diff --git a/schema/v5.0/docs/index.html b/schema/v5.0/docs/index.html index 8da6bb878cf..d47da866163 100644 --- a/schema/v5.0/docs/index.html +++ b/schema/v5.0/docs/index.html @@ -1,9 +1,9 @@ -
cve-schema specifies the CVE JSON record format. This is the blueprint for a rich set of JSON data that can be submitted by CVE Numbering Authorities (CNAs) and Authorized Data Publishers (ADPs) to describe a CVE Record. Some examples of CVE Record data include CVE ID number, affected product(s), affected version(s), and public references. While those specific items are required when assigning a CVE, there are many other optional data in the schema that can be used to enrich CVE Records for community benefit. Learn more about the CVE program at the official website. This CVE JSON record format is defined using JSON Schema. Learn more about JSON Schema here.
When a CNA populates the data associated with a CVE ID as a CVE Record, the state of the CVE Record is Published.
No Additional PropertiesIndicates the type of information represented in the JSON instance.
The version of the schema being used. Used to support multiple versions of this format.
This is meta data about the CVE ID such as the CVE ID, who requested it, who assigned it, when it was requested, the current state (PUBLISHED, REJECTED, etc.) and so on. These fields are controlled by the CVE Services.
No Additional PropertiesThe CVE identifier that this record pertains to.
Must match regular expression:^CVE-[0-9]{4}-[0-9]{4,19}$
The UUID for the organization to which the CVE ID was originally assigned. This UUID can be used to lookup the organization record in the user registry service.
Must match regular expression:^[0-9A-Fa-f]{8}-[0-9A-Fa-f]{4}-4[0-9A-Fa-f]{3}-[89ABab][0-9A-Fa-f]{3}-[0-9A-Fa-f]{12}$
The short name for the organization to which the CVE ID was originally assigned.
Must be at least 2
characters long
Must be at most 32
characters long
The date/time the record was last updated.
Must match regular expression:^(((2000|2400|2800|(19|2[0-9](0[48]|[2468][048]|[13579][26])))-02-29)|(((19|2[0-9])[0-9]{2})-02-(0[1-9]|1[0-9]|2[0-8]))|(((19|2[0-9])[0-9]{2})-(0[13578]|10|12)-(0[1-9]|[12][0-9]|3[01]))|(((19|2[0-9])[0-9]{2})-(0[469]|11)-(0[1-9]|[12][0-9]|30)))T(2[0-3]|[01][0-9]):([0-5][0-9]):([0-5][0-9])(\.[0-9]+)?(Z|[+-][0-9]{2}:[0-9]{2})?$
The system of record causes this to start at 1, and increment by 1 each time a submission from a data provider changes this CVE Record. The incremented value moves to the Rejected schema upon a PUBLISHED->REJECTED transition, and moves to the Published schema upon a REJECTED->PUBLISHED transition.
Value must be greater or equal to 1
The date/time this CVE ID was reserved in the CVE automation workgroup services system. Disclaimer: This date reflects when the CVE ID was reserved, and does not necessarily indicate when this vulnerability was discovered, shared with the affected vendor, publicly disclosed, or updated in CVE.
Same definition as dateUpdatedThe date/time the CVE Record was first published in the CVE List.
Same definition as dateUpdatedState of CVE - PUBLISHED, REJECTED.
A set of structures (called containers) used to store vulnerability information related to a specific CVE ID provided by a specific organization participating in the CVE program. Each container includes information provided by a different source.
At a minimum, a 'cna' container containing the vulnerability information provided by the CNA who initially assigned the CVE ID must be included.
There can only be one 'cna' container, as there can only be one assigning CNA. However, there can be multiple 'adp' containers, allowing multiple organizations participating in the CVE program to add additional information related to the vulnerability. For the most part, the 'cna' and 'adp' containers contain the same properties. The main differences are the source of the information. The 'cna' container requires the CNA to include certain fields, while the 'adp' container does not.
An object containing the vulnerability information provided by a CVE Numbering Authority (CNA) for a published CVE ID. There can only be one CNA container per CVE record since there can only be one assigning CNA. The CNA container must include the required information defined in the CVE Rules, which includes a product, version, problem type, prose description, and a reference.
No Additional PropertiesDetails related to the information container provider (CNA or ADP).
No Additional PropertiesThe container provider's organizational short name.
Same definition as assignerShortNameTimestamp to be set by the system of record at time of submission. If dateUpdated is provided to the system of record it will be replaced by the current timestamp at the time of submission.
Same definition as dateUpdatedThe date/time this CVE ID was associated with a vulnerability by a CNA.
Same definition as dateUpdatedIf known, the date/time the vulnerability was disclosed publicly.
Same definition as dateUpdatedA title, headline, or a brief phrase summarizing the CVE record. Eg., Buffer overflow in Example Soft.
Must be at least 1
characters long
Must be at most 256
characters long
A list of multi-lingual descriptions of the vulnerability. E.g., [PROBLEMTYPE] in [COMPONENT] in [VENDOR] [PRODUCT] [VERSION] on [PLATFORMS] allows [ATTACKER] to [IMPACT] via [VECTOR]. OR [COMPONENT] in [VENDOR] [PRODUCT] [VERSION] [ROOT CAUSE], which allows [ATTACKER] to [IMPACT] via [VECTOR].
Must contain a minimum of 1
items
All items must be unique
Text in a particular language with optional alternate markup or formatted representation (e.g., Markdown) or embedded media.
No Additional PropertiesBCP 47 language code, language-region.
Must match regular expression:^[A-Za-z]{2,4}([_-][A-Za-z]{4})?([_-]([A-Za-z]{2}|[0-9]{3}))?$
Plain text description.
Must be at least 1
characters long
Must be at most 4096
characters long
Supporting media data for the description such as markdown, diagrams, .. (optional). Similar to RFC 2397 each media object has three main parts: media type, media data value, and an optional boolean flag to indicate if the media data is base64 encoded.
Must contain a minimum of 1
items
All items must be unique
RFC2046 compliant IANA Media type for eg., text/markdown, text/html.
Must be at least 1
characters long
Must be at most 256
characters long
"text/markdown"
+ CVE JSON record format CVE JSON record format
cve-schema specifies the CVE JSON record format. This is the blueprint for a rich set of JSON data that can be submitted by CVE Numbering Authorities (CNAs) and Authorized Data Publishers (ADPs) to describe a CVE Record. Some examples of CVE Record data include CVE ID number, affected product(s), affected version(s), and public references. While those specific items are required when assigning a CVE, there are many other optional data in the schema that can be used to enrich CVE Records for community benefit. Learn more about the CVE program at the official website. This CVE JSON record format is defined using JSON Schema. Learn more about JSON Schema here.
Type: object
When a CNA populates the data associated with a CVE ID as a CVE Record, the state of the CVE Record is Published.
No Additional Properties
Type: enum (of string)
Indicates the type of information represented in the JSON instance.
Must be one of:
- "CVE_RECORD"
Type: string Default: "5.1.0"
The version of the CVE schema used for validating this record. Used to support multiple versions of this format.
Must match regular expression: ^5\.(0|[1-9][0-9]*)(\.(0|[1-9][0-9]*))?$
Type: object
This is meta data about the CVE ID such as the CVE ID, who requested it, who assigned it, when it was requested, the current state (PUBLISHED, REJECTED, etc.) and so on. These fields are controlled by the CVE Services.
No Additional Properties
Type: string
The CVE identifier that this record pertains to.
Must match regular expression: ^CVE-[0-9]{4}-[0-9]{4,19}$
Type: string
The UUID for the organization to which the CVE ID was originally assigned. This UUID can be used to lookup the organization record in the user registry service.
Must match regular expression: ^[0-9A-Fa-f]{8}-[0-9A-Fa-f]{4}-4[0-9A-Fa-f]{3}-[89ABab][0-9A-Fa-f]{3}-[0-9A-Fa-f]{12}$
Type: string
The short name for the organization to which the CVE ID was originally assigned.
Must be at least 2
characters long
Must be at most 32
characters long
Type: string
The date/time the record was last updated.
Must match regular expression: ^(((2000|2400|2800|(19|2[0-9](0[48]|[2468][048]|[13579][26])))-02-29)|(((19|2[0-9])[0-9]{2})-02-(0[1-9]|1[0-9]|2[0-8]))|(((19|2[0-9])[0-9]{2})-(0[13578]|10|12)-(0[1-9]|[12][0-9]|3[01]))|(((19|2[0-9])[0-9]{2})-(0[469]|11)-(0[1-9]|[12][0-9]|30)))T(2[0-3]|[01][0-9]):([0-5][0-9]):([0-5][0-9])(\.[0-9]+)?(Z|[+-][0-9]{2}:[0-9]{2})?$
Type: integer
The system of record causes this to start at 1, and increment by 1 each time a submission from a data provider changes this CVE Record. The incremented value moves to the Rejected schema upon a PUBLISHED->REJECTED transition, and moves to the Published schema upon a REJECTED->PUBLISHED transition.
Value must be greater or equal to 1
Type: string
The date/time this CVE ID was reserved in the CVE automation workgroup services system. Disclaimer: This date reflects when the CVE ID was reserved, and does not necessarily indicate when this vulnerability was discovered, shared with the affected vendor, publicly disclosed, or updated in CVE.
Same definition as dateUpdated
Type: string
The date/time the CVE Record was first published in the CVE List.
Same definition as dateUpdated
Type: enum (of string)
State of CVE - PUBLISHED, REJECTED.
Must be one of:
- "PUBLISHED"
Type: object
A set of structures (called containers) used to store vulnerability information related to a specific CVE ID provided by a specific organization participating in the CVE program. Each container includes information provided by a different source.
At a minimum, a 'cna' container containing the vulnerability information provided by the CNA who initially assigned the CVE ID must be included.
There can only be one 'cna' container, as there can only be one assigning CNA. However, there can be multiple 'adp' containers, allowing multiple organizations participating in the CVE program to add additional information related to the vulnerability. For the most part, the 'cna' and 'adp' containers contain the same properties. The main differences are the source of the information. The 'cna' container requires the CNA to include certain fields, while the 'adp' container does not.
No Additional Properties
Type: object
An object containing the vulnerability information provided by a CVE Numbering Authority (CNA) for a published CVE ID. There can only be one CNA container per CVE record since there can only be one assigning CNA. The CNA container must include the required information defined in the CVE Rules, which includes a product, version, problem type, prose description, and a reference.
No Additional Properties
Type: object
Details related to the information container provider (CNA or ADP).
No Additional Properties
Type: string
The container provider's organizational short name.
Same definition as assignerShortName
Type: string
Timestamp to be set by the system of record at time of submission. If dateUpdated is provided to the system of record it will be replaced by the current timestamp at the time of submission.
Same definition as dateUpdated
Type: string
The date/time this CVE ID was associated with a vulnerability by a CNA.
Same definition as dateUpdated
Type: string
If known, the date/time the vulnerability was disclosed publicly.
Same definition as dateUpdated
Type: string
A title, headline, or a brief phrase summarizing the CVE record. Eg., Buffer overflow in Example Soft.
Must be at least 1
characters long
Must be at most 256
characters long
Type: array
A list of multi-lingual descriptions of the vulnerability. E.g., [PROBLEMTYPE] in [COMPONENT] in [VENDOR] [PRODUCT] [VERSION] on [PLATFORMS] allows [ATTACKER] to [IMPACT] via [VECTOR]. OR [COMPONENT] in [VENDOR] [PRODUCT] [VERSION] [ROOT CAUSE], which allows [ATTACKER] to [IMPACT] via [VECTOR].
Must contain a minimum of 1
items
All items must be unique
Each item of this array must be:
Type: object
Text in a particular language with optional alternate markup or formatted representation (e.g., Markdown) or embedded media.
No Additional Properties
Type: string Default: "en"
BCP 47 language code, language-region.
Must match regular expression: ^[A-Za-z]{2,4}([_-][A-Za-z]{4})?([_-]([A-Za-z]{2}|[0-9]{3}))?$
Type: string
Plain text description.
Must be at least 1
characters long
Must be at most 4096
characters long
Type: array of object
Supporting media data for the description such as markdown, diagrams, .. (optional). Similar to RFC 2397 each media object has three main parts: media type, media data value, and an optional boolean flag to indicate if the media data is base64 encoded.
Must contain a minimum of 1
items
All items must be unique
Each item of this array must be:
Type: object
No Additional Properties
Type: string
RFC2046 compliant IANA Media type for eg., text/markdown, text/html.
Must be at least 1
characters long
Must be at most 256
characters long
Examples:
"text/markdown"
"text/html"
"image/png"
"image/svg"
"audio/mp3"
-
Type: boolean Default: false
If true then the value field contains the media data encoded in base64. If false then the value field contains the UTF-8 media content.
Type: string
Supporting media content, up to 16K. If base64 is true, this field stores base64 encoded data.
Must be at least 1
characters long
Must be at most 16384
characters long
At least one of the items must be:
Type: object
A description with lang set to an English language (en, enUS, enUK, and so on).
Type: string
BCP 47 language code, language-region, required to be English.
Must match regular expression: ^en([_-][A-Za-z]{4})?([_-]([A-Za-z]{2}|[0-9]{3}))?$
Type: array
List of affected products.
Must contain a minimum of 1
items
Each item of this array must be:
Type: object
Provides information about the set of products and services affected by this vulnerability.
Type: object
The following properties are required:
- product
- vendor
Type: object
The following properties are required:
- collectionURL
- packageName
Type: object
The following properties are required:
- versions
Type: object
The following properties are required:
- defaultStatus
Type: string
Name of the organization, project, community, individual, or user that created or maintains this product or hosted service. Can be 'N/A' if none of those apply. When collectionURL and packageName are used, this field may optionally represent the user or account within the package collection associated with the package.
Must be at least 1
characters long
Must be at most 512
characters long
Type: string
Name of the affected product.
Must be at least 1
characters long
Must be at most 2048
characters long
Type: string
URL identifying a package collection (determines the meaning of packageName).
Must be at least 1
characters long
Must be at most 2048
characters long
Examples:
"https://access.redhat.com/downloads/content/package-browser"
+
Type: boolean Default: false
If true then the value field contains the media data encoded in base64. If false then the value field contains the UTF-8 media content.
Type: string
Supporting media content, up to 16K. If base64 is true, this field stores base64 encoded data.
Must be at least 1
characters long
Must be at most 16384
characters long
At least one of the items must be:
Type: object
A description with lang set to an English language (en, enUS, enUK, and so on).
Type: string
BCP 47 language code, language-region, required to be English.
Must match regular expression: ^en([_-][A-Za-z]{4})?([_-]([A-Za-z]{2}|[0-9]{3}))?$
Type: array
List of affected products.
Must contain a minimum of 1
items
Each item of this array must be:
Type: object
Provides information about the set of products and services affected by this vulnerability.
Type: object
The following properties are required:
- product
- vendor
Type: object
The following properties are required:
- packageName
- collectionURL
Type: object
The following properties are required:
- versions
Type: object
The following properties are required:
- defaultStatus
Type: string
Name of the organization, project, community, individual, or user that created or maintains this product or hosted service. Can be 'N/A' if none of those apply. When collectionURL and packageName are used, this field may optionally represent the user or account within the package collection associated with the package.
Must be at least 1
characters long
Must be at most 512
characters long
Type: string
Name of the affected product.
