreAdjustment = Shapes::StructureShape.new(name: 'CvssScoreAdjustment')
86
97
  CvssScoreAdjustmentList = Shapes::ListShape.new(name: 'CvssScoreAdjustmentList')
87
98
  CvssScoreDetails = Shapes::StructureShape.new(name: 'CvssScoreDetails')
88
99
  CvssScoreList = Shapes::ListShape.new(name: 'CvssScoreList')
100
+ Cwe = Shapes::StringShape.new(name: 'Cwe')
101
+ Cwes = Shapes::ListShape.new(name: 'Cwes')
89
102
  DateFilter = Shapes::StructureShape.new(name: 'DateFilter')
90
103
  DateFilterList = Shapes::ListShape.new(name: 'DateFilterList')
91
104
  DateTimeTimestamp = Shapes::TimestampShape.new(name: 'DateTimeTimestamp')
@@ -98,6 +111,7 @@ module Aws::Inspector2
98
111
  DescribeOrganizationConfigurationRequest = Shapes::StructureShape.new(name: 'DescribeOrganizationConfigurationRequest')
99
112
  DescribeOrganizationConfigurationResponse = Shapes::StructureShape.new(name: 'DescribeOrganizationConfigurationResponse')
100
113
  Destination = Shapes::StructureShape.new(name: 'Destination')
114
+ DetectionPlatforms = Shapes::ListShape.new(name: 'DetectionPlatforms')
101
115
  DisableDelegatedAdminAccountRequest = Shapes::StructureShape.new(name: 'DisableDelegatedAdminAccountRequest')
102
116
  DisableDelegatedAdminAccountResponse = Shapes::StructureShape.new(name: 'DisableDelegatedAdminAccountResponse')
103
117
  DisableRequest = Shapes::StructureShape.new(name: 'DisableRequest')
@@ -125,10 +139,13 @@ module Aws::Inspector2
125
139
  EnableRequest = Shapes::StructureShape.new(name: 'EnableRequest')
126
140
  EnableResourceTypeList = Shapes::ListShape.new(name: 'EnableResourceTypeList')
127
141
  EnableResponse = Shapes::StructureShape.new(name: 'EnableResponse')
142
+ Epss = Shapes::StructureShape.new(name: 'Epss')
143
+ EpssScore = Shapes::FloatShape.new(name: 'EpssScore')
128
144
  ErrorCode = Shapes::StringShape.new(name: 'ErrorCode')
129
145
  ErrorMessage = Shapes::StringShape.new(name: 'ErrorMessage')
130
146
  ExecutionRoleArn = Shapes::StringShape.new(name: 'ExecutionRoleArn')
131
147
  ExploitAvailable = Shapes::StringShape.new(name: 'ExploitAvailable')
148
+ ExploitObserved = Shapes::StructureShape.new(name: 'ExploitObserved')
132
149
  ExploitabilityDetails = Shapes::StructureShape.new(name: 'ExploitabilityDetails')
133
150
  ExternalReportStatus = Shapes::StringShape.new(name: 'ExternalReportStatus')
134
151
  FailedAccount = Shapes::StructureShape.new(name: 'FailedAccount')
@@ -155,6 +172,7 @@ module Aws::Inspector2
155
172
  FindingTypeAggregation = Shapes::StructureShape.new(name: 'FindingTypeAggregation')
156
173
  FindingTypeAggregationResponse = Shapes::StructureShape.new(name: 'FindingTypeAggregationResponse')
157
174
  FindingTypeSortBy = Shapes::StringShape.new(name: 'FindingTypeSortBy')
175
+ FirstSeen = Shapes::TimestampShape.new(name: 'FirstSeen')
158
176
  FixAvailable = Shapes::StringShape.new(name: 'FixAvailable')
159
177
  FreeTrialAccountInfo = Shapes::StructureShape.new(name: 'FreeTrialAccountInfo')
160
178
  FreeTrialAccountInfoList = Shapes::ListShape.new(name: 'FreeTrialAccountInfoList')
@@ -199,6 +217,7 @@ module Aws::Inspector2
199
217
  LambdaLayerList = Shapes::ListShape.new(name: 'LambdaLayerList')
200
218
  LambdaLayerSortBy = Shapes::StringShape.new(name: 'LambdaLayerSortBy')
201
219
  LambdaVpcConfig = Shapes::StructureShape.new(name: 'LambdaVpcConfig')
220
+ LastSeen = Shapes::TimestampShape.new(name: 'LastSeen')
202
221
  LayerList = Shapes::ListShape.new(name: 'LayerList')
203
222
  ListAccountPermissionsMaxResults = Shapes::IntegerShape.new(name: 'ListAccountPermissionsMaxResults')
204
223
  ListAccountPermissionsRequest = Shapes::StructureShape.new(name: 'ListAccountPermissionsRequest')
@@ -276,6 +295,8 @@ module Aws::Inspector2
276
295
  PortRangeFilter = Shapes::StructureShape.new(name: 'PortRangeFilter')
277
296
  PortRangeFilterList = Shapes::ListShape.new(name: 'PortRangeFilterList')
278
297
  Recommendation = Shapes::StructureShape.new(name: 'Recommendation')
298
+ RelatedVulnerabilities = Shapes::ListShape.new(name: 'RelatedVulnerabilities')
299
+ RelatedVulnerability = Shapes::StringShape.new(name: 'RelatedVulnerability')
279
300
  RelationshipStatus = Shapes::StringShape.new(name: 'RelationshipStatus')
280
301
  Remediation = Shapes::StructureShape.new(name: 'Remediation')
281
302
  ReportFormat = Shapes::StringShape.new(name: 'ReportFormat')
@@ -299,6 +320,9 @@ module Aws::Inspector2
299
320
  ScanStatusCode = Shapes::StringShape.new(name: 'ScanStatusCode')
300
321
  ScanStatusReason = Shapes::StringShape.new(name: 'ScanStatusReason')
301
322
  ScanType = Shapes::StringShape.new(name: 'ScanType')
323
+ SearchVulnerabilitiesFilterCriteria = Shapes::StructureShape.new(name: 'SearchVulnerabilitiesFilterCriteria')
324
+ SearchVulnerabilitiesRequest = Shapes::StructureShape.new(name: 'SearchVulnerabilitiesRequest')
325
+ SearchVulnerabilitiesResponse = Shapes::StructureShape.new(name: 'SearchVulnerabilitiesResponse')
302
326
  SecurityGroupId = Shapes::StringShape.new(name: 'SecurityGroupId')
303
327
  SecurityGroupIdList = Shapes::ListShape.new(name: 'SecurityGroupIdList')
304
328
  Service = Shapes::StringShape.new(name: 'Service')
@@ -327,11 +351,15 @@ module Aws::Inspector2
327
351
  TagMap = Shapes::MapShape.new(name: 'TagMap')
328
352
  TagResourceRequest = Shapes::StructureShape.new(name: 'TagResourceRequest')
329
353
  TagResourceResponse = Shapes::StructureShape.new(name: 'TagResourceResponse')
354
+ Target = Shapes::StringShape.new(name: 'Target')
355
+ Targets = Shapes::ListShape.new(name: 'Targets')
330
356
  ThrottlingException = Shapes::StructureShape.new(name: 'ThrottlingException')
331
357
  Timestamp = Shapes::TimestampShape.new(name: 'Timestamp')
332
358
  TitleAggregation = Shapes::StructureShape.new(name: 'TitleAggregation')
333
359
  TitleAggregationResponse = Shapes::StructureShape.new(name: 'TitleAggregationResponse')
334
360
  TitleSortBy = Shapes::StringShape.new(name: 'TitleSortBy')
361
+ Ttp = Shapes::StringShape.new(name: 'Ttp')
362
+ Ttps = Shapes::ListShape.new(name: 'Ttps')
335
363
  UntagResourceRequest = Shapes::StructureShape.new(name: 'UntagResourceRequest')
336
364
  UntagResourceResponse = Shapes::StructureShape.new(name: 'UntagResourceResponse')
337
365
  UpdateConfigurationRequest = Shapes::StructureShape.new(name: 'UpdateConfigurationRequest')
@@ -356,10 +384,22 @@ module Aws::Inspector2
356
384
  ValidationExceptionField = Shapes::StructureShape.new(name: 'ValidationExceptionField')
357
385
  ValidationExceptionFields = Shapes::ListShape.new(name: 'ValidationExceptionFields')
358
386
  ValidationExceptionReason = Shapes::StringShape.new(name: 'ValidationExceptionReason')
387
+ VendorCreatedAt = Shapes::TimestampShape.new(name: 'VendorCreatedAt')
388
+ VendorSeverity = Shapes::StringShape.new(name: 'VendorSeverity')
389
+ VendorUpdatedAt = Shapes::TimestampShape.new(name: 'VendorUpdatedAt')
359
390
  Version = Shapes::StringShape.new(name: 'Version')
360
391
  VpcId = Shapes::StringShape.new(name: 'VpcId')
392
+ VulnId = Shapes::StringShape.new(name: 'VulnId')
393
+ VulnIdList = Shapes::ListShape.new(name: 'VulnIdList')
394
+ Vulnerabilities = Shapes::ListShape.new(name: 'Vulnerabilities')
395
+ Vulnerability = Shapes::StructureShape.new(name: 'Vulnerability')
396
+ VulnerabilityDescription = Shapes::StringShape.new(name: 'VulnerabilityDescription')
361
397
  VulnerabilityId = Shapes::StringShape.new(name: 'VulnerabilityId')
362
398
  VulnerabilityIdList = Shapes::ListShape.new(name: 'VulnerabilityIdList')
399
+ VulnerabilityReferenceUrl = Shapes::StringShape.new(name: 'VulnerabilityReferenceUrl')
400
+ VulnerabilityReferenceUrls = Shapes::ListShape.new(name: 'VulnerabilityReferenceUrls')
401
+ VulnerabilitySource = Shapes::StringShape.new(name: 'VulnerabilitySource')
402
+ VulnerabilitySourceUrl = Shapes::StringShape.new(name: 'VulnerabilitySourceUrl')
363
403
  VulnerablePackage = Shapes::StructureShape.new(name: 'VulnerablePackage')
364
404
  VulnerablePackageList = Shapes::ListShape.new(name: 'VulnerablePackageList')
365
405
  VulnerablePackageRemediation = Shapes::StringShape.new(name: 'VulnerablePackageRemediation')
@@ -466,6 +506,12 @@ module Aws::Inspector2
466
506
  AssociateMemberResponse.add_member(:account_id, Shapes::ShapeRef.new(shape: AccountId, required: true, location_name: "accountId"))
467
507
  AssociateMemberResponse.struct_class = Types::AssociateMemberResponse
468
508
 
