Vulnerability Indicates weakness or flaw in the system that can be exploited by an attacker to gain unauthorized access or cause harm to the system. Vulnerabilities can exist in various components of the system, such as the operating system, applications, network devices, and databases.
Property | Type | Description | Required? |
---|---|---|---|
description | MarkdownString | Various sources of vulnerability information can be used, including third-party resources like the National Vulnerability Database (NVD) and the Common Vulnerabilities and Exposures (CVE) database. The platform then analyzes this data and provides the user with relevant details such as the severity of the vulnerability, the affected systems, and remediation recommendations. Based on this information, the user can prioritize patching and other mitigation strategies to reduce the risk of potential attacks. | ✓ |
id | String | Globally unique URI identifying this object. | ✓ |
schema_version | String | CTIM schema version for this entity. | ✓ |
type | VulnerabilityTypeIdentifierString | The fixed value vulnerability | ✓ |
configurations | Configurations Object | Represents a list of affected versions or configurations of a software component that is impacted by a vulnerability. By tracking the affected software components and versions, defenders can identify which systems are potentially exposed to an attack, and apply appropriate mitigations. | |
cve | CVE Object | ||
external_ids | String List | It is used to store a list of external identifiers that can be linked to the incident, providing a reliable and manageable way to correlate and group related events across multiple data sources. It is especially useful in larger organizations that rely on multiple security information and event management (SIEM) systems to detect security incidents. For instance, it can be used to track events across different network sensors, intrusion detection and prevention systems (IDPS), or log management platforms. The field can also be used to facilitate automation and orchestration workflows, where additional information can be shared among incident management systems. It can be used to cross-reference with other external tools such as threat intelligence feeds and vulnerability scanners. | |
external_references | ExternalReference Object List | Specifies a list of external references which refers to non-CTIM information. Similar to external_ids field with major differences: - external_ids field is used to store a list of external identifiers that can be used to link entities across different data sources. These identifiers are typically standardized and well-known, such as CVE IDs, US-CERT advisories, or other industry-standard threat intelligence feeds. The external_ids field can be used to facilitate automation and orchestration workflows, where additional information can be shared among incident management systems. - external_references field, on the other hand, is used to provide a more general mechanism for linking entities to external sources of information. The external_references field can include references to blog posts, articles, external documents, threat intelligence reports, and other sources of information that may not have a standardized format or identifier. | |
impact | VulnerabilityImpact Object | Describes the potential impact of a vulnerability that is being tracked in the system. Provides information on the extent of damage that a vulnerability can cause and how serious the consequences could be if it is exploited. May contain granular information about the vulnerability severity using the CVSS system, versions 2 and 3. CVSSv2 and CVSSv3 have different methods of calculating base scores, but both are designed to provide an indication of the level of risk that a vulnerability poses. The base score ranges from 0 to 10, with 10 being the most severe. Additionally, both CVSSv2 and CVSSv3 define severity levels, such as low, medium, high, and critical, based on the base score. | |
language | ShortStringString | The language field is used to specify the primary language of the affected system or the target of an attack. It can be used to provide additional context and information about the entity. The primary purpose of this field is to help analysts filter and prioritize entities based on their knowledge and expertise of different languages. For example, if an incident involves an attack on a system in a country where a specific language is predominant, the language field can be used to indicate that language, which can help analysts to quickly identify and respond to incidents that may be geographically or culturally relevant. This information can be used to prioritize incidents based on their potential impact. The language field can also be used to help with correlation of incidents across different systems and regions, as well as to help with data analysis and reporting. | |
last_modified_date | Inst (Date) | Represents the date when the vulnerability metadata was last updated in the internal database. It can be used to track the freshness of the vulnerability information. If the last_modified_date is more recent than the published_date , it can indicate that there has been some new information or updates related to the vulnerability, such as new patch releases or changes in the severity or impact rating. | |