Must be at least 1
characters long
Must be at most 2048
characters long
Type: string
URL identifying a package collection (determines the meaning of packageName).
Must be at least 1
characters long
Must be at most 2048
characters long
Examples:
"https://access.redhat.com/downloads/content/package-browser"
"https://addons.mozilla.org"
"https://addons.thunderbird.net"
"https://anaconda.org/anaconda/repo"
@@ -94,10 +94,10 @@
}
}
return product.defaultStatus
-
.
No Additional Properties
Type: object
The following properties are required:
- version
- status
Type: object
The following properties are required:
- version
- status
- versionType
Type: object
The following properties are required:
- version
- status
- lessThan
- versionType
Type: object
The following properties are required:
- lessThanOrEqual
- version
- status
- versionType
Type: string
The single version being described, or the version at the start of the range. By convention, typically 0 denotes the earliest possible version.
Must be at least 1
characters long
Must be at most 1024
characters long
Type: enum (of string)
The vulnerability status for the version or range of versions. For a range, the status may be refined by the 'changes' list.
Same definition as defaultStatus
Type: string
The version numbering system used for specifying the range. This defines the exact semantics of the comparison (less-than) operation on versions, which is required to understand the range itself. 'Custom' indicates that the version type is unspecified and should be avoided whenever possible. It is included primarily for use in conversion of older data files.
Must be at least 1
characters long
Must be at most 128
characters long
Examples:
"custom"
+
.
No Additional Properties
Type: object
The following properties are required:
- version
- status
Type: object
The following properties are required:
- version
- versionType
- status
Type: object
The following properties are required:
- lessThan
- version
- versionType
- status
Type: object
The following properties are required:
- lessThanOrEqual
- version
- versionType
- status
Type: string
The single version being described, or the version at the start of the range. By convention, typically 0 denotes the earliest possible version.
Must be at least 1
characters long
Must be at most 1024
characters long
Type: enum (of string)
The vulnerability status for the version or range of versions. For a range, the status may be refined by the 'changes' list.
Same definition as defaultStatus
Type: string
The version numbering system used for specifying the range. This defines the exact semantics of the comparison (less-than) operation on versions, which is required to understand the range itself. 'Custom' indicates that the version type is unspecified and should be avoided whenever possible. It is included primarily for use in conversion of older data files.
Must be at least 1
characters long
Must be at most 128
characters long
Examples:
"custom"
"git"
"maven"
"python"
"rpm"
"semver"
-
Type: string
The non-inclusive upper limit of the range. This is the least version NOT in the range. The usual version syntax is expanded to allow a pattern to end in an asterisk (*)
, indicating an arbitrarily large number in the version ordering. For example, {version: 1.0 lessThan: 1.*}
would describe the entire 1.X branch for most range kinds, and {version: 2.0, lessThan: *}
describes all versions starting at 2.0, including 3.0, 5.1, and so on. Only one of lessThan and lessThanOrEqual should be specified.
Same definition as version
Type: string
The inclusive upper limit of the range. This is the greatest version contained in the range. Only one of lessThan and lessThanOrEqual should be specified. For example, {version: 1.0, lessThanOrEqual: 1.3}
covers all versions from 1.0 up to and including 1.3.
Same definition as version
Type: array of object
A list of status changes that take place during the range. The array should be sorted in increasing order by the 'at' field, according to the versionType, but clients must re-sort the list themselves rather than assume it is sorted.
Must contain a minimum of 1
items
All items must be unique
Each item of this array must be:
Type: object
The start of a single status change during the range.
No Additional Properties
Type: enum (of string)
The new status in the range starting at the given version.
Same definition as defaultStatus
Type: array of object
This is problem type information (e.g. CWE identifier). Must contain: At least one entry, can be text, OWASP, CWE, please note that while only one is required you can use more than one (or indeed all three) as long as they are correct). (CNA requirement: [PROBLEMTYPE]).
Must contain a minimum of 1
items
All items must be unique
Each item of this array must be:
Type: object
No Additional Properties
Type: array of object
Must contain a minimum of 1
items
All items must be unique
Each item of this array must be:
Type: object
No Additional Properties
Type: string
Text description of problemType, or title from CWE or OWASP.
Must be at least 1
characters long
Must be at most 4096
characters long
Type: string
CWE ID of the CWE that best describes this problemType entry.
Must match regular expression: ^CWE-[1-9][0-9]*$
Must be at least 5
characters long
Must be at most 9
characters long
Type: string
Problemtype source, text, OWASP, CWE, etc.,
Must be at least 1
characters long
Must be at most 128
characters long
Type: array
This is reference data in the form of URLs or file objects (uuencoded and embedded within the JSON file, exact format to be decided, e.g. we may require a compressed format so the objects require unpacking before they are "dangerous").
Same definition as references
Type: array
This is reference data in the form of URLs or file objects (uuencoded and embedded within the JSON file, exact format to be decided, e.g. we may require a compressed format so the objects require unpacking before they are "dangerous").
Must contain a minimum of 1
items
Must contain a maximum of 512
items
All items must be unique
Each item of this array must be:
Type: object
No Additional Properties
Type: string
The uniform resource locator (URL), according to RFC 3986, that can be used to retrieve the referenced resource.
Same definition as collectionURL
Type: string
User created name for the reference, often the title of the page.
Must be at least 1
characters long
Must be at most 512
characters long
Type: array of object
Collection of impacts of this vulnerability.
Must contain a minimum of 1
items
All items must be unique
Each item of this array must be:
Type: object
This is impact type information (e.g. a text description.
No Additional Properties
Type: string
CAPEC ID that best relates to this impact.
Must match regular expression: ^CAPEC-[1-9][0-9]{0,4}$
Must be at least 7
characters long
Must be at most 11
characters long
Type: array
Prose description of the impact scenario. At a minimum provide the description given by CAPEC.
Same definition as descriptions
Type: array of object
Collection of impact scores with attribution.
Must contain a minimum of 1
items
All items must be unique
Each item of this array must be:
This is impact type information (e.g. a text description, CVSSv2, CVSSv3, CVSSV4, etc.). Must contain: At least one entry, can be text, CVSSv2, CVSSv3, others may be added.
No Additional Properties
Type: object
The following properties are required:
- cvssV4_0
Type: object
The following properties are required:
- cvssV3_1
Type: object
The following properties are required:
- cvssV3_0
Type: object
The following properties are required:
- cvssV2_0
Type: object
The following properties are required:
- other
Type: string
Name of the scoring format. This provides a bit of future proofing. Additional properties are not prohibited, so this will support the inclusion of proprietary formats. It also provides an easy future conversion mechanism when future score formats become part of the schema. example: cvssV44, format = 'cvssV44', other = cvssV4_4 JSON object. In the future, the other properties can be converted to score properties when they become part of the schema.
Must be at least 1
characters long
Must be at most 64
characters long
Type: array of object
Description of the scenarios this metrics object applies to. If no specific scenario is given, GENERAL is used as the default and applies when no more specific metric matches.
Must contain a minimum of 1
items
All items must be unique
Each item of this array must be:
Type: object
No Additional Properties
Type: string Default: "GENERAL"
Description of the scenario this metrics object applies to. If no specific scenario is given, GENERAL is used as the default and applies when no more specific metric matches.
Must be at least 1
characters long
Must be at most 4096
characters long
Type: object
No Additional Properties
Type: object
Type: number
Value must be greater or equal to 0.0
and lesser or equal to 0.0
Type: const
Specific value: "NONE"
Type: object
Type: number
Value must be greater or equal to 0.1
and lesser or equal to 3.9
and a multiple of 0.1
Type: const
Specific value: "LOW"
Type: object
Type: number
Value must be greater or equal to 4.0
and lesser or equal to 6.9
and a multiple of 0.1
Type: const
Specific value: "MEDIUM"
Type: object
Type: number
Value must be greater or equal to 7.0
and lesser or equal to 8.9
and a multiple of 0.1
Type: const
Specific value: "HIGH"
Type: object
Type: number
Value must be greater or equal to 9.0
and lesser or equal to 10
and a multiple of 0.1
Type: const
Specific value: "CRITICAL"
The following properties are required:
- baseSeverity
- baseScore
Type: enum (of string)
CVSS Version
Must be one of:
- "4.0"
Type: string
Must match regular expression: ^CVSS:4[.]0/AV:[NALP]/AC:[LH]/AT:[NP]/PR:[NLH]/UI:[NPA]/VC:[HLN]/VI:[HLN]/VA:[HLN]/SC:[HLN]/SI:[HLN]/SA:[HLN](/E:[XAPU])?(/CR:[XHML])?(/IR:[XHML])?(/AR:[XHML])?(/MAV:[XNALP])?(/MAC:[XLH])?(/MAT:[XNP])?(/MPR:[XNLH])?(/MUI:[XNPA])?(/MVC:[XNLH])?(/MVI:[XNLH])?(/MVA:[XNLH])?(/MSC:[XNLH])?(/MSI:[XNLHS])?(/MSA:[XNLHS])?(/S:[XNP])?(/AU:[XNY])?(/R:[XAUI])?(/V:[XDC])?(/RE:[XLMH])?(/U:(X|Clear|Green|Amber|Red))?$
Type: enum (of string)
Must be one of:
- "NETWORK"
- "ADJACENT"
- "LOCAL"
- "PHYSICAL"
Type: enum (of string)
Must be one of:
- "HIGH"
- "LOW"
Type: enum (of string)
Must be one of:
- "NONE"
- "PRESENT"
Type: enum (of string)
Must be one of:
- "HIGH"
- "LOW"
- "NONE"
Type: enum (of string)
Must be one of:
- "NONE"
- "PASSIVE"
- "ACTIVE"
Type: enum (of string)
Must be one of:
- "NONE"
- "LOW"
- "HIGH"
Type: enum (of string)
Must be one of:
- "NONE"
- "LOW"
- "HIGH"
Type: enum (of string) Default: "NOT_DEFINED"
Must be one of:
- "UNREPORTED"
- "PROOF_OF_CONCEPT"
- "ATTACKED"
- "NOT_DEFINED"
Type: enum (of string) Default: "NOT_DEFINED"
Must be one of:
- "LOW"
- "MEDIUM"
- "HIGH"
- "NOT_DEFINED"
Type: enum (of string) Default: "NOT_DEFINED"
Must be one of:
- "NETWORK"
- "ADJACENT"
- "LOCAL"
- "PHYSICAL"
- "NOT_DEFINED"
Type: enum (of string) Default: "NOT_DEFINED"
Must be one of:
- "HIGH"
- "LOW"
- "NOT_DEFINED"
Type: enum (of string) Default: "NOT_DEFINED"
Must be one of:
- "NONE"
- "PRESENT"
- "NOT_DEFINED"
Type: enum (of string) Default: "NOT_DEFINED"
Must be one of:
- "HIGH"
- "LOW"
- "NONE"
- "NOT_DEFINED"
Type: enum (of string) Default: "NOT_DEFINED"
Must be one of:
- "NONE"
- "PASSIVE"
- "ACTIVE"
- "NOT_DEFINED"
Type: enum (of string) Default: "NOT_DEFINED"
Must be one of:
- "NONE"
- "LOW"
- "HIGH"
- "NOT_DEFINED"
Type: enum (of string) Default: "NOT_DEFINED"
Must be one of:
- "NONE"
- "LOW"
- "HIGH"
- "NOT_DEFINED"
Type: enum (of string) Default: "NOT_DEFINED"
Must be one of:
- "NONE"
- "LOW"
- "HIGH"
- "SAFETY"
- "NOT_DEFINED"
Type: enum (of string) Default: "NOT_DEFINED"
Must be one of:
- "NEGLIGIBLE"
- "PRESENT"
- "NOT_DEFINED"
Type: enum (of string) Default: "NOT_DEFINED"
Must be one of:
- "NO"
- "YES"
- "NOT_DEFINED"
Type: enum (of string) Default: "NOT_DEFINED"
Must be one of:
- "AUTOMATIC"
- "USER"
- "IRRECOVERABLE"
- "NOT_DEFINED"
Type: enum (of string) Default: "NOT_DEFINED"
Must be one of:
- "DIFFUSE"
- "CONCENTRATED"
- "NOT_DEFINED"
Type: enum (of string) Default: "NOT_DEFINED"
Must be one of:
- "LOW"
- "MODERATE"
- "HIGH"
- "NOT_DEFINED"
Type: enum (of string) Default: "NOT_DEFINED"
Must be one of:
- "CLEAR"
- "GREEN"
- "AMBER"
- "RED"
- "NOT_DEFINED"
Type: object
No Additional Properties
Type: enum (of string)
CVSS Version
Must be one of:
- "3.1"
Type: string
Must match regular expression: ^CVSS:3[.]1/((AV:[NALP]|AC:[LH]|PR:[NLH]|UI:[NR]|S:[UC]|[CIA]:[NLH]|E:[XUPFH]|RL:[XOTWU]|RC:[XURC]|[CIA]R:[XLMH]|MAV:[XNALP]|MAC:[XLH]|MPR:[XNLH]|MUI:[XNR]|MS:[XUC]|M[CIA]:[XNLH])/)*(AV:[NALP]|AC:[LH]|PR:[NLH]|UI:[NR]|S:[UC]|[CIA]:[NLH]|E:[XUPFH]|RL:[XOTWU]|RC:[XURC]|[CIA]R:[XLMH]|MAV:[XNALP]|MAC:[XLH]|MPR:[XNLH]|MUI:[XNR]|MS:[XUC]|M[CIA]:[XNLH])$
Type: enum (of string)
Must be one of:
- "NETWORK"
- "ADJACENT_NETWORK"
- "LOCAL"
- "PHYSICAL"
Type: enum (of string)
Must be one of:
- "HIGH"
- "LOW"
Type: enum (of string)
Must be one of:
- "HIGH"
- "LOW"
- "NONE"
Type: enum (of string)
Must be one of:
- "NONE"
- "REQUIRED"
Type: enum (of string)
Must be one of:
- "UNCHANGED"
- "CHANGED"
Type: enum (of string)
Must be one of:
- "NONE"
- "LOW"
- "HIGH"
Type: number
Value must be greater or equal to 0
and lesser or equal to 10
Type: enum (of string)
Must be one of:
- "NONE"
- "LOW"
- "MEDIUM"
- "HIGH"
- "CRITICAL"
Type: enum (of string)
Must be one of:
- "UNPROVEN"
- "PROOF_OF_CONCEPT"
- "FUNCTIONAL"
- "HIGH"
- "NOT_DEFINED"
Type: enum (of string)
Must be one of:
- "OFFICIAL_FIX"
- "TEMPORARY_FIX"
- "WORKAROUND"
- "UNAVAILABLE"
- "NOT_DEFINED"
Type: enum (of string)
Must be one of:
- "UNKNOWN"
- "REASONABLE"
- "CONFIRMED"
- "NOT_DEFINED"
Type: enum (of string)
Must be one of:
- "LOW"
- "MEDIUM"
- "HIGH"
- "NOT_DEFINED"
Type: enum (of string)
Must be one of:
- "NETWORK"
- "ADJACENT_NETWORK"
- "LOCAL"
- "PHYSICAL"
- "NOT_DEFINED"
Type: enum (of string)
Must be one of:
- "HIGH"
- "LOW"
- "NOT_DEFINED"
Type: enum (of string)
Must be one of:
- "HIGH"
- "LOW"
- "NONE"
- "NOT_DEFINED"
Type: enum (of string)
Must be one of:
- "NONE"
- "REQUIRED"
- "NOT_DEFINED"
Type: enum (of string)
Must be one of:
- "UNCHANGED"
- "CHANGED"
- "NOT_DEFINED"
Type: enum (of string)
Must be one of:
- "NONE"