509
+ AtigData.add_member(:first_seen, Shapes::ShapeRef.new(shape: FirstSeen, location_name: "firstSeen"))
510
+ AtigData.add_member(:last_seen, Shapes::ShapeRef.new(shape: LastSeen, location_name: "lastSeen"))
511
+ AtigData.add_member(:targets, Shapes::ShapeRef.new(shape: Targets, location_name: "targets"))
512
+ AtigData.add_member(:ttps, Shapes::ShapeRef.new(shape: Ttps, location_name: "ttps"))
513
+ AtigData.struct_class = Types::AtigData
514
+
469
515
  AutoEnable.add_member(:ec2, Shapes::ShapeRef.new(shape: Boolean, required: true, location_name: "ec2"))
470
516
  AutoEnable.add_member(:ecr, Shapes::ShapeRef.new(shape: Boolean, required: true, location_name: "ecr"))
471
517
  AutoEnable.add_member(:lambda, Shapes::ShapeRef.new(shape: Boolean, location_name: "lambda"))
@@ -562,6 +608,11 @@ module Aws::Inspector2
562
608
  CancelFindingsReportResponse.add_member(:report_id, Shapes::ShapeRef.new(shape: ReportId, required: true, location_name: "reportId"))
563
609
  CancelFindingsReportResponse.struct_class = Types::CancelFindingsReportResponse
564
610
 