published_date | Inst (Date) | Represents the date when a vulnerability was publicly disclosed or made available to the general public. Important for tracking the age of a vulnerability, as well as for determining when a particular vulnerability was first introduced into a system. The published date can be used to identify the time window during which a system may have been vulnerable to a particular exploit. For example, if an organization discovers that a vulnerability was published before their system's installation date, but they did not apply the necessary security updates in a timely manner, it can be concluded that their system was vulnerable for the period between the installation date and the date when the necessary security updates were applied. | |
revision | Integer | A monotonically increasing revision, incremented each time the object is changed. | |
short_description | MedStringString | A single line, short summary of the object. | |
source | MedStringString | Represents the source of the intelligence that led to the creation of the entity. | |
source_uri | String | URI of the source of the intelligence that led to the creation of the entity. | |
timestamp | Inst (Date) | The time this object was created at, or last modified. | |
title | ShortStringString | A short title for this object, used as primary display and reference value. | |
tlp | TLPString | TLP stands for Traffic Light Protocol, which indicates precisely how a resource is intended to be shared, replicated, copied, etc. It is used to indicate the sensitivity of the information contained within the message. This allows recipients to determine the appropriate handling and dissemination of the information based on their clearance level and need-to-know. For example, an entity containing information about a critical vulnerability in a widely-used software might be marked as red , indicating that it should only be shared with a small group of highly trusted individuals who need to know in order to take appropriate action. On the other hand, a message containing more general information about security threats might be marked as amber or green , indicating that it can be shared more broadly within an organization. |
Represents a list of affected versions or configurations of a software component that is impacted by a vulnerability. By tracking the affected software components and versions, defenders can identify which systems are potentially exposed to an attack, and apply appropriate mitigations.
Various sources of vulnerability information can be used, including third-party resources like the National Vulnerability Database (NVD) and the Common Vulnerabilities and Exposures (CVE) database. The platform then analyzes this data and provides the user with relevant details such as the severity of the vulnerability, the affected systems, and remediation recommendations.
Based on this information, the user can prioritize patching and other mitigation strategies to reduce the risk of potential attacks.
This entry is required
It is used to store a list of external identifiers that can be linked to the incident, providing a reliable and manageable way to correlate and group related events across multiple data sources. It is especially useful in larger organizations that rely on multiple security information and event management (SIEM) systems to detect security incidents. For instance, it can be used to track events across different network sensors, intrusion detection and prevention systems (IDPS), or log management platforms. The field can also be used to facilitate automation and orchestration workflows, where additional information can be shared among incident management systems. It can be used to cross-reference with other external tools such as threat intelligence feeds and vulnerability scanners.
Specifies a list of external references which refers to non-CTIM information.
Similar to external_ids
field with major differences:
external_ids
field is used to store a list of external identifiers that can be used to link entities across different data sources. These identifiers are typically standardized and well-known, such as CVE IDs, US-CERT advisories, or other industry-standard threat intelligence feeds. The external_ids
field can be used to facilitate automation and orchestration workflows, where additional information can be shared among incident management systems.
external_references
field, on the other hand, is used to provide a more general mechanism for linking entities to external sources of information. The external_references
field can include references to blog posts, articles, external documents, threat intelligence reports, and other sources of information that may not have a standardized format or identifier.
Globally unique URI identifying this object.
This entry is required
https://www.domain.com/ctia/judgement/judgement-de305d54-75b4-431b-adb2-eb6b9e546014
for a Judgement. This ID type compares to the STIX id field. The optional STIX idref field is not used.Describes the potential impact of a vulnerability that is being tracked in the system. Provides information on the extent of damage that a vulnerability can cause and how serious the consequences could be if it is exploited.
May contain granular information about the vulnerability severity using the CVSS system, versions 2 and 3.
CVSSv2 and CVSSv3 have different methods of calculating base scores, but both are designed to provide an indication of the level of risk that a vulnerability poses. The base score ranges from 0 to 10, with 10 being the most severe. Additionally, both CVSSv2 and CVSSv3 define severity levels, such as low, medium, high, and critical, based on the base score.
The language
field is used to specify the primary language of the affected system or the target of an attack. It can be used to provide additional context and information about the entity. The primary purpose of this field is to help analysts filter and prioritize entities based on their knowledge and expertise of different languages.
