@maxim_mazurok/gapi.client.securitycenter-v1beta2 0.0.20240130 → 0.0.20240210
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/index.d.ts +9 -1
- package/package.json +1 -1
package/index.d.ts
CHANGED
|
@@ -9,7 +9,7 @@
|
|
|
9
9
|
// This file was generated by https://github.com/Maxim-Mazurok/google-api-typings-generator. Please do not edit it manually.
|
|
10
10
|
// In case of any problems please post issue to https://github.com/Maxim-Mazurok/google-api-typings-generator
|
|
11
11
|
// Generated from: https://securitycenter.googleapis.com/$discovery/rest?version=v1beta2
|
|
12
|
-
// Revision:
|
|
12
|
+
// Revision: 20240210
|
|
13
13
|
|
|
14
14
|
/// <reference types="gapi.client" />
|
|
15
15
|
|
|
@@ -199,12 +199,20 @@ declare namespace gapi.client {
|
|
|
199
199
|
interface Cve {
|
|
200
200
|
/** Describe Common Vulnerability Scoring System specified at https://www.first.org/cvss/v3.1/specification-document */
|
|
201
201
|
cvssv3?: Cvssv3;
|
|
202
|
+
/** The exploitation activity of the vulnerability in the wild. */
|
|
203
|
+
exploitationActivity?: string;
|
|
202
204
|
/** The unique identifier for the vulnerability. e.g. CVE-2021-34527 */
|
|
203
205
|
id?: string;
|
|
206
|
+
/** The potential impact of the vulnerability if it was to be exploited. */
|
|
207
|
+
impact?: string;
|
|
208
|
+
/** Whether or not the vulnerability has been observed in the wild. */
|
|
209
|
+
observedInTheWild?: boolean;
|
|
204
210
|
/** Additional information about the CVE. e.g. https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-34527 */
|
|
205
211
|
references?: Reference[];
|
|
206
212
|
/** Whether upstream fix is available for the CVE. */
|
|
207
213
|
upstreamFixAvailable?: boolean;
|
|
214
|
+
/** Whether or not the vulnerability was zero day when the finding was published. */
|
|
215
|
+
zeroDay?: boolean;
|
|
208
216
|
}
|
|
209
217
|
interface Cvssv3 {
|
|
210
218
|
/** This metric describes the conditions beyond the attacker's control that must exist in order to exploit the vulnerability. */
|