611
+ CisaData.add_member(:action, Shapes::ShapeRef.new(shape: CisaAction, location_name: "action"))
612
+ CisaData.add_member(:date_added, Shapes::ShapeRef.new(shape: CisaDateAdded, location_name: "dateAdded"))
613
+ CisaData.add_member(:date_due, Shapes::ShapeRef.new(shape: CisaDateDue, location_name: "dateDue"))
614
+ CisaData.struct_class = Types::CisaData
615
+
565
616
  ConflictException.add_member(:message, Shapes::ShapeRef.new(shape: String, required: true, location_name: "message"))
566
617
  ConflictException.add_member(:resource_id, Shapes::ShapeRef.new(shape: String, required: true, location_name: "resourceId"))
567
618
  ConflictException.add_member(:resource_type, Shapes::ShapeRef.new(shape: String, required: true, location_name: "resourceType"))
@@ -629,6 +680,14 @@ module Aws::Inspector2
629
680
  CreateFindingsReportResponse.add_member(:report_id, Shapes::ShapeRef.new(shape: ReportId, location_name: "reportId"))
630
681
  CreateFindingsReportResponse.struct_class = Types::CreateFindingsReportResponse
631
682
 
683
+ Cvss2.add_member(:base_score, Shapes::ShapeRef.new(shape: Cvss2BaseScore, location_name: "baseScore"))
684
+ Cvss2.add_member(:scoring_vector, Shapes::ShapeRef.new(shape: Cvss2ScoringVector, location_name: "scoringVector"))
685
+ Cvss2.struct_class = Types::Cvss2
686
+
687
+ Cvss3.add_member(:base_score, Shapes::ShapeRef.new(shape: Cvss3BaseScore, location_name: "baseScore"))
688
+ Cvss3.add_member(:scoring_vector, Shapes::ShapeRef.new(shape: Cvss3ScoringVector, location_name: "scoringVector"))
689
+ Cvss3.struct_class = Types::Cvss3
690
+
632
691
  CvssScore.add_member(:base_score, Shapes::ShapeRef.new(shape: Double, required: true, location_name: "baseScore"))
633
692
  CvssScore.add_member(:scoring_vector, Shapes::ShapeRef.new(shape: NonEmptyString, required: true, location_name: "scoringVector"))
634
693
  CvssScore.add_member(:source, Shapes::ShapeRef.new(shape: NonEmptyString, required: true, location_name: "source"))
@@ -651,6 +710,8 @@ module Aws::Inspector2
651
710
 
652
711
  CvssScoreList.member = Shapes::ShapeRef.new(shape: CvssScore)
653
712
 
713
+ Cwes.member = Shapes::ShapeRef.new(shape: Cwe)
714
+
654
715
  DateFilter.add_member(:end_inclusive, Shapes::ShapeRef.new(shape: Timestamp, location_name: "endInclusive"))
655
716
  DateFilter.add_member(:start_inclusive, Shapes::ShapeRef.new(shape: Timestamp, location_name: "startInclusive"))
656
717
  DateFilter.struct_class = Types::DateFilter
@@ -684,6 +745,8 @@ module Aws::Inspector2
684
745
  Destination.add_member(:kms_key_arn, Shapes::ShapeRef.new(shape: String, required: true, location_name: "kmsKeyArn"))
685
746
  Destination.struct_class = Types::Destination
686
747
 
748
+ DetectionPlatforms.member = Shapes::ShapeRef.new(shape: NonEmptyString)
749
+
687
750
  DisableDelegatedAdminAccountRequest.add_member(:delegated_admin_account_id, Shapes::ShapeRef.new(shape: AccountId, required: true, location_name: "delegatedAdminAccountId"))
688
751
  DisableDelegatedAdminAccountRequest.struct_class = Types::DisableDelegatedAdminAccountRequest
689
752
 