For example, if an incident involves an attack on a system in a country where a specific language is predominant, the language
field can be used to indicate that language, which can help analysts to quickly identify and respond to incidents that may be geographically or culturally relevant. This information can be used to prioritize incidents based on their potential impact. The language
field can also be used to help with correlation of incidents across different systems and regions, as well as to help with data analysis and reporting.
This entry is optional
Represents the date when the vulnerability metadata was last updated in the internal database.
It can be used to track the freshness of the vulnerability information. If the last_modified_date
is more recent than the published_date
, it can indicate that there has been some new information or updates related to the vulnerability, such as new patch releases or changes in the severity or impact rating.
This entry is optional
Represents the date when a vulnerability was publicly disclosed or made available to the general public.
Important for tracking the age of a vulnerability, as well as for determining when a particular vulnerability was first introduced into a system. The published date can be used to identify the time window during which a system may have been vulnerable to a particular exploit.
For example, if an organization discovers that a vulnerability was published before their system's installation date, but they did not apply the necessary security updates in a timely manner, it can be concluded that their system was vulnerable for the period between the installation date and the date when the necessary security updates were applied.
This entry is optional
A monotonically increasing revision, incremented each time the object is changed.
This entry is optional
CTIM schema version for this entity.
This entry is required
A single line, short summary of the object.
This entry is optional
Represents the source of the intelligence that led to the creation of the entity.
This entry is optional
URI of the source of the intelligence that led to the creation of the entity.
This entry is optional
The time this object was created at, or last modified.
This entry is optional
A short title for this object, used as primary display and reference value.
This entry is optional
TLP stands for Traffic Light Protocol, which indicates precisely how a resource is intended to be shared, replicated, copied, etc.
It is used to indicate the sensitivity of the information contained within the message. This allows recipients to determine the appropriate handling and dissemination of the information based on their clearance level and need-to-know.
For example, an entity containing information about a critical vulnerability in a widely-used software might be marked as red
, indicating that it should only be shared with a small group of highly trusted individuals who need to know in order to take appropriate action. On the other hand, a message containing more general information about security threats might be marked as amber
or green
, indicating that it can be shared more broadly within an organization.
This entry is optional
The fixed value vulnerability
This entry is required
ExternalReference External references are used to describe pointers to information represented outside of CTIM. For example, a Malware object could use an external reference to indicate an ID for that malware in an external database or a report could use references to represent source material.
Property | Type | Description | Required? |
---|---|---|---|
source_name | MedStringString | The source within which the external-reference is defined (system, registry, organization, etc.) | ✓ |
description | MarkdownString | ||
external_id | String | An identifier for the external reference content. | |
hashes | String List | Specifies a dictionary of hashes for the contents of the url. | |
url | String | A URL reference to an external resource. |
This entry is optional
An identifier for the external reference content.
Specifies a dictionary of hashes for the contents of the url.
The source within which the external-reference is defined (system, registry, organization, etc.)
This entry is required
A URL reference to an external resource.