- "LOW"
- "HIGH"
- "NOT_DEFINED"
Type: object
No Additional Properties
Type: enum (of string)
CVSS Version
Must be one of:
- "3.0"
Type: string
Must match regular expression: ^CVSS:3[.]0/((AV:[NALP]|AC:[LH]|PR:[UNLH]|UI:[NR]|S:[UC]|[CIA]:[NLH]|E:[XUPFH]|RL:[XOTWU]|RC:[XURC]|[CIA]R:[XLMH]|MAV:[XNALP]|MAC:[XLH]|MPR:[XUNLH]|MUI:[XNR]|MS:[XUC]|M[CIA]:[XNLH])/)*(AV:[NALP]|AC:[LH]|PR:[UNLH]|UI:[NR]|S:[UC]|[CIA]:[NLH]|E:[XUPFH]|RL:[XOTWU]|RC:[XURC]|[CIA]R:[XLMH]|MAV:[XNALP]|MAC:[XLH]|MPR:[XUNLH]|MUI:[XNR]|MS:[XUC]|M[CIA]:[XNLH])$
Type: enum (of string)
Must be one of:
- "NETWORK"
- "ADJACENT_NETWORK"
- "LOCAL"
- "PHYSICAL"
Type: enum (of string)
Must be one of:
- "HIGH"
- "LOW"
Type: enum (of string)
Must be one of:
- "HIGH"
- "LOW"
- "NONE"
Type: enum (of string)
Must be one of:
- "NONE"
- "REQUIRED"
Type: enum (of string)
Must be one of:
- "UNCHANGED"
- "CHANGED"
Type: enum (of string)
Must be one of:
- "NONE"
- "LOW"
- "HIGH"
Type: number
Value must be greater or equal to 0
and lesser or equal to 10
Type: enum (of string)
Must be one of:
- "NONE"
- "LOW"
- "MEDIUM"
- "HIGH"
- "CRITICAL"
Type: enum (of string)
Must be one of:
- "UNPROVEN"
- "PROOF_OF_CONCEPT"
- "FUNCTIONAL"
- "HIGH"
- "NOT_DEFINED"
Type: enum (of string)
Must be one of:
- "OFFICIAL_FIX"
- "TEMPORARY_FIX"
- "WORKAROUND"
- "UNAVAILABLE"
- "NOT_DEFINED"
Type: enum (of string)
Must be one of:
- "UNKNOWN"
- "REASONABLE"
- "CONFIRMED"
- "NOT_DEFINED"
Type: enum (of string)
Must be one of:
- "LOW"
- "MEDIUM"
- "HIGH"
- "NOT_DEFINED"
Type: enum (of string)
Must be one of:
- "NETWORK"
- "ADJACENT_NETWORK"
- "LOCAL"
- "PHYSICAL"
- "NOT_DEFINED"
Type: enum (of string)
Must be one of:
- "HIGH"
- "LOW"
- "NOT_DEFINED"
Type: enum (of string)
Must be one of:
- "HIGH"
- "LOW"
- "NONE"
- "NOT_DEFINED"
Type: enum (of string)
Must be one of:
- "NONE"
- "REQUIRED"
- "NOT_DEFINED"
Type: enum (of string)
Must be one of:
- "UNCHANGED"
- "CHANGED"
- "NOT_DEFINED"
Type: enum (of string)
Must be one of:
- "NONE"
- "LOW"
- "HIGH"
- "NOT_DEFINED"
Type: object
No Additional Properties
Type: enum (of string)
CVSS Version
Must be one of:
- "2.0"
Type: string
Must match regular expression: ^((AV:[NAL]|AC:[LMH]|Au:[MSN]|[CIA]:[NPC]|E:(U|POC|F|H|ND)|RL:(OF|TF|W|U|ND)|RC:(UC|UR|C|ND)|CDP:(N|L|LM|MH|H|ND)|TD:(N|L|M|H|ND)|[CIA]R:(L|M|H|ND))/)*(AV:[NAL]|AC:[LMH]|Au:[MSN]|[CIA]:[NPC]|E:(U|POC|F|H|ND)|RL:(OF|TF|W|U|ND)|RC:(UC|UR|C|ND)|CDP:(N|L|LM|MH|H|ND)|TD:(N|L|M|H|ND)|[CIA]R:(L|M|H|ND))$
Type: enum (of string)
Must be one of:
- "NETWORK"
- "ADJACENT_NETWORK"
- "LOCAL"
Type: enum (of string)
Must be one of:
- "HIGH"
- "MEDIUM"
- "LOW"
Type: enum (of string)
Must be one of:
- "MULTIPLE"
- "SINGLE"
- "NONE"
Type: enum (of string)
Must be one of:
- "NONE"
- "PARTIAL"
- "COMPLETE"
Type: number
Value must be greater or equal to 0
and lesser or equal to 10
Type: enum (of string)
Must be one of:
- "UNPROVEN"
- "PROOF_OF_CONCEPT"
- "FUNCTIONAL"
- "HIGH"
- "NOT_DEFINED"
Type: enum (of string)
Must be one of:
- "OFFICIAL_FIX"
- "TEMPORARY_FIX"
- "WORKAROUND"
- "UNAVAILABLE"
- "NOT_DEFINED"
Type: enum (of string)
Must be one of:
- "UNCONFIRMED"
- "UNCORROBORATED"
- "CONFIRMED"
- "NOT_DEFINED"
Type: enum (of string)
Must be one of:
- "NONE"
- "LOW"
- "LOW_MEDIUM"
- "MEDIUM_HIGH"
- "HIGH"
- "NOT_DEFINED"
Type: enum (of string)
Must be one of:
- "NONE"
- "LOW"
- "MEDIUM"
- "HIGH"
- "NOT_DEFINED"
Type: enum (of string)
Must be one of:
- "LOW"
- "MEDIUM"
- "HIGH"
- "NOT_DEFINED"
Type: object
A non-standard impact description, may be prose or JSON block.
No Additional Properties
Type: string
Name of the non-standard impact metrics format used.
Must be at least 1
characters long
Must be at most 128
characters long
Type: object
JSON object not covered by another metrics format.
Type: array
Configurations required for exploiting this vulnerability.
Must contain a minimum of 1
items
All items must be unique
Each item of this array must be:
Type: object
Text in a particular language with optional alternate markup or formatted representation (e.g., Markdown) or embedded media.
Same definition as description
Type: array
Workarounds and mitigations for this vulnerability.
Must contain a minimum of 1
items
All items must be unique
Each item of this array must be:
Type: object
Text in a particular language with optional alternate markup or formatted representation (e.g., Markdown) or embedded media.
Same definition as description
Type: array
Information about solutions or remediations available for this vulnerability.
Must contain a minimum of 1
items
All items must be unique
Each item of this array must be:
Type: object
Text in a particular language with optional alternate markup or formatted representation (e.g., Markdown) or embedded media.
Same definition as description
Type: array
Information about exploits of the vulnerability.
Must contain a minimum of 1
items
All items must be unique
Each item of this array must be:
Type: object
Text in a particular language with optional alternate markup or formatted representation (e.g., Markdown) or embedded media.
Same definition as description
Type: array of object
This is timeline information for significant events about this vulnerability or changes to the CVE Record.
Must contain a minimum of 1
items
All items must be unique
Each item of this array must be:
Type: object
No Additional Properties
Type: string
Timestamp representing when the event in the timeline occurred. The timestamp format is based on RFC3339 and ISO ISO8601, with an optional timezone. yyyy-MM-ddTHH:mm:ss[+-]ZH:ZM - if the timezone offset is not given, GMT (+00:00) is assumed.
Same definition as dateUpdated
Type: string Default: "en"
The language used in the description of the event. The language field is included so that CVE Records can support translations. The value must be a BCP 47 language code.
Same definition as lang
Type: string
A summary of the event.
Must be at least 1
characters long
Must be at most 4096
characters long
Type: array of object
Statements acknowledging specific people, organizations, or tools recognizing the work done in researching, discovering, remediating or helping with activities related to this CVE.
Must contain a minimum of 1
items
All items must be unique
Each item of this array must be:
Type: object
No Additional Properties
Type: string Default: "en"
The language used when describing the credits. The language field is included so that CVE Records can support translations. The value must be a BCP 47 language code.
Same definition as lang
Type: string
Must be at least 1
characters long
Must be at most 4096
characters long
Type: string
UUID of the user being credited if present in the CVE User Registry (optional). This UUID can be used to lookup the user record in the user registry service.
Same definition as assignerOrgId
Type: enum (of string) Default: "finder"
Type or role of the entity being credited (optional). finder: identifies the vulnerability.
reporter: notifies the vendor of the vulnerability to a CNA.
analyst: validates the vulnerability to ensure accuracy or severity.
coordinator: facilitates the coordinated response process.
remediation developer: prepares a code change or other remediation plans.
remediation reviewer: reviews vulnerability remediation plans or code changes for effectiveness and completeness.
remediation verifier: tests and verifies the vulnerability or its remediation.
tool: names of tools used in vulnerability discovery or identification.
sponsor: supports the vulnerability identification or remediation activities.
Must be one of:
- "finder"
- "reporter"
- "analyst"
- "coordinator"
- "remediation developer"
- "remediation reviewer"
- "remediation verifier"
- "tool"
- "sponsor"
- "other"
Type: object
This is the source information (who discovered it, who researched it, etc.) and optionally a chain of CNA information (e.g. the originating CNA and subsequent parent CNAs who have processed it before it arrives at the MITRE root).
Must contain: IF this is in the root level it MUST contain a CNA_chain entry, IF this source entry is NOT in the root (e.g. it is part of a vendor statement) then it must contain at least one type of data entry.
Type: array of object
List of taxonomy items related to the vulnerability.
Must contain a minimum of 1
items
All items must be unique
Each item of this array must be:
Type: object
A taxonomy mapping object identifies the taxonomy by a name and version (eg., ATT&CK v13.1, CVSS 3.1, CWE 4.12) along with a list of relations relevant to this CVE.
No Additional Properties
Type: string
The name of the taxonomy, eg., ATT&CK, D3FEND, CWE, CVSS
Must be at least 1
characters long
Must be at most 128
characters long
Type: string
The version of taxonomy the identifiers come from.
Must be at least 1
characters long
Must be at most 128
characters long
Type: array of object
List of relationships to the taxonomy for the vulnerability.
Must contain a minimum of 1
items
All items must be unique
Each item of this array must be:
Type: object
A relationship between the taxonomy and the CVE or two taxonomy items.
No Additional Properties
Type: string
Identifier of the item in the taxonomy. Used as the subject of the relationship.
Must be at least 1
characters long
Must be at most 2048
characters long
Type: string
A description of the relationship.
Must be at least 1
characters long
Must be at most 128
characters long
Type: string
The target of the relationship. Can be the CVE ID or another taxonomy identifier.
Must be at least 1
characters long
Must be at most 2048
characters long
All property whose name matches the following regular expression must respect the following conditions
Property name regular expression: ^x_[^.]*$
Type: object
Type: array
Must contain a minimum of 1
items
All items must be unique
Each item of this array must be:
Type: object
An object containing the vulnerability information provided by an Authorized Data Publisher (ADP). Since multiple ADPs can provide information for a CVE ID, an ADP container must indicate which ADP is the source of the information in the object.
No Additional Properties
Type: object
Details related to the information container provider (CNA or ADP).
Same definition as providerMetadata
Type: string
If known, the date/time the vulnerability was disclosed publicly.
Same definition as dateUpdated
Type: string
A title, headline, or a brief phrase summarizing the information in an ADP container.
Must be at least 1
characters long
Must be at most 256
characters long
Type: array
A list of multi-lingual descriptions of the vulnerability. E.g., [PROBLEMTYPE] in [COMPONENT] in [VENDOR] [PRODUCT] [VERSION] on [PLATFORMS] allows [ATTACKER] to [IMPACT] via [VECTOR]. OR [COMPONENT] in [VENDOR] [PRODUCT] [VERSION] [ROOT CAUSE], which allows [ATTACKER] to [IMPACT] via [VECTOR].
Same definition as descriptions
Type: array of object
This is problem type information (e.g. CWE identifier). Must contain: At least one entry, can be text, OWASP, CWE, please note that while only one is required you can use more than one (or indeed all three) as long as they are correct). (CNA requirement: [PROBLEMTYPE]).
Same definition as problemTypes
Type: array
This is reference data in the form of URLs or file objects (uuencoded and embedded within the JSON file, exact format to be decided, e.g. we may require a compressed format so the objects require unpacking before they are "dangerous").
Same definition as references
Type: array
Configurations required for exploiting this vulnerability.
Same definition as configurations
Type: array
Information about solutions or remediations available for this vulnerability.
Same definition as solutions
Type: array of object
This is timeline information for significant events about this vulnerability or changes to the CVE Record.
Same definition as timeline
Type: array of object
Statements acknowledging specific people, organizations, or tools recognizing the work done in researching, discovering, remediating or helping with activities related to this CVE.
Same definition as credits
Type: object
This is the source information (who discovered it, who researched it, etc.) and optionally a chain of CNA information (e.g. the originating CNA and subsequent parent CNAs who have processed it before it arrives at the MITRE root).
Must contain: IF this is in the root level it MUST contain a CNA_chain entry, IF this source entry is NOT in the root (e.g. it is part of a vendor statement) then it must contain at least one type of data entry.
Same definition as source
Type: array of object
List of taxonomy items related to the vulnerability.
Same definition as taxonomyMappings
All property whose name matches the following regular expression must respect the following conditions
Property name regular expression: ^x_[^.]*$
Type: object
Type: object
If the CVE ID and associated CVE Record should no longer be used, the CVE Record is placed in the Rejected state. A Rejected CVE Record remains on the CVE List so that users can know when it is invalid.
No Additional Properties
Type: enum (of string)
Indicates the type of information represented in the JSON instance.
Same definition as dataType
Type: enum (of string)
The version of the schema being used. Used to support multiple versions of this format.
Same definition as dataVersion
Type: object
This is meta data about the CVE ID such as the CVE ID, who requested it, who assigned it, when it was requested, the current state (PUBLISHED, REJECTED, etc.) and so on. These fields are controlled by the CVE Services.
No Additional Properties
Type: string
The UUID for the organization to which the CVE ID was originally assigned.
Same definition as assignerOrgId
Type: string
The short name for the organization to which the CVE ID was originally assigned.
Same definition as assignerShortName
Type: integer
The system of record causes this to start at 1, and increment by 1 each time a submission from a data provider changes this CVE Record. The incremented value moves to the Rejected schema upon a PUBLISHED->REJECTED transition, and moves to the Published schema upon a REJECTED->PUBLISHED transition.
Value must be greater or equal to 1
Type: string
The date/time the CVE Record was first published in the CVE List.
Same definition as dateUpdated
Type: enum (of string)
State of CVE - PUBLISHED, REJECTED.