@@ -764,6 +827,13 @@ module Aws::Inspector2
764
827
  EnableResponse.add_member(:failed_accounts, Shapes::ShapeRef.new(shape: FailedAccountList, location_name: "failedAccounts"))
765
828
  EnableResponse.struct_class = Types::EnableResponse
766
829
 
830
+ Epss.add_member(:score, Shapes::ShapeRef.new(shape: EpssScore, location_name: "score"))
831
+ Epss.struct_class = Types::Epss
832
+
833
+ ExploitObserved.add_member(:first_seen, Shapes::ShapeRef.new(shape: FirstSeen, location_name: "firstSeen"))
834
+ ExploitObserved.add_member(:last_seen, Shapes::ShapeRef.new(shape: LastSeen, location_name: "lastSeen"))
835
+ ExploitObserved.struct_class = Types::ExploitObserved
836
+
767
837
  ExploitabilityDetails.add_member(:last_known_exploit_at, Shapes::ShapeRef.new(shape: DateTimeTimestamp, location_name: "lastKnownExploitAt"))
768
838
  ExploitabilityDetails.struct_class = Types::ExploitabilityDetails
769
839
 
@@ -1192,6 +1262,8 @@ module Aws::Inspector2
1192
1262
  Recommendation.add_member(:text, Shapes::ShapeRef.new(shape: NonEmptyString, location_name: "text"))
1193
1263
  Recommendation.struct_class = Types::Recommendation
1194
1264
 
1265
+ RelatedVulnerabilities.member = Shapes::ShapeRef.new(shape: RelatedVulnerability)
1266
+
1195
1267
  Remediation.add_member(:recommendation, Shapes::ShapeRef.new(shape: Recommendation, location_name: "recommendation"))
1196
1268
  Remediation.struct_class = Types::Remediation
1197
1269
 
@@ -1244,6 +1316,17 @@ module Aws::Inspector2
1244
1316
  ScanStatus.add_member(:status_code, Shapes::ShapeRef.new(shape: ScanStatusCode, required: true, location_name: "statusCode"))
1245
1317
  ScanStatus.struct_class = Types::ScanStatus
1246
1318
 
1319
+ SearchVulnerabilitiesFilterCriteria.add_member(:vulnerability_ids, Shapes::ShapeRef.new(shape: VulnIdList, required: true, location_name: "vulnerabilityIds"))
1320
+ SearchVulnerabilitiesFilterCriteria.struct_class = Types::SearchVulnerabilitiesFilterCriteria
1321
+
1322
+ SearchVulnerabilitiesRequest.add_member(:filter_criteria, Shapes::ShapeRef.new(shape: SearchVulnerabilitiesFilterCriteria, required: true, location_name: "filterCriteria"))
1323
+ SearchVulnerabilitiesRequest.add_member(:next_token, Shapes::ShapeRef.new(shape: NextToken, location_name: "nextToken"))
1324
+ SearchVulnerabilitiesRequest.struct_class = Types::SearchVulnerabilitiesRequest
1325
+
1326
+ SearchVulnerabilitiesResponse.add_member(:next_token, Shapes::ShapeRef.new(shape: NextToken, location_name: "nextToken"))
1327
+ SearchVulnerabilitiesResponse.add_member(:vulnerabilities, Shapes::ShapeRef.new(shape: Vulnerabilities, required: true, location_name: "vulnerabilities"))
1328
+ SearchVulnerabilitiesResponse.struct_class = Types::SearchVulnerabilitiesResponse
1329
+
1247
1330
  SecurityGroupIdList.member = Shapes::ShapeRef.new(shape: SecurityGroupId)
1248
1331
 
1249
1332
  ServiceQuotaExceededException.add_member(:message, Shapes::ShapeRef.new(shape: String, required: true, location_name: "message"))
@@ -1294,6 +1377,8 @@ module Aws::Inspector2
1294
1377
 
1295
1378
  TagResourceResponse.struct_class = Types::TagResourceResponse
1296
1379
 
1380
+ Targets.member = Shapes::ShapeRef.new(shape: Target)
1381
+
1297
1382
  ThrottlingException.add_member(:message, Shapes::ShapeRef.new(shape: String, required: true, location_name: "message"))
1298
1383
  ThrottlingException.add_member(:retry_after_seconds, Shapes::ShapeRef.new(shape: Integer, location: "header", location_name: "Retry-After"))
1299
1384
  ThrottlingException.struct_class = Types::ThrottlingException
@@ -1311,6 +1396,8 @@ module Aws::Inspector2
1311
1396
  TitleAggregationResponse.add_member(:vulnerability_id, Shapes::ShapeRef.new(shape: String, location_name: "vulnerabilityId"))
1312
1397
  TitleAggregationResponse.struct_class = Types::TitleAggregationResponse
1313
1398
 
1399
+ Ttps.member = Shapes::ShapeRef.new(shape: Ttp)
1400
+
1314
1401
  UntagResourceRequest.add_member(:resource_arn, Shapes::ShapeRef.new(shape: Arn, required: true, location: "uri", location_name: "resourceArn"))
1315
1402
  UntagResourceRequest.add_member(:tag_keys, Shapes::ShapeRef.new(shape: TagKeyList, required: true, location: "querystring", location_name: "tagKeys"))
1316
1403
  UntagResourceRequest.struct_class = Types::UntagResourceRequest
@@ -1381,8 +1468,33 @@ module Aws::Inspector2
1381
1468
 