This entry is optional
Property | Type | Description | Required? |
---|---|---|---|
cve_data_meta | CVEDataMeta Object | ✓ |
Property | Type | Description | Required? |
---|---|---|---|
assigner | ShortStringString | ||
id | ShortStringString |
This entry is optional
This entry is optional
Property | Type | Description | Required? |
---|---|---|---|
cvss_v2 | CVSSv2 Object | ||
cvss_v3 | CVSSv3 Object |
Property | Type | Description | Required? |
---|---|---|---|
base_score | Number | The base score is a key metric in CVSS, which uses a scoring system to determine the level of severity of a vulnerability. see: https://www.first.org/cvss/v3-1 | ✓ |
base_severity | CVSSv3SeverityString | ✓ | |
vector_string | String | ✓ | |
attack_complexity | CVSSv3AttackComplexityString | describes the conditions beyond the attacker's control that must exist in order to exploit the vulnerability | |
attack_vector | CVSSv3AttackVectorString | Reflects the context by which vulnerability exploitation is possible | |
availability_impact | CVSSv3AvailabilityImpactString | measures the impact to the availability of the impacted component resulting from a successfully exploited vulnerability | |
availability_requirement | CVSSv3SecurityRequirementsString | ||
confidentiality_impact | CVSSv3ConfidentialityImpactString | measures the impact to the confidentiality of the information resources managed by a software component due to a successfully exploited vulnerability | |
confidentiality_requirement | CVSSv3SecurityRequirementsString | ||
environmental_score | Number | ||
environmental_severity | CVSSv3SeverityString | ||
exploit_code_maturity | CVSSv3ExploitCodeMaturityString | measures the likelihood of the vulnerability being attacked | |
exploitability_score | Number | ||
impact_score | Number | ||
integrity_impact | CVSSv3IntegrityImpactString | measures the impact to integrity of a successfully exploited vulnerability | |
integrity_requirement | CVSSv3SecurityRequirementsString | ||
modified_attack_complexity | CVSSv3ModifiedAttackComplexityString | modified attack complexity | |
modified_attack_vector | CVSSv3ModifiedAttackVectorString | modified attack vector | |
modified_availability_impact | CVSSv3ModifiedAvailabilityImpactString | modified availability impact | |
modified_confidentiality_impact | CVSSv3ModifiedConfidentialityImpactString | modified confidentiality impact | |
modified_integrity_impact | CVSSv3ModifiedIntegrityImpactString | modified integrity impact | |
modified_privileges_required | CVSSv3ModifiedPrivilegesRequiredString | modified privileges required | |
modified_scope | CVSSv3ModifiedScopeString | modified scope | |
modified_user_interaction | CVSSv3ModifiedUserInteractionString | modified user interaction | |
privileges_required | CVSSv3PrivilegesRequiredString | describes the level of privileges an attacker must possess before successfully exploiting the vulnerability | |
remediation_level | CVSSv3RemediationLevelString | Remediation Level of a vulnerability is an important factor for prioritization | |
report_confidence | CVSSv3ReportConfidenceString | measures the degree of confidence in the existence of the vulnerability and the credibility of the known technical details | |
scope | CVSSv3ScopeString | the ability for a vulnerability in one software component to impact resources beyond its means, or privileges | |
temporal_score | Number | Round up(CVSSv3BaseScore × CVSSv3ExploitCodeMaturity × CVSSv3RemediationLevel × CVSSv3ReportConfidence) | |
temporal_severity | CVSSv3SeverityString | temporal severity | |
user_interaction | CVSSv3UserInteractionString | captures the requirement for a user, other than the attacker, to participate in the successful compromise of the vulnerable component |
describes the conditions beyond the attacker's control that must exist in order to exploit the vulnerability
This entry is optional
low
Specialized access conditions or extenuating circumstances do not exist. An attacker can expect repeatable success against the vulnerable component. high
A successful attack depends on conditions beyond the attacker's control. That is, a successful attack cannot be accomplished at will, but requires the attacker to invest in some measurable amount of effort in preparation or execution against the vulnerable component before a successful attack can be expected. For example, a successful attack may depend on an attacker overcoming any of the following conditions: - The attacker must conduct target-specific reconnaissance. For example, on target configuration settings, sequence numbers, shared secrets, etc. - The attacker must prepare the target environment to improve exploit reliability. For example, repeated exploitation to win a race condition, or overcoming advanced exploit mitigation techniques. The attacker must inject herself into the logical network path between the target and the resource requested by the victim in order to read and/or modify network communications (e.g. man in the middle attack).Reflects the context by which vulnerability exploitation is possible
This entry is optional
network
A vulnerability exploitable with network access means the vulnerable component is bound to the network stack and the attacker's path is through OSI layer 3 (the network layer). Such a vulnerability is often termed remotely exploitable
and can be thought of as an attack being exploitable one or more network hops away (e.g. across layer 3 boundaries from routers). An example of a network attack is an attacker causing a denial of service (DoS) by sending a specially crafted TCP packet from across the public Internet (e.g. CVE 2004 0230).adjacent_network