Must be one of:
- "REJECTED"
Type: string
The date/time this CVE ID was reserved in the CVE automation workgroup services system. Disclaimer: This date reflects when the CVE ID was reserved, and does not necessarily indicate when this vulnerability was discovered, shared with the affected vendor, publicly disclosed, or updated in CVE.
Same definition as dateUpdated
Type: object
A set of structures (called containers) used to store vulnerability information related to a specific CVE ID provided by a specific organization participating in the CVE program. Each container includes information provided by a different source.
At minimum, a 'cna' container containing the vulnerability information provided by the CNA who initially assigned the CVE ID must be included.
There can only be one 'cna' container, as there can only be one assigning CNA.
No Additional Properties
Type: object
An object containing the vulnerability information provided by a CVE Numbering Authority (CNA) for a rejected CVE ID. There can only be one CNA container per CVE record since there can only be one assigning CNA.
No Additional Properties
Type: object
Details related to the information container provider (CNA or ADP).
Same definition as providerMetadata
Type: array
Contains an array of CVE IDs that this CVE ID was rejected in favor of because this CVE ID was assigned to the vulnerabilities.
Must contain a minimum of 1
items
All items must be unique
Each item of this array must be:
All property whose name matches the following regular expression must respect the following conditions
Property name regular expression: ^x_[^.]*$
Type: object
The non-inclusive upper limit of the range. This is the least version NOT in the range. The usual version syntax is expanded to allow a pattern to end in an asterisk (*)
, indicating an arbitrarily large number in the version ordering. For example, {version: 1.0 lessThan: 1.*}
would describe the entire 1.X branch for most range kinds, and {version: 2.0, lessThan: *}
describes all versions starting at 2.0, including 3.0, 5.1, and so on. Only one of lessThan and lessThanOrEqual should be specified.
The inclusive upper limit of the range. This is the greatest version contained in the range. Only one of lessThan and lessThanOrEqual should be specified. For example, {version: 1.0, lessThanOrEqual: 1.3}
covers all versions from 1.0 up to and including 1.3.
A list of status changes that take place during the range. The array should be sorted in increasing order by the 'at' field, according to the versionType, but clients must re-sort the list themselves rather than assume it is sorted.
Must contain a minimum of 1
items
All items must be unique
The start of a single status change during the range.
No Additional PropertiesThe new status in the range starting at the given version.
Same definition as defaultStatusThis is problem type information (e.g. CWE identifier). Must contain: At least one entry, can be text, OWASP, CWE, please note that while only one is required you can use more than one (or indeed all three) as long as they are correct). (CNA requirement: [PROBLEMTYPE]).
Must contain a minimum of 1
items
All items must be unique
Must contain a minimum of 1
items
All items must be unique
Text description of problemType, or title from CWE or OWASP.
Must be at least 1
characters long
Must be at most 4096
characters long
CWE ID of the CWE that best describes this problemType entry.
Must match regular expression:^CWE-[1-9][0-9]*$
Must be at least 5
characters long
Must be at most 9
characters long
Problemtype source, text, OWASP, CWE, etc.,
Must be at least 1
characters long
Must be at most 128
characters long
This is reference data in the form of URLs or file objects (uuencoded and embedded within the JSON file, exact format to be decided, e.g. we may require a compressed format so the objects require unpacking before they are "dangerous").
Same definition as referencesThis is reference data in the form of URLs or file objects (uuencoded and embedded within the JSON file, exact format to be decided, e.g. we may require a compressed format so the objects require unpacking before they are "dangerous").
Must contain a minimum of 1
items
Must contain a maximum of 512
items
All items must be unique
The uniform resource locator (URL), according to RFC 3986, that can be used to retrieve the referenced resource.
Same definition as collectionURLUser created name for the reference, often the title of the page.
Must be at least 1
characters long
Must be at most 512
characters long
Collection of impacts of this vulnerability.
Must contain a minimum of 1
items
All items must be unique
This is impact type information (e.g. a text description.
No Additional PropertiesCAPEC ID that best relates to this impact.
Must match regular expression:^CAPEC-[1-9][0-9]{0,4}$
Must be at least 7
characters long
Must be at most 11
characters long
Prose description of the impact scenario. At a minimum provide the description given by CAPEC.
Same definition as descriptionsCollection of impact scores with attribution.
Must contain a minimum of 1
items
All items must be unique
This is impact type information (e.g. a text description, CVSSv2, CVSSv3, CVSSV4, etc.). Must contain: At least one entry, can be text, CVSSv2, CVSSv3, others may be added.
No Additional PropertiesName of the scoring format. This provides a bit of future proofing. Additional properties are not prohibited, so this will support the inclusion of proprietary formats. It also provides an easy future conversion mechanism when future score formats become part of the schema. example: cvssV44, format = 'cvssV44', other = cvssV4_4 JSON object. In the future, the other properties can be converted to score properties when they become part of the schema.
Must be at least 1
characters long
Must be at most 64
characters long
Description of the scenarios this metrics object applies to. If no specific scenario is given, GENERAL is used as the default and applies when no more specific metric matches.
Must contain a minimum of 1
items
All items must be unique
Description of the scenario this metrics object applies to. If no specific scenario is given, GENERAL is used as the default and applies when no more specific metric matches.
Must be at least 1
characters long
Must be at most 4096
characters long
Value must be greater or equal to 0.0
and lesser or equal to 0.0
"NONE"
Value must be greater or equal to 0.1
and lesser or equal to 3.9
and a multiple of 0.1
"LOW"
Value must be greater or equal to 4.0
and lesser or equal to 6.9
and a multiple of 0.1
"MEDIUM"
Value must be greater or equal to 7.0
and lesser or equal to 8.9
and a multiple of 0.1
"HIGH"
Value must be greater or equal to 9.0
and lesser or equal to 10
and a multiple of 0.1
"CRITICAL"
CVSS Version
^CVSS:4[.]0/AV:[NALP]/AC:[LH]/AT:[NP]/PR:[NLH]/UI:[NPA]/VC:[HLN]/VI:[HLN]/VA:[HLN]/SC:[HLN]/SI:[HLN]/SA:[HLN](/E:[XAPU])?(/CR:[XHML])?(/IR:[XHML])?(/AR:[XHML])?(/MAV:[XNALP])?(/MAC:[XLH])?(/MAT:[XNP])?(/MPR:[XNLH])?(/MUI:[XNPA])?(/MVC:[XNLH])?(/MVI:[XNLH])?(/MVA:[XNLH])?(/MSC:[XNLH])?(/MSI:[XNLHS])?(/MSA:[XNLHS])?(/S:[XNP])?(/AU:[XNY])?(/R:[XAUI])?(/V:[XDC])?(/RE:[XLMH])?(/U:(X|Clear|Green|Amber|Red))?$
Value must be greater or equal to 0.0
and lesser or equal to 10.0
and a multiple of 0.1
CVSS Version
^CVSS:3[.]1/((AV:[NALP]|AC:[LH]|PR:[NLH]|UI:[NR]|S:[UC]|[CIA]:[NLH]|E:[XUPFH]|RL:[XOTWU]|RC:[XURC]|[CIA]R:[XLMH]|MAV:[XNALP]|MAC:[XLH]|MPR:[XNLH]|MUI:[XNR]|MS:[XUC]|M[CIA]:[XNLH])/)*(AV:[NALP]|AC:[LH]|PR:[NLH]|UI:[NR]|S:[UC]|[CIA]:[NLH]|E:[XUPFH]|RL:[XOTWU]|RC:[XURC]|[CIA]R:[XLMH]|MAV:[XNALP]|MAC:[XLH]|MPR:[XNLH]|MUI:[XNR]|MS:[XUC]|M[CIA]:[XNLH])$
Value must be greater or equal to 0
and lesser or equal to 10
CVSS Version
^CVSS:3[.]0/((AV:[NALP]|AC:[LH]|PR:[UNLH]|UI:[NR]|S:[UC]|[CIA]:[NLH]|E:[XUPFH]|RL:[XOTWU]|RC:[XURC]|[CIA]R:[XLMH]|MAV:[XNALP]|MAC:[XLH]|MPR:[XUNLH]|MUI:[XNR]|MS:[XUC]|M[CIA]:[XNLH])/)*(AV:[NALP]|AC:[LH]|PR:[UNLH]|UI:[NR]|S:[UC]|[CIA]:[NLH]|E:[XUPFH]|RL:[XOTWU]|RC:[XURC]|[CIA]R:[XLMH]|MAV:[XNALP]|MAC:[XLH]|MPR:[XUNLH]|MUI:[XNR]|MS:[XUC]|M[CIA]:[XNLH])$
Value must be greater or equal to 0
and lesser or equal to 10
CVSS Version
^((AV:[NAL]|AC:[LMH]|Au:[MSN]|[CIA]:[NPC]|E:(U|POC|F|H|ND)|RL:(OF|TF|W|U|ND)|RC:(UC|UR|C|ND)|CDP:(N|L|LM|MH|H|ND)|TD:(N|L|M|H|ND)|[CIA]R:(L|M|H|ND))/)*(AV:[NAL]|AC:[LMH]|Au:[MSN]|[CIA]:[NPC]|E:(U|POC|F|H|ND)|RL:(OF|TF|W|U|ND)|RC:(UC|UR|C|ND)|CDP:(N|L|LM|MH|H|ND)|TD:(N|L|M|H|ND)|[CIA]R:(L|M|H|ND))$
Value must be greater or equal to 0
and lesser or equal to 10
A non-standard impact description, may be prose or JSON block.
No Additional PropertiesName of the non-standard impact metrics format used.
Must be at least 1
characters long
Must be at most 128
characters long
JSON object not covered by another metrics format.
Configurations required for exploiting this vulnerability.
Must contain a minimum of 1
items
All items must be unique
Text in a particular language with optional alternate markup or formatted representation (e.g., Markdown) or embedded media.
Same definition as descriptionWorkarounds and mitigations for this vulnerability.
Must contain a minimum of 1
items
All items must be unique
Text in a particular language with optional alternate markup or formatted representation (e.g., Markdown) or embedded media.
Same definition as descriptionInformation about solutions or remediations available for this vulnerability.
Must contain a minimum of 1
items
All items must be unique
Text in a particular language with optional alternate markup or formatted representation (e.g., Markdown) or embedded media.
Same definition as descriptionInformation about exploits of the vulnerability.
Must contain a minimum of 1
items
All items must be unique
Text in a particular language with optional alternate markup or formatted representation (e.g., Markdown) or embedded media.
Same definition as descriptionThis is timeline information for significant events about this vulnerability or changes to the CVE Record.
Must contain a minimum of 1
items
All items must be unique
Timestamp representing when the event in the timeline occurred. The timestamp format is based on RFC3339 and ISO ISO8601, with an optional timezone. yyyy-MM-ddTHH:mm:ss[+-]ZH:ZM - if the timezone offset is not given, GMT (+00:00) is assumed.
Same definition as dateUpdatedThe language used in the description of the event. The language field is included so that CVE Records can support translations. The value must be a BCP 47 language code.
Same definition as langA summary of the event.
Must be at least 1
characters long
Must be at most 4096
characters long
Statements acknowledging specific people, organizations, or tools recognizing the work done in researching, discovering, remediating or helping with activities related to this CVE.
Must contain a minimum of 1
items
All items must be unique
The language used when describing the credits. The language field is included so that CVE Records can support translations. The value must be a BCP 47 language code.
Same definition as langMust be at least 1
characters long
Must be at most 4096
characters long
UUID of the user being credited if present in the CVE User Registry (optional). This UUID can be used to lookup the user record in the user registry service.
Same definition as assignerOrgIdType or role of the entity being credited (optional). finder: identifies the vulnerability.
reporter: notifies the vendor of the vulnerability to a CNA.
analyst: validates the vulnerability to ensure accuracy or severity.
coordinator: facilitates the coordinated response process.
remediation developer: prepares a code change or other remediation plans.
remediation reviewer: reviews vulnerability remediation plans or code changes for effectiveness and completeness.
remediation verifier: tests and verifies the vulnerability or its remediation.
tool: names of tools used in vulnerability discovery or identification.
sponsor: supports the vulnerability identification or remediation activities.
This is the source information (who discovered it, who researched it, etc.) and optionally a chain of CNA information (e.g. the originating CNA and subsequent parent CNAs who have processed it before it arrives at the MITRE root).
Must contain: IF this is in the root level it MUST contain a CNA_chain entry, IF this source entry is NOT in the root (e.g. it is part of a vendor statement) then it must contain at least one type of data entry.
List of taxonomy items related to the vulnerability.
Must contain a minimum of 1
items
All items must be unique
A taxonomy mapping object identifies the taxonomy by a name and version (eg., ATT&CK v13.1, CVSS 3.1, CWE 4.12) along with a list of relations relevant to this CVE.
No Additional PropertiesThe name of the taxonomy, eg., ATT&CK, D3FEND, CWE, CVSS
Must be at least 1
characters long
Must be at most 128
characters long
The version of taxonomy the identifiers come from.
Must be at least 1
characters long
Must be at most 128
characters long
List of relationships to the taxonomy for the vulnerability.
Must contain a minimum of 1
items
All items must be unique
A relationship between the taxonomy and the CVE or two taxonomy items.
No Additional PropertiesIdentifier of the item in the taxonomy. Used as the subject of the relationship.
Must be at least 1
characters long
Must be at most 2048
characters long
A description of the relationship.
Must be at least 1
characters long
Must be at most 128
characters long
The target of the relationship. Can be the CVE ID or another taxonomy identifier.
Must be at least 1
characters long
Must be at most 2048
characters long
All property whose name matches the following regular expression must respect the following conditions
Property name regular expression:^x_[^.]*$
Must contain a minimum of 1
items
All items must be unique
An object containing the vulnerability information provided by an Authorized Data Publisher (ADP). Since multiple ADPs can provide information for a CVE ID, an ADP container must indicate which ADP is the source of the information in the object.
No Additional PropertiesDetails related to the information container provider (CNA or ADP).
Same definition as providerMetadataIf known, the date/time the vulnerability was disclosed publicly.
Same definition as dateUpdatedA title, headline, or a brief phrase summarizing the information in an ADP container.
Must be at least 1
characters long
Must be at most 256
characters long
A list of multi-lingual descriptions of the vulnerability. E.g., [PROBLEMTYPE] in [COMPONENT] in [VENDOR] [PRODUCT] [VERSION] on [PLATFORMS] allows [ATTACKER] to [IMPACT] via [VECTOR]. OR [COMPONENT] in [VENDOR] [PRODUCT] [VERSION] [ROOT CAUSE], which allows [ATTACKER] to [IMPACT] via [VECTOR].
Same definition as descriptionsThis is problem type information (e.g. CWE identifier). Must contain: At least one entry, can be text, OWASP, CWE, please note that while only one is required you can use more than one (or indeed all three) as long as they are correct). (CNA requirement: [PROBLEMTYPE]).
Same definition as problemTypesThis is reference data in the form of URLs or file objects (uuencoded and embedded within the JSON file, exact format to be decided, e.g. we may require a compressed format so the objects require unpacking before they are "dangerous").
Same definition as referencesConfigurations required for exploiting this vulnerability.
Same definition as configurationsInformation about solutions or remediations available for this vulnerability.
Same definition as solutionsThis is timeline information for significant events about this vulnerability or changes to the CVE Record.