1382
1469
  ValidationExceptionFields.member = Shapes::ShapeRef.new(shape: ValidationExceptionField)
1383
1470
 
1471
+ VulnIdList.member = Shapes::ShapeRef.new(shape: VulnId)
1472
+
1473
+ Vulnerabilities.member = Shapes::ShapeRef.new(shape: Vulnerability)
1474
+
1475
+ Vulnerability.add_member(:atig_data, Shapes::ShapeRef.new(shape: AtigData, location_name: "atigData"))
1476
+ Vulnerability.add_member(:cisa_data, Shapes::ShapeRef.new(shape: CisaData, location_name: "cisaData"))
1477
+ Vulnerability.add_member(:cvss2, Shapes::ShapeRef.new(shape: Cvss2, location_name: "cvss2"))
1478
+ Vulnerability.add_member(:cvss3, Shapes::ShapeRef.new(shape: Cvss3, location_name: "cvss3"))
1479
+ Vulnerability.add_member(:cwes, Shapes::ShapeRef.new(shape: Cwes, location_name: "cwes"))
1480
+ Vulnerability.add_member(:description, Shapes::ShapeRef.new(shape: VulnerabilityDescription, location_name: "description"))
1481
+ Vulnerability.add_member(:detection_platforms, Shapes::ShapeRef.new(shape: DetectionPlatforms, location_name: "detectionPlatforms"))
1482
+ Vulnerability.add_member(:epss, Shapes::ShapeRef.new(shape: Epss, location_name: "epss"))
1483
+ Vulnerability.add_member(:exploit_observed, Shapes::ShapeRef.new(shape: ExploitObserved, location_name: "exploitObserved"))
1484
+ Vulnerability.add_member(:id, Shapes::ShapeRef.new(shape: NonEmptyString, required: true, location_name: "id"))
1485
+ Vulnerability.add_member(:reference_urls, Shapes::ShapeRef.new(shape: VulnerabilityReferenceUrls, location_name: "referenceUrls"))
1486
+ Vulnerability.add_member(:related_vulnerabilities, Shapes::ShapeRef.new(shape: RelatedVulnerabilities, location_name: "relatedVulnerabilities"))
1487
+ Vulnerability.add_member(:source, Shapes::ShapeRef.new(shape: VulnerabilitySource, location_name: "source"))
1488
+ Vulnerability.add_member(:source_url, Shapes::ShapeRef.new(shape: VulnerabilitySourceUrl, location_name: "sourceUrl"))
1489
+ Vulnerability.add_member(:vendor_created_at, Shapes::ShapeRef.new(shape: VendorCreatedAt, location_name: "vendorCreatedAt"))
1490
+ Vulnerability.add_member(:vendor_severity, Shapes::ShapeRef.new(shape: VendorSeverity, location_name: "vendorSeverity"))
1491
+ Vulnerability.add_member(:vendor_updated_at, Shapes::ShapeRef.new(shape: VendorUpdatedAt, location_name: "vendorUpdatedAt"))
1492
+ Vulnerability.struct_class = Types::Vulnerability
1493
+
1384
1494
  VulnerabilityIdList.member = Shapes::ShapeRef.new(shape: VulnerabilityId)
1385
1495
 
1496
+ VulnerabilityReferenceUrls.member = Shapes::ShapeRef.new(shape: VulnerabilityReferenceUrl)
1497
+
1386
1498
  VulnerablePackage.add_member(:arch, Shapes::ShapeRef.new(shape: PackageArchitecture, location_name: "arch"))
1387
1499
  VulnerablePackage.add_member(:epoch, Shapes::ShapeRef.new(shape: PackageEpoch, location_name: "epoch"))
1388
1500
  VulnerablePackage.add_member(:file_path, Shapes::ShapeRef.new(shape: FilePath, location_name: "filePath"))
@@ -1840,6 +1952,23 @@ module Aws::Inspector2
1840
1952
  )
1841
1953
  end)
1842
1954
 
1955
+ api.add_operation(:search_vulnerabilities, Seahorse::Model::Operation.new.tap do |o|
1956
+ o.name = "SearchVulnerabilities"
1957
+ o.http_method = "POST"
1958
+ o.http_request_uri = "/vulnerabilities/search"
1959
+ o.input = Shapes::ShapeRef.new(shape: SearchVulnerabilitiesRequest)
1960
+ o.output = Shapes::ShapeRef.new(shape: SearchVulnerabilitiesResponse)
1961
+ o.errors << Shapes::ShapeRef.new(shape: ValidationException)
1962
+ o.errors << Shapes::ShapeRef.new(shape: AccessDeniedException)
1963
+ o.errors << Shapes::ShapeRef.new(shape: ThrottlingException)
1964
+ o.errors << Shapes::ShapeRef.new(shape: InternalServerException)
1965
+ o[:pager] = Aws::Pager.new(
1966
+ tokens: {
1967
+ "next_token" => "next_token"
1968
+ }
1969
+ )
1970
+ end)
1971
+
1843
1972
  api.add_operation(:tag_resource, Seahorse::Model::Operation.new.tap do |o|
1844
1973
  o.name = "TagResource"
1845
1974
  o.http_method = "POST"
@@ -431,6 +431,20 @@ module Aws::Inspector2
431
431
  end
432
432
  end
433
433
 