A vulnerability exploitable with adjacent network access means the vulnerable component is bound to the network stack, however the attack is limited to the same shared physical (e.g. Bluetooth, IEEE 802.11) or logical (e.g. local IP subnet) network, and cannot be performed across an OSI layer 3 boundary (e.g. a router). An example of an Adjacent attack would be an ARP (IPv4) or neighbor discovery (IPv6) flood leading to a denial of service on the local LAN segment. See also CVE 2013 6014. local
A vulnerability exploitable with Local access means that the vulnerable component is not bound to the network stack, and the attacker's path is via read/write/execute capabilities. In some cases, the attacker may be logged in locally in order to exploit the vulnerability, otherwise, she may rely on User Interaction to execute a malicious file. physical
A vulnerability exploitable with Physical access requires the attacker to physically touch or manipulate the vulnerable component. Physical interaction may be brief (e.g. evil maid attack) or persistent. An example of such an attack is a cold boot attack which allows an attacker to access to disk encryption keys after gaining physical access to the system, or peripheral attacks such as Firewire/USB Direct Memory Access attacks.measures the impact to the availability of the impacted component resulting from a successfully exploited vulnerability
This entry is optional
high
: There is total loss of availability, resulting in the attacker being able to fully deny access to resources in the impacted component; this loss is either sustained (while the attacker continues to deliver the attack) or persistent (the condition persists even after the attack has completed). Alternatively, the attacker has the ability to deny some availability, but the loss of availability presents a direct, serious consequence to the impacted component (e.g., the attacker cannot disrupt existing connections, but can prevent new connections; the attacker can repeatedly exploit a vulnerability that, in each instance of a successful attack, leaks a only small amount of memory, but after repeated exploitation causes a service to become completely unavailable). low
: There is reduced performance or interruptions in resource availability. Even if repeated exploitation of the vulnerability is possible, the attacker does not have the ability to completely deny service to legitimate users. The resources in the impacted component are either partially available all of the time, or fully available only some of the time but overall there is no direct, serious consequence to the impacted component. none
: There is no impact to availability within the impacted component. This metric value increases with the consequence to the impacted component.This entry is optional
not_defined
: Assigning this value to the metric will not influence the score. It is a signal to the equation to skip this metric. high
: Loss of [Confidentiality / Integrity / Availability] is likely to have a catastrophic adverse effect on the organization or individuals associated with the organization (e.g., employees, customers). medium
: Loss of [Confidentiality / Integrity / Availability] is likely to have a serious adverse effect on the organization or individuals associated with the organization (e.g., employees, customers).low
: Loss of [Confidentiality / Integrity / Availability] is likely to have only a limited adverse effect on the organization or individuals associated with the organization (e.g., employees, customers). For brevity, the same table is used for all three metrics. The greater the Security Requirement, the higher the score (recall that Medium is considered the default).The base score is a key metric in CVSS, which uses a scoring system to determine the level of severity of a vulnerability. see: https://www.first.org/cvss/v3-1
This entry is required
This entry is required
measures the impact to the confidentiality of the information resources managed by a software component due to a successfully exploited vulnerability
This entry is optional
high
: There is total loss of confidentiality, resulting in all resources within the impacted component being divulged to the attacker. Alternatively, access to only some restricted information is obtained, but the disclosed information presents a direct, serious impact. For example, an attacker steals the administrator's password, or private encryption keys of a web server. low
: There is some loss of confidentiality. Access to some restricted information is obtained, but the attacker does not have control over what information is obtained, or the amount or kind of loss is constrained. The information disclosure does not cause a direct, serious loss to the impacted component. none
: There is no loss of confidentiality within the impacted component. This metric value increases with the degree of loss to the impacted component.This entry is optional
not_defined
: Assigning this value to the metric will not influence the score. It is a signal to the equation to skip this metric. high
: Loss of [Confidentiality / Integrity / Availability] is likely to have a catastrophic adverse effect on the organization or individuals associated with the organization (e.g., employees, customers). medium
: Loss of [Confidentiality / Integrity / Availability] is likely to have a serious adverse effect on the organization or individuals associated with the organization (e.g., employees, customers).low