Same definition as timelineStatements acknowledging specific people, organizations, or tools recognizing the work done in researching, discovering, remediating or helping with activities related to this CVE.
Same definition as creditsThis is the source information (who discovered it, who researched it, etc.) and optionally a chain of CNA information (e.g. the originating CNA and subsequent parent CNAs who have processed it before it arrives at the MITRE root).
Must contain: IF this is in the root level it MUST contain a CNA_chain entry, IF this source entry is NOT in the root (e.g. it is part of a vendor statement) then it must contain at least one type of data entry.
List of taxonomy items related to the vulnerability.
Same definition as taxonomyMappingsAll property whose name matches the following regular expression must respect the following conditions
Property name regular expression:^x_[^.]*$
If the CVE ID and associated CVE Record should no longer be used, the CVE Record is placed in the Rejected state. A Rejected CVE Record remains on the CVE List so that users can know when it is invalid.
No Additional PropertiesIndicates the type of information represented in the JSON instance.
Same definition as dataTypeThe version of the CVE schema used for validating this record. Used to support multiple versions of this format.
Same definition as dataVersionThis is meta data about the CVE ID such as the CVE ID, who requested it, who assigned it, when it was requested, the current state (PUBLISHED, REJECTED, etc.) and so on. These fields are controlled by the CVE Services.
No Additional PropertiesThe UUID for the organization to which the CVE ID was originally assigned.
Same definition as assignerOrgIdThe short name for the organization to which the CVE ID was originally assigned.
Same definition as assignerShortNameThe system of record causes this to start at 1, and increment by 1 each time a submission from a data provider changes this CVE Record. The incremented value moves to the Rejected schema upon a PUBLISHED->REJECTED transition, and moves to the Published schema upon a REJECTED->PUBLISHED transition.
Value must be greater or equal to 1
The date/time the CVE Record was first published in the CVE List.
Same definition as dateUpdatedState of CVE - PUBLISHED, REJECTED.
The date/time this CVE ID was reserved in the CVE automation workgroup services system. Disclaimer: This date reflects when the CVE ID was reserved, and does not necessarily indicate when this vulnerability was discovered, shared with the affected vendor, publicly disclosed, or updated in CVE.
Same definition as dateUpdatedA set of structures (called containers) used to store vulnerability information related to a specific CVE ID provided by a specific organization participating in the CVE program. Each container includes information provided by a different source.
At minimum, a 'cna' container containing the vulnerability information provided by the CNA who initially assigned the CVE ID must be included.
There can only be one 'cna' container, as there can only be one assigning CNA.
An object containing the vulnerability information provided by a CVE Numbering Authority (CNA) for a rejected CVE ID. There can only be one CNA container per CVE record since there can only be one assigning CNA.
No Additional PropertiesDetails related to the information container provider (CNA or ADP).
Same definition as providerMetadataContains an array of CVE IDs that this CVE ID was rejected in favor of because this CVE ID was assigned to the vulnerabilities.
Must contain a minimum of 1
items
All items must be unique
All property whose name matches the following regular expression must respect the following conditions
Property name regular expression:^x_[^.]*$
CVE_RECORD
"},{"t":"list_item","d":4,"p":{"lines":[3,4]},"v":"dataVersion 5.1
"},{"t":"list_item","d":4,"p":{"lines":[4,5]},"v":"cveMetadata","c":[{"t":"list_item","d":6,"p":{"lines":[5,6]},"v":"cveId"},{"t":"list_item","d":6,"p":{"lines":[6,7]},"v":"assignerOrgId"},{"t":"list_item","d":6,"p":{"lines":[7,8]},"v":"assignerShortName"},{"t":"list_item","d":6,"p":{"lines":[8,9]},"v":"requesterUserId"},{"t":"list_item","d":6,"p":{"lines":[9,10]},"v":"dateUpdated"},{"t":"list_item","d":6,"p":{"lines":[10,11]},"v":"serial"},{"t":"list_item","d":6,"p":{"lines":[11,12]},"v":"dateReserved"},{"t":"list_item","d":6,"p":{"lines":[12,13]},"v":"datePublished"},{"t":"list_item","d":6,"p":{"lines":[13,14]},"v":"state PUBLISHED
"}]},{"t":"list_item","d":4,"p":{"lines":[14,15]},"v":"containers","c":[{"t":"list_item","d":6,"p":{"lines":[15,16]},"v":"cna","c":[{"t":"list_item","d":8,"p":{"lines":[16,17]},"v":"providerMetadata","c":[{"t":"list_item","d":10,"p":{"lines":[17,18]},"v":"orgId"},{"t":"list_item","d":10,"p":{"lines":[18,19]},"v":"shortName"},{"t":"list_item","d":10,"p":{"lines":[19,20]},"v":"dateUpdated"}]},{"t":"list_item","d":8,"p":{"lines":[20,21]},"v":"dateAssigned"},{"t":"list_item","d":8,"p":{"lines":[21,22]},"v":"datePublic"},{"t":"list_item","d":8,"p":{"lines":[22,23]},"v":"title"},{"t":"list_item","d":8,"p":{"lines":[23,24]},"v":"descriptions []","c":[{"t":"list_item","d":10,"p":{"lines":[24,25]},"v":"lang"},{"t":"list_item","d":10,"p":{"lines":[25,26]},"v":"value"},{"t":"list_item","d":10,"p":{"lines":[26,27],"f":true},"v":"supportingMedia []","c":[{"t":"list_item","d":12,"p":{"lines":[27,28]},"v":"type e.g., text/markdown
"},{"t":"list_item","d":12,"p":{"lines":[28,29]},"v":"base64 ☯"},{"t":"list_item","d":12,"p":{"lines":[29,30]},"v":"value"}]}]},{"t":"list_item","d":8,"p":{"lines":[30,31]},"v":"affected []","c":[{"t":"list_item","d":10,"p":{"lines":[31,32]},"v":"vendor"},{"t":"list_item","d":10,"p":{"lines":[32,33]},"v":"product"},{"t":"list_item","d":10,"p":{"lines":[33,34]},"v":"collectionURL e.g., https://access.redhat.com/downloads/content/package-browser
"},{"t":"list_item","d":10,"p":{"lines":[34,35]},"v":"packageName"},{"t":"list_item","d":10,"p":{"lines":[35,36]},"v":"cpes []"},{"t":"list_item","d":10,"p":{"lines":[36,37]},"v":"modules []"},{"t":"list_item","d":10,"p":{"lines":[37,38]},"v":"programFiles []"},{"t":"list_item","d":10,"p":{"lines":[38,39]},"v":"programRoutines []","c":[{"t":"list_item","d":12,"p":{"lines":[39,40]},"v":"name"}]},{"t":"list_item","d":10,"p":{"lines":[40,41]},"v":"platforms []"},{"t":"list_item","d":10,"p":{"lines":[41,42]},"v":"repo"},{"t":"list_item","d":10,"p":{"lines":[42,43]},"v":"defaultStatus affected
unaffected
unknown
"},{"t":"list_item","d":10,"p":{"lines":[43,44]},"v":"versions []","c":[{"t":"list_item","d":12,"p":{"lines":[44,45]},"v":"version"},{"t":"list_item","d":12,"p":{"lines":[45,46]},"v":"status affected
unaffected
unknown
"},{"t":"list_item","d":12,"p":{"lines":[46,47]},"v":"versionType e.g., custom
"},{"t":"list_item","d":12,"p":{"lines":[47,48]},"v":"lessThan"},{"t":"list_item","d":12,"p":{"lines":[48,49]},"v":"lessThanOrEqual"},{"t":"list_item","d":12,"p":{"lines":[49,50]},"v":"changes []","c":[{"t":"list_item","d":14,"p":{"lines":[50,51]},"v":"at"},{"t":"list_item","d":14,"p":{"lines":[51,52]},"v":"status affected
unaffected
unknown
"}]}]}]},{"t":"list_item","d":8,"p":{"lines":[52,53]},"v":"problemTypes []","c":[{"t":"list_item","d":10,"p":{"lines":[53,54]},"v":"descriptions []","c":[{"t":"list_item","d":12,"p":{"lines":[54,55]},"v":"lang"},{"t":"list_item","d":12,"p":{"lines":[55,56]},"v":"description"},{"t":"list_item","d":12,"p":{"lines":[56,57]},"v":"cweId"},{"t":"list_item","d":12,"p":{"lines":[57,58]},"v":"type"},{"t":"list_item","d":12,"p":{"lines":[58,59]},"v":"references []","c":[{"t":"list_item","d":14,"p":{"lines":[59,60]},"v":"url"},{"t":"list_item","d":14,"p":{"lines":[60,61]},"v":"name"},{"t":"list_item","d":14,"p":{"lines":[61,62],"f":true},"v":"tags []"}]}]}]},{"t":"list_item","d":8,"p":{"lines":[62,63]},"v":"references []","c":[{"t":"list_item","d":10,"p":{"lines":[63,64]},"v":"url"},{"t":"list_item","d":10,"p":{"lines":[64,65]},"v":"name"},{"t":"list_item","d":10,"p":{"lines":[65,66],"f":true},"v":"tags []"}]},{"t":"list_item","d":8,"p":{"lines":[66,67],"f":true},"v":"impacts []","c":[{"t":"list_item","d":10,"p":{"lines":[67,68]},"v":"capecId"},{"t":"list_item","d":10,"p":{"lines":[68,69]},"v":"descriptions []","c":[{"t":"list_item","d":12,"p":{"lines":[69,70]},"v":"lang"},{"t":"list_item","d":12,"p":{"lines":[70,71]},"v":"value"},{"t":"list_item","d":12,"p":{"lines":[71,72],"f":true},"v":"supportingMedia []","c":[{"t":"list_item","d":14,"p":{"lines":[72,73]},"v":"type e.g., text/markdown
"},{"t":"list_item","d":14,"p":{"lines":[73,74]},"v":"base64 ☯"},{"t":"list_item","d":14,"p":{"lines":[74,75]},"v":"value"}]}]}]},{"t":"list_item","d":8,"p":{"lines":[75,76],"f":true},"v":"metrics []","c":[{"t":"list_item","d":10,"p":{"lines":[76,77]},"v":"format"},{"t":"list_item","d":10,"p":{"lines":[77,78]},"v":"scenarios []","c":[{"t":"list_item","d":12,"p":{"lines":[78,79]},"v":"lang"},{"t":"list_item","d":12,"p":{"lines":[79,80]},"v":"value"}]},{"t":"list_item","d":10,"p":{"lines":[80,81]},"v":"cvssV4_0","c":[{"t":"list_item","d":12,"p":{"lines":[81,82]},"v":"version 4.0
"},{"t":"list_item","d":12,"p":{"lines":[82,83]},"v":"vectorString"},{"t":"list_item","d":12,"p":{"lines":[83,84]},"v":"attackVector NETWORK
ADJACENT
LOCAL
PHYSICAL
"},{"t":"list_item","d":12,"p":{"lines":[84,85]},"v":"attackComplexity HIGH
LOW
"},{"t":"list_item","d":12,"p":{"lines":[85,86]},"v":"attackRequirements NONE
PRESENT
"},{"t":"list_item","d":12,"p":{"lines":[86,87]},"v":"privilegesRequired HIGH
LOW
NONE
"},{"t":"list_item","d":12,"p":{"lines":[87,88]},"v":"userInteraction NONE
PASSIVE
ACTIVE
"},{"t":"list_item","d":12,"p":{"lines":[88,89]},"v":"vulnConfidentialityImpact NONE
LOW
HIGH
"},{"t":"list_item","d":12,"p":{"lines":[89,90]},"v":"vulnIntegrityImpact NONE
LOW
HIGH
"},{"t":"list_item","d":12,"p":{"lines":[90,91]},"v":"vulnAvailabilityImpact NONE
LOW
HIGH
"},{"t":"list_item","d":12,"p":{"lines":[91,92]},"v":"subConfidentialityImpact NONE
LOW
HIGH
"},{"t":"list_item","d":12,"p":{"lines":[92,93]},"v":"subIntegrityImpact NONE
LOW
HIGH
"},{"t":"list_item","d":12,"p":{"lines":[93,94]},"v":"subAvailabilityImpact NONE
LOW
HIGH
"},{"t":"list_item","d":12,"p":{"lines":[94,95]},"v":"exploitMaturity UNREPORTED
PROOF_OF_CONCEPT
ATTACKED
NOT_DEFINED
"},{"t":"list_item","d":12,"p":{"lines":[95,96]},"v":"confidentialityRequirement LOW
MEDIUM
HIGH
NOT_DEFINED
"},{"t":"list_item","d":12,"p":{"lines":[96,97]},"v":"integrityRequirement LOW
MEDIUM
HIGH
NOT_DEFINED
"},{"t":"list_item","d":12,"p":{"lines":[97,98]},"v":"availabilityRequirement LOW
MEDIUM
HIGH
NOT_DEFINED
"},{"t":"list_item","d":12,"p":{"lines":[98,99]},"v":"modifiedAttackVector NETWORK
ADJACENT
LOCAL
PHYSICAL
NOT_DEFINED
"},{"t":"list_item","d":12,"p":{"lines":[99,100]},"v":"modifiedAttackComplexity HIGH
LOW
NOT_DEFINED
"},{"t":"list_item","d":12,"p":{"lines":[100,101]},"v":"modifiedAttackRequirements NONE
PRESENT
NOT_DEFINED