434
+ class SearchVulnerabilities
435
+ def self.build(context)
436
+ unless context.config.regional_endpoint
437
+ endpoint = context.config.endpoint.to_s
438
+ end
439
+ Aws::Inspector2::EndpointParameters.new(
440
+ region: context.config.region,
441
+ use_dual_stack: context.config.use_dualstack_endpoint,
442
+ use_fips: context.config.use_fips_endpoint,
443
+ endpoint: endpoint,
444
+ )
445
+ end
446
+ end
447
+
434
448
  class TagResource
435
449
  def self.build(context)
436
450
  unless context.config.regional_endpoint
@@ -116,6 +116,8 @@ module Aws::Inspector2
116
116
  Aws::Inspector2::Endpoints::ListTagsForResource.build(context)
117
117
  when :list_usage_totals
118
118
  Aws::Inspector2::Endpoints::ListUsageTotals.build(context)
119
+ when :search_vulnerabilities
120
+ Aws::Inspector2::Endpoints::SearchVulnerabilities.build(context)
119
121
  when :tag_resource
120
122
  Aws::Inspector2::Endpoints::TagResource.build(context)
121
123
  when :untag_resource
@@ -384,6 +384,41 @@ module Aws::Inspector2
384
384
  include Aws::Structure
385
385
  end
386
386
 
387
+ # The Amazon Web Services Threat Intel Group (ATIG) details for a
388
+ # specific vulnerability.
389
+ #
390
+ # @!attribute [rw] first_seen
391
+ # The date and time this vulnerability was first observed.
392
+ # @return [Time]
393
+ #
394
+ # @!attribute [rw] last_seen
395
+ # The date and time this vulnerability was last observed.
396
+ # @return [Time]
397
+ #
398
+ # @!attribute [rw] targets
399
+ # The commercial sectors this vulnerability targets.
400
+ # @return [Array<String>]
401
+ #
402
+ # @!attribute [rw] ttps
403
+ # The [MITRE ATT&amp;CK][1] tactics, techniques, and procedures (TTPs)
404
+ # associated with vulnerability.
405
+ #
406
+ #
407
+ #
408
+ # [1]: https://attack.mitre.org/
409
+ # @return [Array<String>]
410
+ #
411
+ # @see http://docs.aws.amazon.com/goto/WebAPI/inspector2-2020-06-08/AtigData AWS API Documentation
412
+ #
413
+ class AtigData < Struct.new(
414
+ :first_seen,
415
+ :last_seen,
416
+ :targets,
417
+ :ttps)
418
+ SENSITIVE = []
419
+ include Aws::Structure
420
+ end
421
+
387
422
  # Represents which scan types are automatically enabled for new members
388
423
  # of your Amazon Inspector organization.
389
424
  #
@@ -850,6 +885,32 @@ module Aws::Inspector2
850
885
  include Aws::Structure
851
886
  end
852
887
 
888
+ # The Cybersecurity and Infrastructure Security Agency (CISA) details
889
+ # for a specific vulnerability.
890
+ #
891
+ # @!attribute [rw] action
892
+ # The remediation action recommended by CISA for this vulnerability.
893
+ # @return [String]
894
+ #
895
+ # @!attribute [rw] date_added
896
+ # The date and time CISA added this vulnerability to their catalogue.
897
+ # @return [Time]
898
+ #
899
+ # @!attribute [rw] date_due
900
+ # The date and time CISA expects a fix to have been provided
901
+ # vulnerability.
902
+ # @return [Time]
903
+ #
904
+ # @see http://docs.aws.amazon.com/goto/WebAPI/inspector2-2020-06-08/CisaData AWS API Documentation
905
+ #
906
+ class CisaData < Struct.new(
907
+ :action,
908
+ :date_added,
909
+ :date_due)
910
+ SENSITIVE = []
911
+ include Aws::Structure
912
+ end
913
+
853
914
  # A conflict occurred.
854
915
  #
855
916
  # @!attribute [rw] message
@@ -1140,6 +1201,46 @@ module Aws::Inspector2
1140
1201
  include Aws::Structure
1141
1202
  end
1142
1203
 
1204
+ # The Common Vulnerability Scoring System (CVSS) version 2 details for
1205
+ # the vulnerability.
1206
+ #
1207
+ # @!attribute [rw] base_score
1208
+ # The CVSS v2 base score for the vulnerability.
1209
+ # @return [Float]
1210
+ #
1211
+ # @!attribute [rw] scoring_vector
1212
+ # The scoring vector associated with the CVSS v2 score.
1213
+ # @return [String]
1214
+ #
1215
+ # @see http://docs.aws.amazon.com/goto/WebAPI/inspector2-2020-06-08/Cvss2 AWS API Documentation
1216
+ #
1217
+ class Cvss2 < Struct.new(
1218
+ :base_score,
1219
+ :scoring_vector)
1220
+ SENSITIVE = []
1221
+ include Aws::Structure
1222
+ end
1223
+
1224
+ # The Common Vulnerability Scoring System (CVSS) version 3 details for
1225
+ # the vulnerability.
1226
+ #
1227
+ # @!attribute [rw] base_score
1228
+ # The CVSS v3 base score for the vulnerability.
1229
+ # @return [Float]
1230
+ #
1231
+ # @!attribute [rw] scoring_vector
1232
+ # The scoring vector associated with the CVSS v3 score.
1233
+ # @return [String]
1234
+ #
1235
+ # @see http://docs.aws.amazon.com/goto/WebAPI/inspector2-2020-06-08/Cvss3 AWS API Documentation
1236
+ #
1237
+ class Cvss3 < Struct.new(
1238
+ :base_score,
1239
+ :scoring_vector)
1240
+ SENSITIVE = []
1241
+ include Aws::Structure
1242
+ end
1243
+
1143
1244
  # The CVSS score for a finding.
1144
1245
  #
1145
1246
  # @!attribute [rw] base_score
@@ -1743,6 +1844,39 @@ module Aws::Inspector2
1743
1844
  include Aws::Structure
1744
1845
  end
1745
1846
 