: Loss of [Confidentiality / Integrity / Availability] is likely to have only a limited adverse effect on the organization or individuals associated with the organization (e.g., employees, customers). For brevity, the same table is used for all three metrics. The greater the Security Requirement, the higher the score (recall that Medium is considered the default).This entry is optional
This entry is optional
measures the likelihood of the vulnerability being attacked
This entry is optional
not_defined
: Assigning this value to the metric will not influence the score. It is a signal to a scoring equation to skip this metric. high
: Functional autonomous code exists, or no exploit is required (manual trigger) and details are widely available. Exploit code works in every situation, or is actively being delivered via an autonomous agent (such as a worm or virus). Network-connected systems are likely to encounter scanning or exploitation attempts. Exploit development has reached the level of reliable, widely-available, easy-to-use automated tools. functional
: Functional exploit code is available. The code works in most situations where the vulnerability exists. proof_of_concept
: Proof-of-concept exploit code is available, or an attack demonstration is not practical for most systems. The code or technique is not functional in all situations and may require substantial modification by a skilled attacker. unproven
: No exploit code is available, or an exploit is theoretical.This entry is optional
This entry is optional
measures the impact to integrity of a successfully exploited vulnerability
This entry is optional
high
: There is a total loss of integrity, or a complete loss of protection. For example, the attacker is able to modify any/all files protected by the impacted component. Alternatively, only some files can be modified, but malicious modification would present a direct, serious consequence to the impacted component. low
: Modification of data is possible, but the attacker does not have control over the consequence of a modification, or the amount of modification is constrained. The data modification does not have a direct, serious impact on the impacted component.none
: There is no loss of integrity within the impacted component.this metric value increases with the consequence to the impacted component.This entry is optional
not_defined
: Assigning this value to the metric will not influence the score. It is a signal to the equation to skip this metric. high
: Loss of [Confidentiality / Integrity / Availability] is likely to have a catastrophic adverse effect on the organization or individuals associated with the organization (e.g., employees, customers). medium
: Loss of [Confidentiality / Integrity / Availability] is likely to have a serious adverse effect on the organization or individuals associated with the organization (e.g., employees, customers).low
: Loss of [Confidentiality / Integrity / Availability] is likely to have only a limited adverse effect on the organization or individuals associated with the organization (e.g., employees, customers). For brevity, the same table is used for all three metrics. The greater the Security Requirement, the higher the score (recall that Medium is considered the default).modified attack complexity
This entry is optional
modified attack vector
This entry is optional
modified availability impact
This entry is optional
modified confidentiality impact
This entry is optional
modified integrity impact
This entry is optional
modified privileges required
This entry is optional
modified scope
This entry is optional
modified user interaction
This entry is optional
describes the level of privileges an attacker must possess before successfully exploiting the vulnerability
This entry is optional
none
: The attacker is unauthorized prior to attack, and therefore does not require any access to settings or files to carry out an attack. low
: The attacker is authorized with (i.e. requires) privileges that provide basic user capabilities that could normally affect only settings and files owned by a user. Alternatively, an attacker with Low privileges may have the ability to cause an impact only to non-sensitive resources. high
: The attacker is authorized with (i.e. requires) privileges that provide significant (e.g. administrative) control over the vulnerable component that could affect component-wide settings and files.Remediation Level of a vulnerability is an important factor for prioritization
This entry is optional
not_defined
: Assigning this value to the metric will not influence the score. It is a signal to a scoring equation to skip this metric. unavailable
: There is either no solution available or it is impossible to apply. workaround
: There is an unofficial, non-vendor solution available. In some cases, users of the affected technology will create a patch of their own or provide steps to work around or otherwise mitigate the vulnerability. temporary_fix
: There is an official but temporary fix available. This includes instances where the vendor issues a temporary hotfix, tool, or workaround.official_fix
: A complete vendor solution is available. Either the vendor has issued an official patch, or an upgrade is available. The less official and permanent a fix, the higher the vulnerability score.measures the degree of confidence in the existence of the vulnerability and the credibility of the known technical details
This entry is optional
not_defined
: Assigning this value to the metric will not influence the score. It is a signal to a scoring equation to skip this metric. confirmed