"},{"t":"list_item","d":12,"p":{"lines":[101,102]},"v":"modifiedPrivilegesRequired HIGH
LOW
NONE
NOT_DEFINED
"},{"t":"list_item","d":12,"p":{"lines":[102,103]},"v":"modifiedUserInteraction NONE
PASSIVE
ACTIVE
NOT_DEFINED
"},{"t":"list_item","d":12,"p":{"lines":[103,104]},"v":"modifiedVulnConfidentialityImpact NONE
LOW
HIGH
NOT_DEFINED
"},{"t":"list_item","d":12,"p":{"lines":[104,105]},"v":"modifiedVulnIntegrityImpact NONE
LOW
HIGH
NOT_DEFINED
"},{"t":"list_item","d":12,"p":{"lines":[105,106]},"v":"modifiedVulnAvailabilityImpact NONE
LOW
HIGH
NOT_DEFINED
"},{"t":"list_item","d":12,"p":{"lines":[106,107]},"v":"modifiedSubConfidentialityImpact NONE
LOW
HIGH
NOT_DEFINED
"},{"t":"list_item","d":12,"p":{"lines":[107,108]},"v":"modifiedSubIntegrityImpact NONE
LOW
HIGH
SAFETY
NOT_DEFINED
"},{"t":"list_item","d":12,"p":{"lines":[108,109]},"v":"modifiedSubAvailabilityImpact NONE
LOW
HIGH
SAFETY
NOT_DEFINED
"},{"t":"list_item","d":12,"p":{"lines":[109,110]},"v":"Safety NEGLIGIBLE
PRESENT
NOT_DEFINED
"},{"t":"list_item","d":12,"p":{"lines":[110,111]},"v":"Automatable NO
YES
NOT_DEFINED
"},{"t":"list_item","d":12,"p":{"lines":[111,112]},"v":"Recovery AUTOMATIC
USER
IRRECOVERABLE
NOT_DEFINED
"},{"t":"list_item","d":12,"p":{"lines":[112,113]},"v":"valueDensity DIFFUSE
CONCENTRATED
NOT_DEFINED
"},{"t":"list_item","d":12,"p":{"lines":[113,114]},"v":"vulnerabilityResponseEffort LOW
MODERATE
HIGH
NOT_DEFINED
"},{"t":"list_item","d":12,"p":{"lines":[114,115]},"v":"providerUrgency CLEAR
GREEN
AMBER
RED
NOT_DEFINED
","c":[{"t":"list_item","d":14,"p":{"lines":[115,116]},"v":"baseScore"},{"t":"list_item","d":14,"p":{"lines":[116,117]},"v":"baseSeverity"},{"t":"list_item","d":14,"p":{"lines":[117,118]},"v":"baseScore"},{"t":"list_item","d":14,"p":{"lines":[118,119]},"v":"baseSeverity"},{"t":"list_item","d":14,"p":{"lines":[119,120]},"v":"baseScore"},{"t":"list_item","d":14,"p":{"lines":[120,121]},"v":"baseSeverity"},{"t":"list_item","d":14,"p":{"lines":[121,122]},"v":"baseScore"},{"t":"list_item","d":14,"p":{"lines":[122,123]},"v":"baseSeverity"},{"t":"list_item","d":14,"p":{"lines":[123,124]},"v":"baseScore"},{"t":"list_item","d":14,"p":{"lines":[124,125]},"v":"baseSeverity"},{"t":"list_item","d":14,"p":{"lines":[125,126]},"v":"threatScore"},{"t":"list_item","d":14,"p":{"lines":[126,127]},"v":"threatSeverity"},{"t":"list_item","d":14,"p":{"lines":[127,128]},"v":"threatScore"},{"t":"list_item","d":14,"p":{"lines":[128,129]},"v":"threatSeverity"},{"t":"list_item","d":14,"p":{"lines":[129,130]},"v":"threatScore"},{"t":"list_item","d":14,"p":{"lines":[130,131]},"v":"threatSeverity"},{"t":"list_item","d":14,"p":{"lines":[131,132]},"v":"threatScore"},{"t":"list_item","d":14,"p":{"lines":[132,133]},"v":"threatSeverity"},{"t":"list_item","d":14,"p":{"lines":[133,134]},"v":"threatScore"},{"t":"list_item","d":14,"p":{"lines":[134,135]},"v":"threatSeverity"},{"t":"list_item","d":14,"p":{"lines":[135,136]},"v":"environmentalScore"},{"t":"list_item","d":14,"p":{"lines":[136,137]},"v":"environmentalSeverity"},{"t":"list_item","d":14,"p":{"lines":[137,138]},"v":"environmentalScore"},{"t":"list_item","d":14,"p":{"lines":[138,139]},"v":"environmentalSeverity"},{"t":"list_item","d":14,"p":{"lines":[139,140]},"v":"environmentalScore"},{"t":"list_item","d":14,"p":{"lines":[140,141]},"v":"environmentalSeverity"},{"t":"list_item","d":14,"p":{"lines":[141,142]},"v":"environmentalScore"},{"t":"list_item","d":14,"p":{"lines":[142,143]},"v":"environmentalSeverity"},{"t":"list_item","d":14,"p":{"lines":[143,144]},"v":"environmentalScore"},{"t":"list_item","d":14,"p":{"lines":[144,145]},"v":"environmentalSeverity"}]}]},{"t":"list_item","d":10,"p":{"lines":[145,146],"f":true},"v":"cvssV3_1 ","c":[{"t":"list_item","d":12,"p":{"lines":[146,147]},"v":"version 3.1
"},{"t":"list_item","d":12,"p":{"lines":[147,148]},"v":"vectorString"},{"t":"list_item","d":12,"p":{"lines":[148,149]},"v":"attackVector NETWORK
ADJACENT_NETWORK
LOCAL
PHYSICAL
"},{"t":"list_item","d":12,"p":{"lines":[149,150]},"v":"attackComplexity HIGH
LOW
"},{"t":"list_item","d":12,"p":{"lines":[150,151]},"v":"privilegesRequired HIGH
LOW
NONE
"},{"t":"list_item","d":12,"p":{"lines":[151,152]},"v":"userInteraction NONE
REQUIRED
"},{"t":"list_item","d":12,"p":{"lines":[152,153]},"v":"scope UNCHANGED
CHANGED
"},{"t":"list_item","d":12,"p":{"lines":[153,154]},"v":"confidentialityImpact NONE
LOW
HIGH
"},{"t":"list_item","d":12,"p":{"lines":[154,155]},"v":"integrityImpact NONE
LOW
HIGH
"},{"t":"list_item","d":12,"p":{"lines":[155,156]},"v":"availabilityImpact NONE
LOW
HIGH
"},{"t":"list_item","d":12,"p":{"lines":[156,157]},"v":"baseScore"},{"t":"list_item","d":12,"p":{"lines":[157,158]},"v":"baseSeverity NONE
LOW
MEDIUM
HIGH
CRITICAL
"},{"t":"list_item","d":12,"p":{"lines":[158,159]},"v":"exploitCodeMaturity UNPROVEN
PROOF_OF_CONCEPT
FUNCTIONAL
HIGH
NOT_DEFINED
"},{"t":"list_item","d":12,"p":{"lines":[159,160]},"v":"remediationLevel OFFICIAL_FIX
TEMPORARY_FIX
WORKAROUND
UNAVAILABLE
NOT_DEFINED
"},{"t":"list_item","d":12,"p":{"lines":[160,161]},"v":"reportConfidence UNKNOWN
REASONABLE
CONFIRMED
NOT_DEFINED
"},{"t":"list_item","d":12,"p":{"lines":[161,162]},"v":"temporalScore"},{"t":"list_item","d":12,"p":{"lines":[162,163]},"v":"temporalSeverity NONE
LOW
MEDIUM
HIGH
CRITICAL
"},{"t":"list_item","d":12,"p":{"lines":[163,164]},"v":"confidentialityRequirement LOW
MEDIUM
HIGH
NOT_DEFINED
"},{"t":"list_item","d":12,"p":{"lines":[164,165]},"v":"integrityRequirement LOW
MEDIUM
HIGH
NOT_DEFINED
"},{"t":"list_item","d":12,"p":{"lines":[165,166]},"v":"availabilityRequirement LOW
MEDIUM
HIGH
NOT_DEFINED
"},{"t":"list_item","d":12,"p":{"lines":[166,167]},"v":"modifiedAttackVector NETWORK
ADJACENT_NETWORK
LOCAL
PHYSICAL
NOT_DEFINED
"},{"t":"list_item","d":12,"p":{"lines":[167,168]},"v":"modifiedAttackComplexity HIGH
LOW
NOT_DEFINED
"},{"t":"list_item","d":12,"p":{"lines":[168,169]},"v":"modifiedPrivilegesRequired HIGH
LOW
NONE
NOT_DEFINED
"},{"t":"list_item","d":12,"p":{"lines":[169,170]},"v":"modifiedUserInteraction NONE
REQUIRED
NOT_DEFINED
"},{"t":"list_item","d":12,"p":{"lines":[170,171]},"v":"modifiedScope UNCHANGED
CHANGED
NOT_DEFINED
"},{"t":"list_item","d":12,"p":{"lines":[171,172]},"v":"modifiedConfidentialityImpact NONE
LOW
HIGH
NOT_DEFINED
"},{"t":"list_item","d":12,"p":{"lines":[172,173]},"v":"modifiedIntegrityImpact NONE
LOW
HIGH
NOT_DEFINED
"},{"t":"list_item","d":12,"p":{"lines":[173,174]},"v":"modifiedAvailabilityImpact NONE
LOW
HIGH
NOT_DEFINED
"},{"t":"list_item","d":12,"p":{"lines":[174,175]},"v":"environmentalScore"},{"t":"list_item","d":12,"p":{"lines":[175,176]},"v":"environmentalSeverity NONE
LOW
MEDIUM
HIGH
CRITICAL
"}]},{"t":"list_item","d":10,"p":{"lines":[176,177],"f":true},"v":"cvssV3_0 ","c":[{"t":"list_item","d":12,"p":{"lines":[177,178]},"v":"version 3.0
"},{"t":"list_item","d":12,"p":{"lines":[178,179]},"v":"vectorString"},{"t":"list_item","d":12,"p":{"lines":[179,180]},"v":"attackVector NETWORK
ADJACENT_NETWORK
LOCAL
PHYSICAL
"},{"t":"list_item","d":12,"p":{"lines":[180,181]},"v":"attackComplexity HIGH
LOW
"},{"t":"list_item","d":12,"p":{"lines":[181,182]},"v":"privilegesRequired HIGH
LOW
NONE
"},{"t":"list_item","d":12,"p":{"lines":[182,183]},"v":"userInteraction NONE
REQUIRED
"},{"t":"list_item","d":12,"p":{"lines":[183,184]},"v":"scope UNCHANGED
CHANGED
"},{"t":"list_item","d":12,"p":{"lines":[184,185]},"v":"confidentialityImpact NONE
LOW
HIGH
"},{"t":"list_item","d":12,"p":{"lines":[185,186]},"v":"integrityImpact NONE
LOW
HIGH
"},{"t":"list_item","d":12,"p":{"lines":[186,187]},"v":"availabilityImpact NONE
LOW
HIGH
"},{"t":"list_item","d":12,"p":{"lines":[187,188]},"v":"baseScore"},{"t":"list_item","d":12,"p":{"lines":[188,189]},"v":"baseSeverity NONE
LOW
MEDIUM
HIGH
CRITICAL
"},{"t":"list_item","d":12,"p":{"lines":[189,190]},"v":"exploitCodeMaturity UNPROVEN
PROOF_OF_CONCEPT
FUNCTIONAL
HIGH
NOT_DEFINED
"},{"t":"list_item","d":12,"p":{"lines":[190,191]},"v":"remediationLevel OFFICIAL_FIX
TEMPORARY_FIX
WORKAROUND
UNAVAILABLE
NOT_DEFINED
"},{"t":"list_item","d":12,"p":{"lines":[191,192]},"v":"reportConfidence UNKNOWN
REASONABLE
CONFIRMED
NOT_DEFINED
"},{"t":"list_item","d":12,"p":{"lines":[192,193]},"v":"temporalScore"},{"t":"list_item","d":12,"p":{"lines":[193,194]},"v":"temporalSeverity NONE
LOW
MEDIUM
HIGH
CRITICAL
"},{"t":"list_item","d":12,"p":{"lines":[194,195]},"v":"confidentialityRequirement LOW
MEDIUM
HIGH
NOT_DEFINED
"},{"t":"list_item","d":12,"p":{"lines":[195,196]},"v":"integrityRequirement LOW
MEDIUM
HIGH
NOT_DEFINED
"},{"t":"list_item","d":12,"p":{"lines":[196,197]},"v":"availabilityRequirement LOW
MEDIUM
HIGH
NOT_DEFINED
"},{"t":"list_item","d":12,"p":{"lines":[197,198]},"v":"modifiedAttackVector NETWORK
ADJACENT_NETWORK
LOCAL
PHYSICAL
NOT_DEFINED
"},{"t":"list_item","d":12,"p":{"lines":[198,199]},"v":"modifiedAttackComplexity HIGH
LOW
NOT_DEFINED
"},{"t":"list_item","d":12,"p":{"lines":[199,200]},"v":"modifiedPrivilegesRequired HIGH
LOW
NONE
NOT_DEFINED
"},{"t":"list_item","d":12,"p":{"lines":[200,201]},"v":"modifiedUserInteraction NONE
REQUIRED
NOT_DEFINED
"},{"t":"list_item","d":12,"p":{"lines":[201,202]},"v":"modifiedScope UNCHANGED
CHANGED
NOT_DEFINED
"},{"t":"list_item","d":12,"p":{"lines":[202,203]},"v":"modifiedConfidentialityImpact NONE
LOW
HIGH
NOT_DEFINED
"},{"t":"list_item","d":12,"p":{"lines":[203,204]},"v":"modifiedIntegrityImpact NONE
LOW
HIGH
NOT_DEFINED
"},{"t":"list_item","d":12,"p":{"lines":[204,205]},"v":"modifiedAvailabilityImpact NONE
LOW
HIGH
NOT_DEFINED
"},{"t":"list_item","d":12,"p":{"lines":[205,206]},"v":"environmentalScore"},{"t":"list_item","d":12,"p":{"lines":[206,207]},"v":"environmentalSeverity NONE
LOW
MEDIUM
HIGH
CRITICAL
"}]},{"t":"list_item","d":10,"p":{"lines":[207,208],"f":true},"v":"cvssV2_0 ","c":[{"t":"list_item","d":12,"p":{"lines":[208,209]},"v":"version 2.0
"},{"t":"list_item","d":12,"p":{"lines":[209,210]},"v":"vectorString"},{"t":"list_item","d":12,"p":{"lines":[210,211]},"v":"accessVector NETWORK
ADJACENT_NETWORK
LOCAL
"},{"t":"list_item","d":12,"p":{"lines":[211,212]},"v":"accessComplexity HIGH
MEDIUM
LOW
"},{"t":"list_item","d":12,"p":{"lines":[212,213]},"v":"authentication MULTIPLE
SINGLE
NONE
"},{"t":"list_item","d":12,"p":{"lines":[213,214]},"v":"confidentialityImpact NONE
PARTIAL
COMPLETE
"},{"t":"list_item","d":12,"p":{"lines":[214,215]},"v":"integrityImpact NONE
PARTIAL
COMPLETE
"},{"t":"list_item","d":12,"p":{"lines":[215,216]},"v":"availabilityImpact NONE
PARTIAL
COMPLETE
"},{"t":"list_item","d":12,"p":{"lines":[216,217]},"v":"baseScore"},{"t":"list_item","d":12,"p":{"lines":[217,218]},"v":"exploitability UNPROVEN
PROOF_OF_CONCEPT
FUNCTIONAL
HIGH
NOT_DEFINED
"},{"t":"list_item","d":12,"p":{"lines":[218,219]},"v":"remediationLevel OFFICIAL_FIX
TEMPORARY_FIX
WORKAROUND
UNAVAILABLE
NOT_DEFINED
"},{"t":"list_item","d":12,"p":{"lines":[219,220]},"v":"reportConfidence UNCONFIRMED
UNCORROBORATED
CONFIRMED
NOT_DEFINED