1847
+ # Details about the Exploit Prediction Scoring System (EPSS) score.
1848
+ #
1849
+ # @!attribute [rw] score
1850
+ # The Exploit Prediction Scoring System (EPSS) score.
1851
+ # @return [Float]
1852
+ #
1853
+ # @see http://docs.aws.amazon.com/goto/WebAPI/inspector2-2020-06-08/Epss AWS API Documentation
1854
+ #
1855
+ class Epss < Struct.new(
1856
+ :score)
1857
+ SENSITIVE = []
1858
+ include Aws::Structure
1859
+ end
1860
+
1861
+ # Contains information on when this exploit was observed.
1862
+ #
1863
+ # @!attribute [rw] first_seen
1864
+ # The date an time when the exploit was first seen.
1865
+ # @return [Time]
1866
+ #
1867
+ # @!attribute [rw] last_seen
1868
+ # The date an time when the exploit was last seen.
1869
+ # @return [Time]
1870
+ #
1871
+ # @see http://docs.aws.amazon.com/goto/WebAPI/inspector2-2020-06-08/ExploitObserved AWS API Documentation
1872
+ #
1873
+ class ExploitObserved < Struct.new(
1874
+ :first_seen,
1875
+ :last_seen)
1876
+ SENSITIVE = []
1877
+ include Aws::Structure
1878
+ end
1879
+
1746
1880
  # The details of an exploit available for a finding discovered in your
1747
1881
  # environment.
1748
1882
  #
@@ -3960,6 +4094,60 @@ module Aws::Inspector2
3960
4094
  include Aws::Structure
3961
4095
  end
3962
4096
 
4097
+ # Details on the criteria used to define the filter for a vulnerability
4098
+ # search.
4099
+ #
4100
+ # @!attribute [rw] vulnerability_ids
4101
+ # The IDs for specific vulnerabilities.
4102
+ # @return [Array<String>]
4103
+ #
4104
+ # @see http://docs.aws.amazon.com/goto/WebAPI/inspector2-2020-06-08/SearchVulnerabilitiesFilterCriteria AWS API Documentation
4105
+ #
4106
+ class SearchVulnerabilitiesFilterCriteria < Struct.new(
4107
+ :vulnerability_ids)
4108
+ SENSITIVE = []
4109
+ include Aws::Structure
4110
+ end
4111
+
4112
+ # @!attribute [rw] filter_criteria
4113
+ # The criteria used to filter the results of a vulnerability search.
4114
+ # @return [Types::SearchVulnerabilitiesFilterCriteria]
4115
+ #
4116
+ # @!attribute [rw] next_token
4117
+ # A token to use for paginating results that are returned in the
4118
+ # response. Set the value of this parameter to null for the first
4119
+ # request to a list action. For subsequent calls, use the `NextToken`
4120
+ # value returned from the previous request to continue listing results
4121
+ # after the first page.
4122
+ # @return [String]
4123
+ #
4124
+ # @see http://docs.aws.amazon.com/goto/WebAPI/inspector2-2020-06-08/SearchVulnerabilitiesRequest AWS API Documentation
4125
+ #
4126
+ class SearchVulnerabilitiesRequest < Struct.new(
4127
+ :filter_criteria,
4128
+ :next_token)
4129
+ SENSITIVE = []
4130
+ include Aws::Structure
4131
+ end
4132
+
4133
+ # @!attribute [rw] next_token
4134
+ # The pagination parameter to be used on the next list operation to
4135
+ # retrieve more items.
4136
+ # @return [String]
4137
+ #
4138
+ # @!attribute [rw] vulnerabilities
4139
+ # Details about the listed vulnerability.
4140
+ # @return [Array<Types::Vulnerability>]
4141
+ #
4142
+ # @see http://docs.aws.amazon.com/goto/WebAPI/inspector2-2020-06-08/SearchVulnerabilitiesResponse AWS API Documentation
4143
+ #
4144
+ class SearchVulnerabilitiesResponse < Struct.new(
4145
+ :next_token,
4146
+ :vulnerabilities)
4147
+ SENSITIVE = []
4148
+ include Aws::Structure
4149
+ end
4150
+
3963
4151
  # You have exceeded your service quota. To perform the requested action,
3964
4152
  # remove some of the relevant resources, or use Service Quotas to
3965
4153
  # request a service quota increase.
@@ -4476,6 +4664,108 @@ module Aws::Inspector2
4476
4664
  include Aws::Structure
4477
4665
  end
4478
4666
 