: Detailed reports exist, or functional reproduction is possible (functional exploits may provide this). Source code is available to independently verify theassertions of the research, or the author or vendor of the affected code has confirmed the presence of the vulnerability. reasonable
: Significant details are published, but researchers either do not have full confidence in the root cause, or do not have access to source code to fully confirm all of the interactions that may lead to the result. Reasonable confidence exists, however, that the bug is reproducible and at least one impact is able to be verified (proof-of-concept exploits may provide this). An example is a detailed write-up of research into a vulnerability with an explanation (possibly obfuscated or 'left as an exercise to the reader') that gives assurances on how to reproduce the results. unknown
: There are reports of impacts that indicate a vulnerability is present. The reports indicate that the cause of the vulnerability is unknown, or reports may differ on the cause or impacts of the vulnerability. Reporters are uncertain of the true nature of the vulnerability, and there is little confidence in the validity of the reports or whether a static Base score can be applied given the differences described. An example is a bug report which notes that an intermittent but non-reproducible crash occurs, with evidence of memory corruption suggesting that denial of service, or possible more serious impacts, may result. The more a vulnerability is validated by the vendor or other reputable sources, the higher the score.the ability for a vulnerability in one software component to impact resources beyond its means, or privileges
This entry is optional
unchanged
: An exploited vulnerability can only affect resources managed by the same authority. In this case the vulnerable component and the impacted component are the same. changed
: An exploited vulnerability can affect resources beyond the authorization privileges intended by the vulnerable component. In this case the vulnerable component and the impacted component are different.Round up(CVSSv3BaseScore × CVSSv3ExploitCodeMaturity × CVSSv3RemediationLevel × CVSSv3ReportConfidence)
This entry is optional
temporal severity
This entry is optional
captures the requirement for a user, other than the attacker, to participate in the successful compromise of the vulnerable component
This entry is optional
none
: The vulnerable system can be exploited without interaction from any user. required
: Successful exploitation of this vulnerability requires a user to take some action before the vulnerability can be exploited. For example, a successful exploit may only be possible during the installation of an application by a system administrator.This entry is required
Property | Type | Description | Required? |
---|---|---|---|
base_score | Number | The base score is a key metric in CVSS, which uses a scoring system to determine the level of severity of a vulnerability. see: https://www.first.org/cvss/v2/guide | ✓ |
base_severity | HighMedLowString | ✓ | |
vector_string | String | ✓ | |
access_complexity | CVSSv2AccessComplexityString | ||
access_vector | CVSSv2AccessVectorString | ||
authentication | CVSSv2AuthenticationString | ||
availability_impact | CVSSv2AvailabilityImpactString | ||
availability_requirement | CVSSv2SecurityRequirementString | ||
collateral_damage_potential | CVSSv2CollateralDamagePotentialString | ||
confidentiality_impact | CVSSv2ConfidentialityImpactString | ||
confidentiality_requirement | CVSSv2SecurityRequirementString | ||
environmental_vector_string | String | ||
exploitability | CVSSv2ExploitabilityString | ||
exploitability_score | Number | ||
impact_score | Number | ||
integrity_impact | CVSSv2IntegrityImpactString | ||
integrity_requirement | CVSSv2SecurityRequirementString | ||
obtain_all_privilege | Boolean | ||
obtain_other_privilege | Boolean | ||
obtain_user_privilege | Boolean | ||
remediation_level | CVSSv2RemediationLevelString | ||
report_confidence | CVSSv2ReportConfidenceString | ||
target_distribution | CVSSv2TargetDistributionString | ||
temporal_vector_string | String | ||
user_interaction_required | Boolean |
This entry is optional
This entry is optional
This entry is optional
This entry is optional
This entry is optional
The base score is a key metric in CVSS, which uses a scoring system to determine the level of severity of a vulnerability. see: https://www.first.org/cvss/v2/guide
This entry is required
This entry is required
This entry is optional
This entry is optional
This entry is optional
This entry is optional
This entry is optional
This entry is optional
This entry is optional
This entry is optional
This entry is optional
This entry is optional
This entry is optional
This entry is optional
This entry is optional
This entry is required
Property | Type | Description | Required? |
---|---|---|---|
CVE_data_version | ShortStringString | Specifies the version of the CVE (Common Vulnerabilities and Exposures) dictionary used by the vulnerability information provider. | ✓ |
nodes | CPENode Object List | Each node in the CTIM standard configuration includes information such as the operator (such as "less than", or "greater than or equal to"), and the cpe (Common Platform Enumeration) string which identifies the specific software, CPE is a structured naming scheme for IT systems, platforms, and software packages, and it is instrumental in enabling data exchange between different systems. | ✓ |
Specifies the version of the CVE (Common Vulnerabilities and Exposures) dictionary used by the vulnerability information provider.