"},{"t":"list_item","d":12,"p":{"lines":[220,221]},"v":"temporalScore"},{"t":"list_item","d":12,"p":{"lines":[221,222]},"v":"collateralDamagePotential NONE
LOW
LOW_MEDIUM
MEDIUM_HIGH
HIGH
NOT_DEFINED
"},{"t":"list_item","d":12,"p":{"lines":[222,223]},"v":"targetDistribution NONE
LOW
MEDIUM
HIGH
NOT_DEFINED
"},{"t":"list_item","d":12,"p":{"lines":[223,224]},"v":"confidentialityRequirement LOW
MEDIUM
HIGH
NOT_DEFINED
"},{"t":"list_item","d":12,"p":{"lines":[224,225]},"v":"integrityRequirement LOW
MEDIUM
HIGH
NOT_DEFINED
"},{"t":"list_item","d":12,"p":{"lines":[225,226]},"v":"availabilityRequirement LOW
MEDIUM
HIGH
NOT_DEFINED
"},{"t":"list_item","d":12,"p":{"lines":[226,227]},"v":"environmentalScore"}]},{"t":"list_item","d":10,"p":{"lines":[227,228]},"v":"other","c":[{"t":"list_item","d":12,"p":{"lines":[228,229]},"v":"type"},{"t":"list_item","d":12,"p":{"lines":[229,230]},"v":"content"}]}]},{"t":"list_item","d":8,"p":{"lines":[230,231],"f":true},"v":"configurations []","c":[{"t":"list_item","d":10,"p":{"lines":[231,232]},"v":"lang"},{"t":"list_item","d":10,"p":{"lines":[232,233]},"v":"value"},{"t":"list_item","d":10,"p":{"lines":[233,234],"f":true},"v":"supportingMedia []","c":[{"t":"list_item","d":12,"p":{"lines":[234,235]},"v":"type e.g., text/markdown
"},{"t":"list_item","d":12,"p":{"lines":[235,236]},"v":"base64 ☯"},{"t":"list_item","d":12,"p":{"lines":[236,237]},"v":"value"}]}]},{"t":"list_item","d":8,"p":{"lines":[237,238],"f":true},"v":"workarounds []","c":[{"t":"list_item","d":10,"p":{"lines":[238,239]},"v":"lang"},{"t":"list_item","d":10,"p":{"lines":[239,240]},"v":"value"},{"t":"list_item","d":10,"p":{"lines":[240,241],"f":true},"v":"supportingMedia []","c":[{"t":"list_item","d":12,"p":{"lines":[241,242]},"v":"type e.g., text/markdown
"},{"t":"list_item","d":12,"p":{"lines":[242,243]},"v":"base64 ☯"},{"t":"list_item","d":12,"p":{"lines":[243,244]},"v":"value"}]}]},{"t":"list_item","d":8,"p":{"lines":[244,245],"f":true},"v":"solutions []","c":[{"t":"list_item","d":10,"p":{"lines":[245,246]},"v":"lang"},{"t":"list_item","d":10,"p":{"lines":[246,247]},"v":"value"},{"t":"list_item","d":10,"p":{"lines":[247,248],"f":true},"v":"supportingMedia []","c":[{"t":"list_item","d":12,"p":{"lines":[248,249]},"v":"type e.g., text/markdown
"},{"t":"list_item","d":12,"p":{"lines":[249,250]},"v":"base64 ☯"},{"t":"list_item","d":12,"p":{"lines":[250,251]},"v":"value"}]}]},{"t":"list_item","d":8,"p":{"lines":[251,252],"f":true},"v":"exploits []","c":[{"t":"list_item","d":10,"p":{"lines":[252,253]},"v":"lang"},{"t":"list_item","d":10,"p":{"lines":[253,254]},"v":"value"},{"t":"list_item","d":10,"p":{"lines":[254,255],"f":true},"v":"supportingMedia []","c":[{"t":"list_item","d":12,"p":{"lines":[255,256]},"v":"type e.g., text/markdown
"},{"t":"list_item","d":12,"p":{"lines":[256,257]},"v":"base64 ☯"},{"t":"list_item","d":12,"p":{"lines":[257,258]},"v":"value"}]}]},{"t":"list_item","d":8,"p":{"lines":[258,259],"f":true},"v":"timeline []","c":[{"t":"list_item","d":10,"p":{"lines":[259,260]},"v":"time"},{"t":"list_item","d":10,"p":{"lines":[260,261]},"v":"lang"},{"t":"list_item","d":10,"p":{"lines":[261,262]},"v":"value"}]},{"t":"list_item","d":8,"p":{"lines":[262,263],"f":true},"v":"credits []","c":[{"t":"list_item","d":10,"p":{"lines":[263,264]},"v":"lang"},{"t":"list_item","d":10,"p":{"lines":[264,265]},"v":"value"},{"t":"list_item","d":10,"p":{"lines":[265,266]},"v":"user"},{"t":"list_item","d":10,"p":{"lines":[266,267]},"v":"type finder
reporter
analyst
coordinator
remediation developer
remediation reviewer
remediation verifier
tool
sponsor
other
"}]},{"t":"list_item","d":8,"p":{"lines":[267,268]},"v":"source"},{"t":"list_item","d":8,"p":{"lines":[268,269],"f":true},"v":"tags []"},{"t":"list_item","d":8,"p":{"lines":[269,270],"f":true},"v":"taxonomyMappings []","c":[{"t":"list_item","d":10,"p":{"lines":[270,271]},"v":"taxonomyName"},{"t":"list_item","d":10,"p":{"lines":[271,272]},"v":"taxonomyVersion"},{"t":"list_item","d":10,"p":{"lines":[272,273]},"v":"taxonomyRelations []","c":[{"t":"list_item","d":12,"p":{"lines":[273,274]},"v":"taxonomyId"},{"t":"list_item","d":12,"p":{"lines":[274,275]},"v":"relationshipName"},{"t":"list_item","d":12,"p":{"lines":[275,276]},"v":"relationshipValue"}]}]},{"t":"list_item","d":8,"p":{"lines":[276,277]},"v":"^x_[^.]*$"}]},{"t":"list_item","d":6,"p":{"lines":[277,278],"f":true},"v":"adp []","c":[{"t":"list_item","d":8,"p":{"lines":[278,279]},"v":"providerMetadata","c":[{"t":"list_item","d":10,"p":{"lines":[279,280]},"v":"orgId"},{"t":"list_item","d":10,"p":{"lines":[280,281]},"v":"shortName"},{"t":"list_item","d":10,"p":{"lines":[281,282]},"v":"dateUpdated"}]},{"t":"list_item","d":8,"p":{"lines":[282,283]},"v":"datePublic"},{"t":"list_item","d":8,"p":{"lines":[283,284]},"v":"title"},{"t":"list_item","d":8,"p":{"lines":[284,285]},"v":"descriptions []","c":[{"t":"list_item","d":10,"p":{"lines":[285,286]},"v":"lang"},{"t":"list_item","d":10,"p":{"lines":[286,287]},"v":"value"},{"t":"list_item","d":10,"p":{"lines":[287,288],"f":true},"v":"supportingMedia []","c":[{"t":"list_item","d":12,"p":{"lines":[288,289]},"v":"type e.g., text/markdown
"},{"t":"list_item","d":12,"p":{"lines":[289,290]},"v":"base64 ☯"},{"t":"list_item","d":12,"p":{"lines":[290,291]},"v":"value"}]}]},{"t":"list_item","d":8,"p":{"lines":[291,292]},"v":"affected []","c":[{"t":"list_item","d":10,"p":{"lines":[292,293]},"v":"vendor"},{"t":"list_item","d":10,"p":{"lines":[293,294]},"v":"product"},{"t":"list_item","d":10,"p":{"lines":[294,295]},"v":"collectionURL e.g., https://access.redhat.com/downloads/content/package-browser
"},{"t":"list_item","d":10,"p":{"lines":[295,296]},"v":"packageName"},{"t":"list_item","d":10,"p":{"lines":[296,297]},"v":"cpes []"},{"t":"list_item","d":10,"p":{"lines":[297,298]},"v":"modules []"},{"t":"list_item","d":10,"p":{"lines":[298,299]},"v":"programFiles []"},{"t":"list_item","d":10,"p":{"lines":[299,300]},"v":"programRoutines []","c":[{"t":"list_item","d":12,"p":{"lines":[300,301]},"v":"name"}]},{"t":"list_item","d":10,"p":{"lines":[301,302]},"v":"platforms []"},{"t":"list_item","d":10,"p":{"lines":[302,303]},"v":"repo"},{"t":"list_item","d":10,"p":{"lines":[303,304]},"v":"defaultStatus affected
unaffected
unknown
"},{"t":"list_item","d":10,"p":{"lines":[304,305]},"v":"versions []","c":[{"t":"list_item","d":12,"p":{"lines":[305,306]},"v":"version"},{"t":"list_item","d":12,"p":{"lines":[306,307]},"v":"status affected
unaffected
unknown
"},{"t":"list_item","d":12,"p":{"lines":[307,308]},"v":"versionType e.g., custom
"},{"t":"list_item","d":12,"p":{"lines":[308,309]},"v":"lessThan"},{"t":"list_item","d":12,"p":{"lines":[309,310]},"v":"lessThanOrEqual"},{"t":"list_item","d":12,"p":{"lines":[310,311]},"v":"changes []","c":[{"t":"list_item","d":14,"p":{"lines":[311,312]},"v":"at"},{"t":"list_item","d":14,"p":{"lines":[312,313]},"v":"status affected
unaffected
unknown
"}]}]}]},{"t":"list_item","d":8,"p":{"lines":[313,314]},"v":"problemTypes []","c":[{"t":"list_item","d":10,"p":{"lines":[314,315]},"v":"descriptions []","c":[{"t":"list_item","d":12,"p":{"lines":[315,316]},"v":"lang"},{"t":"list_item","d":12,"p":{"lines":[316,317]},"v":"description"},{"t":"list_item","d":12,"p":{"lines":[317,318]},"v":"cweId"},{"t":"list_item","d":12,"p":{"lines":[318,319]},"v":"type"},{"t":"list_item","d":12,"p":{"lines":[319,320]},"v":"references []","c":[{"t":"list_item","d":14,"p":{"lines":[320,321]},"v":"url"},{"t":"list_item","d":14,"p":{"lines":[321,322]},"v":"name"},{"t":"list_item","d":14,"p":{"lines":[322,323],"f":true},"v":"tags []"}]}]}]},{"t":"list_item","d":8,"p":{"lines":[323,324]},"v":"references []","c":[{"t":"list_item","d":10,"p":{"lines":[324,325]},"v":"url"},{"t":"list_item","d":10,"p":{"lines":[325,326]},"v":"name"},{"t":"list_item","d":10,"p":{"lines":[326,327],"f":true},"v":"tags []"}]},{"t":"list_item","d":8,"p":{"lines":[327,328],"f":true},"v":"impacts []","c":[{"t":"list_item","d":10,"p":{"lines":[328,329]},"v":"capecId"},{"t":"list_item","d":10,"p":{"lines":[329,330]},"v":"descriptions []","c":[{"t":"list_item","d":12,"p":{"lines":[330,331]},"v":"lang"},{"t":"list_item","d":12,"p":{"lines":[331,332]},"v":"value"},{"t":"list_item","d":12,"p":{"lines":[332,333],"f":true},"v":"supportingMedia []","c":[{"t":"list_item","d":14,"p":{"lines":[333,334]},"v":"type e.g., text/markdown
"},{"t":"list_item","d":14,"p":{"lines":[334,335]},"v":"base64 ☯"},{"t":"list_item","d":14,"p":{"lines":[335,336]},"v":"value"}]}]}]},{"t":"list_item","d":8,"p":{"lines":[336,337],"f":true},"v":"metrics []","c":[{"t":"list_item","d":10,"p":{"lines":[337,338]},"v":"format"},{"t":"list_item","d":10,"p":{"lines":[338,339]},"v":"scenarios []","c":[{"t":"list_item","d":12,"p":{"lines":[339,340]},"v":"lang"},{"t":"list_item","d":12,"p":{"lines":[340,341]},"v":"value"}]},{"t":"list_item","d":10,"p":{"lines":[341,342]},"v":"cvssV4_0","c":[{"t":"list_item","d":12,"p":{"lines":[342,343]},"v":"version 4.0
"},{"t":"list_item","d":12,"p":{"lines":[343,344]},"v":"vectorString"},{"t":"list_item","d":12,"p":{"lines":[344,345]},"v":"attackVector NETWORK
ADJACENT
LOCAL
PHYSICAL
"},{"t":"list_item","d":12,"p":{"lines":[345,346]},"v":"attackComplexity HIGH
LOW
"},{"t":"list_item","d":12,"p":{"lines":[346,347]},"v":"attackRequirements NONE
PRESENT
"},{"t":"list_item","d":12,"p":{"lines":[347,348]},"v":"privilegesRequired HIGH
LOW
NONE
"},{"t":"list_item","d":12,"p":{"lines":[348,349]},"v":"userInteraction NONE
PASSIVE
ACTIVE
"},{"t":"list_item","d":12,"p":{"lines":[349,350]},"v":"vulnConfidentialityImpact NONE
LOW
HIGH
"},{"t":"list_item","d":12,"p":{"lines":[350,351]},"v":"vulnIntegrityImpact NONE
LOW
HIGH
"},{"t":"list_item","d":12,"p":{"lines":[351,352]},"v":"vulnAvailabilityImpact NONE
LOW
HIGH
"},{"t":"list_item","d":12,"p":{"lines":[352,353]},"v":"subConfidentialityImpact NONE
LOW
HIGH
"},{"t":"list_item","d":12,"p":{"lines":[353,354]},"v":"subIntegrityImpact NONE
LOW
HIGH
"},{"t":"list_item","d":12,"p":{"lines":[354,355]},"v":"subAvailabilityImpact NONE
LOW
HIGH
"},{"t":"list_item","d":12,"p":{"lines":[355,356]},"v":"exploitMaturity UNREPORTED
PROOF_OF_CONCEPT
ATTACKED
NOT_DEFINED
"},{"t":"list_item","d":12,"p":{"lines":[356,357]},"v":"confidentialityRequirement LOW
MEDIUM
HIGH
NOT_DEFINED
"},{"t":"list_item","d":12,"p":{"lines":[357,358]},"v":"integrityRequirement LOW
MEDIUM
HIGH
NOT_DEFINED
"},{"t":"list_item","d":12,"p":{"lines":[358,359]},"v":"availabilityRequirement LOW
MEDIUM
HIGH
NOT_DEFINED
"},{"t":"list_item","d":12,"p":{"lines":[359,360]},"v":"modifiedAttackVector NETWORK
ADJACENT
LOCAL
PHYSICAL
NOT_DEFINED
"},{"t":"list_item","d":12,"p":{"lines":[360,361]},"v":"modifiedAttackComplexity HIGH
LOW
NOT_DEFINED
"},{"t":"list_item","d":12,"p":{"lines":[361,362]},"v":"modifiedAttackRequirements NONE
PRESENT
NOT_DEFINED
"},{"t":"list_item","d":12,"p":{"lines":[362,363]},"v":"modifiedPrivilegesRequired HIGH
LOW
NONE
NOT_DEFINED
"},{"t":"list_item","d":12,"p":{"lines":[363,364]},"v":"modifiedUserInteraction NONE