4667
+ # Contains details about a specific vulnerability Amazon Inspector can
4668
+ # detect.
4669
+ #
4670
+ # @!attribute [rw] atig_data
4671
+ # An object that contains information about the Amazon Web Services
4672
+ # Threat Intel Group (ATIG) details for the vulnerability.
4673
+ # @return [Types::AtigData]
4674
+ #
4675
+ # @!attribute [rw] cisa_data
4676
+ # An object that contains the Cybersecurity and Infrastructure
4677
+ # Security Agency (CISA) details for the vulnerability.
4678
+ # @return [Types::CisaData]
4679
+ #
4680
+ # @!attribute [rw] cvss2
4681
+ # An object that contains the Common Vulnerability Scoring System
4682
+ # (CVSS) Version 2 details for the vulnerability.
4683
+ # @return [Types::Cvss2]
4684
+ #
4685
+ # @!attribute [rw] cvss3
4686
+ # An object that contains the Common Vulnerability Scoring System
4687
+ # (CVSS) Version 3 details for the vulnerability.
4688
+ # @return [Types::Cvss3]
4689
+ #
4690
+ # @!attribute [rw] cwes
4691
+ # The Common Weakness Enumeration (CWE) associated with the
4692
+ # vulnerability.
4693
+ # @return [Array<String>]
4694
+ #
4695
+ # @!attribute [rw] description
4696
+ # A description of the vulnerability.
4697
+ # @return [String]
4698
+ #
4699
+ # @!attribute [rw] detection_platforms
4700
+ # Platforms that the vulnerability can be detected on.
4701
+ # @return [Array<String>]
4702
+ #
4703
+ # @!attribute [rw] epss
4704
+ # An object that contains the Exploit Prediction Scoring System (EPSS)
4705
+ # score.
4706
+ # @return [Types::Epss]
4707
+ #
4708
+ # @!attribute [rw] exploit_observed
4709
+ # An object that contains details on when the exploit was observed.
4710
+ # @return [Types::ExploitObserved]
4711
+ #
4712
+ # @!attribute [rw] id
4713
+ # The ID for the specific vulnerability.
4714
+ # @return [String]
4715
+ #
4716
+ # @!attribute [rw] reference_urls
4717
+ # Links to various resources with more information on this
4718
+ # vulnerability.
4719
+ # @return [Array<String>]
4720
+ #
4721
+ # @!attribute [rw] related_vulnerabilities
4722
+ # A list of related vulnerabilities.
4723
+ # @return [Array<String>]
4724
+ #
4725
+ # @!attribute [rw] source
4726
+ # The source of the vulnerability information.
4727
+ # @return [String]
4728
+ #
4729
+ # @!attribute [rw] source_url
4730
+ # A link to the official source material for this vulnerability.
4731
+ # @return [String]
4732
+ #
4733
+ # @!attribute [rw] vendor_created_at
4734
+ # The date and time when the vendor created this vulnerability.
4735
+ # @return [Time]
4736
+ #
4737
+ # @!attribute [rw] vendor_severity
4738
+ # The severity assigned by the vendor.
4739
+ # @return [String]
4740
+ #
4741
+ # @!attribute [rw] vendor_updated_at
4742
+ # The date and time when the vendor last updated this vulnerability.
4743
+ # @return [Time]
4744
+ #
4745
+ # @see http://docs.aws.amazon.com/goto/WebAPI/inspector2-2020-06-08/Vulnerability AWS API Documentation
4746
+ #
4747
+ class Vulnerability < Struct.new(
4748
+ :atig_data,
4749
+ :cisa_data,
4750
+ :cvss2,
4751
+ :cvss3,
4752
+ :cwes,
4753
+ :description,
4754
+ :detection_platforms,
4755
+ :epss,
4756
+ :exploit_observed,
4757
+ :id,
4758
+ :reference_urls,
4759
+ :related_vulnerabilities,
4760
+ :source,
4761
+ :source_url,
4762
+ :vendor_created_at,
4763
+ :vendor_severity,
4764
+ :vendor_updated_at)
4765
+ SENSITIVE = []
4766
+ include Aws::Structure
4767
+ end
4768
+
4479
4769
  # Information on the vulnerable package identified by a finding.
4480
4770
  #
4481
4771
  # @!attribute [rw] arch
@@ -52,6 +52,6 @@ require_relative 'aws-sdk-inspector2/customizations'
52
52
  # @!group service
53
53
  module Aws::Inspector2
54
54
 
55
- GEM_VERSION = '1.11.0'
55
+ GEM_VERSION = '1.12.0'
56
56
 
57
57
  end
metadata CHANGED
@@ -1,14 +1,14 @@
1
1
  --- !ruby/object:Gem::Specification
2
2
  name: aws-sdk-inspector2
3
3
  version: !ruby/object:Gem::Version
4
- version: 1.11.0
4
+ version: 1.12.0
5
5
  platform: ruby
6
6
  authors:
7
7
  - Amazon Web Services
8
8
  autorequire:
9
9
  bindir: bin
10
10
  cert_chain: []
11
- date: 2023-05-03 00:00:00.000000000 Z
11
+ date: 2023-05-05 00:00:00.000000000 Z
12
12
  dependencies:
13
13
  - !ruby/object:Gem::Dependency
14
14
  name: aws-sdk-core