This entry is required
Each node
in the CTIM standard configuration includes information such as the operator
(such as "less than", or "greater than or equal to"), and the cpe
(Common Platform Enumeration) string which identifies the specific software, CPE
is a structured naming scheme for IT systems, platforms, and software packages, and it is instrumental in enabling data exchange between different systems.
Property | Type | Description | Required? |
---|---|---|---|
operator | cpe-node-operator-stringString | ✓ | |
children | CPELeafNode Object List | ||
cpe_match | CPEMatch Object List | ||
negate | Boolean | Negates operator when true. |
Negates operator when true.
This entry is required
Property | Type | Description | Required? |
---|---|---|---|
cpe_match | CPEMatch Object List | ✓ | |
operator | cpe-node-operator-stringString | ✓ | |
negate | Boolean | Negates operator when true. |
Negates operator when true.
This entry is required
Property | Type | Description | Required? |
---|---|---|---|
cpe23Uri | String | ✓ | |
vulnerable | Boolean | ✓ | |
versionEndExcluding | String | A string representing the upper bound(exclusive) of version in the CPE. | |
versionEndIncluding | String | A string representing the upper bound(inclusive) of version in the CPE. | |
versionStartExcluding | String | A string representing the lower bound(exclusive) of version in the CPE. | |
versionStartIncluding | String | A string representing the lower bound(inclusive) of version in the CPE. |
This entry is required
A string representing the upper bound(exclusive) of version in the CPE.
This entry is optional
A string representing the upper bound(inclusive) of version in the CPE.
This entry is optional
A string representing the lower bound(exclusive) of version in the CPE.
This entry is optional
A string representing the lower bound(inclusive) of version in the CPE.
This entry is optional
Property | Type | Description | Required? |
---|---|---|---|
cpe23Uri | String | ✓ | |
vulnerable | Boolean | ✓ | |
versionEndExcluding | String | A string representing the upper bound(exclusive) of version in the CPE. | |
versionEndIncluding | String | A string representing the upper bound(inclusive) of version in the CPE. | |
versionStartExcluding | String | A string representing the lower bound(exclusive) of version in the CPE. | |
versionStartIncluding | String | A string representing the lower bound(inclusive) of version in the CPE. |
This entry is required
A string representing the upper bound(exclusive) of version in the CPE.
This entry is optional
A string representing the upper bound(inclusive) of version in the CPE.
This entry is optional
A string representing the lower bound(exclusive) of version in the CPE.
This entry is optional
A string representing the lower bound(inclusive) of version in the CPE.
This entry is optional
Can you improve this documentation? These fine people already did:
Ag Ibragimov, Guillaume Buisson, Guillaume Erétéo, Mason Costa, Ambrose Bonnaire-Sergeant & Alexander R. Saint CroixEdit on GitHub
cljdoc is a website building & hosting documentation for Clojure/Script libraries
× close