PASSIVE
ACTIVE
NOT_DEFINED
"},{"t":"list_item","d":12,"p":{"lines":[364,365]},"v":"modifiedVulnConfidentialityImpact NONE
LOW
HIGH
NOT_DEFINED
"},{"t":"list_item","d":12,"p":{"lines":[365,366]},"v":"modifiedVulnIntegrityImpact NONE
LOW
HIGH
NOT_DEFINED
"},{"t":"list_item","d":12,"p":{"lines":[366,367]},"v":"modifiedVulnAvailabilityImpact NONE
LOW
HIGH
NOT_DEFINED
"},{"t":"list_item","d":12,"p":{"lines":[367,368]},"v":"modifiedSubConfidentialityImpact NONE
LOW
HIGH
NOT_DEFINED
"},{"t":"list_item","d":12,"p":{"lines":[368,369]},"v":"modifiedSubIntegrityImpact NONE
LOW
HIGH
SAFETY
NOT_DEFINED
"},{"t":"list_item","d":12,"p":{"lines":[369,370]},"v":"modifiedSubAvailabilityImpact NONE
LOW
HIGH
SAFETY
NOT_DEFINED
"},{"t":"list_item","d":12,"p":{"lines":[370,371]},"v":"Safety NEGLIGIBLE
PRESENT
NOT_DEFINED
"},{"t":"list_item","d":12,"p":{"lines":[371,372]},"v":"Automatable NO
YES
NOT_DEFINED
"},{"t":"list_item","d":12,"p":{"lines":[372,373]},"v":"Recovery AUTOMATIC
USER
IRRECOVERABLE
NOT_DEFINED
"},{"t":"list_item","d":12,"p":{"lines":[373,374]},"v":"valueDensity DIFFUSE
CONCENTRATED
NOT_DEFINED
"},{"t":"list_item","d":12,"p":{"lines":[374,375]},"v":"vulnerabilityResponseEffort LOW
MODERATE
HIGH
NOT_DEFINED
"},{"t":"list_item","d":12,"p":{"lines":[375,376]},"v":"providerUrgency CLEAR
GREEN
AMBER
RED
NOT_DEFINED
","c":[{"t":"list_item","d":14,"p":{"lines":[376,377]},"v":"baseScore"},{"t":"list_item","d":14,"p":{"lines":[377,378]},"v":"baseSeverity"},{"t":"list_item","d":14,"p":{"lines":[378,379]},"v":"baseScore"},{"t":"list_item","d":14,"p":{"lines":[379,380]},"v":"baseSeverity"},{"t":"list_item","d":14,"p":{"lines":[380,381]},"v":"baseScore"},{"t":"list_item","d":14,"p":{"lines":[381,382]},"v":"baseSeverity"},{"t":"list_item","d":14,"p":{"lines":[382,383]},"v":"baseScore"},{"t":"list_item","d":14,"p":{"lines":[383,384]},"v":"baseSeverity"},{"t":"list_item","d":14,"p":{"lines":[384,385]},"v":"baseScore"},{"t":"list_item","d":14,"p":{"lines":[385,386]},"v":"baseSeverity"},{"t":"list_item","d":14,"p":{"lines":[386,387]},"v":"threatScore"},{"t":"list_item","d":14,"p":{"lines":[387,388]},"v":"threatSeverity"},{"t":"list_item","d":14,"p":{"lines":[388,389]},"v":"threatScore"},{"t":"list_item","d":14,"p":{"lines":[389,390]},"v":"threatSeverity"},{"t":"list_item","d":14,"p":{"lines":[390,391]},"v":"threatScore"},{"t":"list_item","d":14,"p":{"lines":[391,392]},"v":"threatSeverity"},{"t":"list_item","d":14,"p":{"lines":[392,393]},"v":"threatScore"},{"t":"list_item","d":14,"p":{"lines":[393,394]},"v":"threatSeverity"},{"t":"list_item","d":14,"p":{"lines":[394,395]},"v":"threatScore"},{"t":"list_item","d":14,"p":{"lines":[395,396]},"v":"threatSeverity"},{"t":"list_item","d":14,"p":{"lines":[396,397]},"v":"environmentalScore"},{"t":"list_item","d":14,"p":{"lines":[397,398]},"v":"environmentalSeverity"},{"t":"list_item","d":14,"p":{"lines":[398,399]},"v":"environmentalScore"},{"t":"list_item","d":14,"p":{"lines":[399,400]},"v":"environmentalSeverity"},{"t":"list_item","d":14,"p":{"lines":[400,401]},"v":"environmentalScore"},{"t":"list_item","d":14,"p":{"lines":[401,402]},"v":"environmentalSeverity"},{"t":"list_item","d":14,"p":{"lines":[402,403]},"v":"environmentalScore"},{"t":"list_item","d":14,"p":{"lines":[403,404]},"v":"environmentalSeverity"},{"t":"list_item","d":14,"p":{"lines":[404,405]},"v":"environmentalScore"},{"t":"list_item","d":14,"p":{"lines":[405,406]},"v":"environmentalSeverity"}]}]},{"t":"list_item","d":10,"p":{"lines":[406,407],"f":true},"v":"cvssV3_1 ","c":[{"t":"list_item","d":12,"p":{"lines":[407,408]},"v":"version 3.1
"},{"t":"list_item","d":12,"p":{"lines":[408,409]},"v":"vectorString"},{"t":"list_item","d":12,"p":{"lines":[409,410]},"v":"attackVector NETWORK
ADJACENT_NETWORK
LOCAL
PHYSICAL
"},{"t":"list_item","d":12,"p":{"lines":[410,411]},"v":"attackComplexity HIGH
LOW
"},{"t":"list_item","d":12,"p":{"lines":[411,412]},"v":"privilegesRequired HIGH
LOW
NONE
"},{"t":"list_item","d":12,"p":{"lines":[412,413]},"v":"userInteraction NONE
REQUIRED
"},{"t":"list_item","d":12,"p":{"lines":[413,414]},"v":"scope UNCHANGED
CHANGED
"},{"t":"list_item","d":12,"p":{"lines":[414,415]},"v":"confidentialityImpact NONE
LOW
HIGH
"},{"t":"list_item","d":12,"p":{"lines":[415,416]},"v":"integrityImpact NONE
LOW
HIGH
"},{"t":"list_item","d":12,"p":{"lines":[416,417]},"v":"availabilityImpact NONE
LOW
HIGH
"},{"t":"list_item","d":12,"p":{"lines":[417,418]},"v":"baseScore"},{"t":"list_item","d":12,"p":{"lines":[418,419]},"v":"baseSeverity NONE
LOW
MEDIUM
HIGH
CRITICAL
"},{"t":"list_item","d":12,"p":{"lines":[419,420]},"v":"exploitCodeMaturity UNPROVEN
PROOF_OF_CONCEPT
FUNCTIONAL
HIGH
NOT_DEFINED
"},{"t":"list_item","d":12,"p":{"lines":[420,421]},"v":"remediationLevel OFFICIAL_FIX
TEMPORARY_FIX
WORKAROUND
UNAVAILABLE
NOT_DEFINED
"},{"t":"list_item","d":12,"p":{"lines":[421,422]},"v":"reportConfidence UNKNOWN
REASONABLE
CONFIRMED
NOT_DEFINED
"},{"t":"list_item","d":12,"p":{"lines":[422,423]},"v":"temporalScore"},{"t":"list_item","d":12,"p":{"lines":[423,424]},"v":"temporalSeverity NONE
LOW
MEDIUM
HIGH
CRITICAL
"},{"t":"list_item","d":12,"p":{"lines":[424,425]},"v":"confidentialityRequirement LOW
MEDIUM
HIGH
NOT_DEFINED
"},{"t":"list_item","d":12,"p":{"lines":[425,426]},"v":"integrityRequirement LOW
MEDIUM
HIGH
NOT_DEFINED
"},{"t":"list_item","d":12,"p":{"lines":[426,427]},"v":"availabilityRequirement LOW
MEDIUM
HIGH
NOT_DEFINED
"},{"t":"list_item","d":12,"p":{"lines":[427,428]},"v":"modifiedAttackVector NETWORK
ADJACENT_NETWORK
LOCAL
PHYSICAL
NOT_DEFINED
"},{"t":"list_item","d":12,"p":{"lines":[428,429]},"v":"modifiedAttackComplexity HIGH
LOW
NOT_DEFINED
"},{"t":"list_item","d":12,"p":{"lines":[429,430]},"v":"modifiedPrivilegesRequired HIGH
LOW
NONE
NOT_DEFINED
"},{"t":"list_item","d":12,"p":{"lines":[430,431]},"v":"modifiedUserInteraction NONE
REQUIRED
NOT_DEFINED
"},{"t":"list_item","d":12,"p":{"lines":[431,432]},"v":"modifiedScope UNCHANGED
CHANGED
NOT_DEFINED
"},{"t":"list_item","d":12,"p":{"lines":[432,433]},"v":"modifiedConfidentialityImpact NONE
LOW
HIGH
NOT_DEFINED
"},{"t":"list_item","d":12,"p":{"lines":[433,434]},"v":"modifiedIntegrityImpact NONE
LOW
HIGH
NOT_DEFINED
"},{"t":"list_item","d":12,"p":{"lines":[434,435]},"v":"modifiedAvailabilityImpact NONE
LOW
HIGH
NOT_DEFINED
"},{"t":"list_item","d":12,"p":{"lines":[435,436]},"v":"environmentalScore"},{"t":"list_item","d":12,"p":{"lines":[436,437]},"v":"environmentalSeverity NONE
LOW
MEDIUM
HIGH
CRITICAL
"}]},{"t":"list_item","d":10,"p":{"lines":[437,438],"f":true},"v":"cvssV3_0 ","c":[{"t":"list_item","d":12,"p":{"lines":[438,439]},"v":"version 3.0
"},{"t":"list_item","d":12,"p":{"lines":[439,440]},"v":"vectorString"},{"t":"list_item","d":12,"p":{"lines":[440,441]},"v":"attackVector NETWORK
ADJACENT_NETWORK
LOCAL
PHYSICAL
"},{"t":"list_item","d":12,"p":{"lines":[441,442]},"v":"attackComplexity HIGH
LOW
"},{"t":"list_item","d":12,"p":{"lines":[442,443]},"v":"privilegesRequired HIGH
LOW
NONE
"},{"t":"list_item","d":12,"p":{"lines":[443,444]},"v":"userInteraction NONE
REQUIRED
"},{"t":"list_item","d":12,"p":{"lines":[444,445]},"v":"scope UNCHANGED
CHANGED
"},{"t":"list_item","d":12,"p":{"lines":[445,446]},"v":"confidentialityImpact NONE
LOW
HIGH
"},{"t":"list_item","d":12,"p":{"lines":[446,447]},"v":"integrityImpact NONE
LOW
HIGH
"},{"t":"list_item","d":12,"p":{"lines":[447,448]},"v":"availabilityImpact NONE
LOW
HIGH
"},{"t":"list_item","d":12,"p":{"lines":[448,449]},"v":"baseScore"},{"t":"list_item","d":12,"p":{"lines":[449,450]},"v":"baseSeverity NONE
LOW
MEDIUM
HIGH
CRITICAL
"},{"t":"list_item","d":12,"p":{"lines":[450,451]},"v":"exploitCodeMaturity UNPROVEN
PROOF_OF_CONCEPT
FUNCTIONAL
HIGH
NOT_DEFINED
"},{"t":"list_item","d":12,"p":{"lines":[451,452]},"v":"remediationLevel OFFICIAL_FIX
TEMPORARY_FIX
WORKAROUND
UNAVAILABLE
NOT_DEFINED
"},{"t":"list_item","d":12,"p":{"lines":[452,453]},"v":"reportConfidence UNKNOWN
REASONABLE
CONFIRMED
NOT_DEFINED
"},{"t":"list_item","d":12,"p":{"lines":[453,454]},"v":"temporalScore"},{"t":"list_item","d":12,"p":{"lines":[454,455]},"v":"temporalSeverity NONE
LOW
MEDIUM
HIGH
CRITICAL
"},{"t":"list_item","d":12,"p":{"lines":[455,456]},"v":"confidentialityRequirement LOW
MEDIUM
HIGH
NOT_DEFINED
"},{"t":"list_item","d":12,"p":{"lines":[456,457]},"v":"integrityRequirement LOW
MEDIUM
HIGH
NOT_DEFINED
"},{"t":"list_item","d":12,"p":{"lines":[457,458]},"v":"availabilityRequirement LOW
MEDIUM
HIGH
NOT_DEFINED
"},{"t":"list_item","d":12,"p":{"lines":[458,459]},"v":"modifiedAttackVector NETWORK
ADJACENT_NETWORK
LOCAL
PHYSICAL
NOT_DEFINED
"},{"t":"list_item","d":12,"p":{"lines":[459,460]},"v":"modifiedAttackComplexity HIGH
LOW
NOT_DEFINED
"},{"t":"list_item","d":12,"p":{"lines":[460,461]},"v":"modifiedPrivilegesRequired HIGH
LOW
NONE
NOT_DEFINED
"},{"t":"list_item","d":12,"p":{"lines":[461,462]},"v":"modifiedUserInteraction NONE
REQUIRED
NOT_DEFINED
"},{"t":"list_item","d":12,"p":{"lines":[462,463]},"v":"modifiedScope UNCHANGED
CHANGED
NOT_DEFINED
"},{"t":"list_item","d":12,"p":{"lines":[463,464]},"v":"modifiedConfidentialityImpact NONE
LOW
HIGH
NOT_DEFINED
"},{"t":"list_item","d":12,"p":{"lines":[464,465]},"v":"modifiedIntegrityImpact NONE
LOW
HIGH
NOT_DEFINED
"},{"t":"list_item","d":12,"p":{"lines":[465,466]},"v":"modifiedAvailabilityImpact NONE
LOW
HIGH
NOT_DEFINED
"},{"t":"list_item","d":12,"p":{"lines":[466,467]},"v":"environmentalScore"},{"t":"list_item","d":12,"p":{"lines":[467,468]},"v":"environmentalSeverity NONE
LOW
MEDIUM
HIGH
CRITICAL
"}]},{"t":"list_item","d":10,"p":{"lines":[468,469],"f":true},"v":"cvssV2_0 ","c":[{"t":"list_item","d":12,"p":{"lines":[469,470]},"v":"version 2.0
"},{"t":"list_item","d":12,"p":{"lines":[470,471]},"v":"vectorString"},{"t":"list_item","d":12,"p":{"lines":[471,472]},"v":"accessVector NETWORK
ADJACENT_NETWORK
LOCAL
"},{"t":"list_item","d":12,"p":{"lines":[472,473]},"v":"accessComplexity HIGH
MEDIUM
LOW
"},{"t":"list_item","d":12,"p":{"lines":[473,474]},"v":"authentication MULTIPLE
SINGLE
NONE
"},{"t":"list_item","d":12,"p":{"lines":[474,475]},"v":"confidentialityImpact NONE
PARTIAL
COMPLETE
"},{"t":"list_item","d":12,"p":{"lines":[475,476]},"v":"integrityImpact NONE
PARTIAL
COMPLETE
"},{"t":"list_item","d":12,"p":{"lines":[476,477]},"v":"availabilityImpact NONE
PARTIAL
COMPLETE
"},{"t":"list_item","d":12,"p":{"lines":[477,478]},"v":"baseScore"},{"t":"list_item","d":12,"p":{"lines":[478,479]},"v":"exploitability UNPROVEN
PROOF_OF_CONCEPT
FUNCTIONAL
HIGH
NOT_DEFINED
"},{"t":"list_item","d":12,"p":{"lines":[479,480]},"v":"remediationLevel OFFICIAL_FIX
TEMPORARY_FIX
WORKAROUND
UNAVAILABLE
NOT_DEFINED
"},{"t":"list_item","d":12,"p":{"lines":[480,481]},"v":"reportConfidence UNCONFIRMED
UNCORROBORATED
CONFIRMED
NOT_DEFINED
"},{"t":"list_item","d":12,"p":{"lines":[481,482]},"v":"temporalScore"},{"t":"list_item","d":12,"p":{"lines":[482,483]},"v":"collateralDamagePotential NONE
LOW
LOW_MEDIUM
MEDIUM_HIGH
HIGH
NOT_DEFINED
"},{"t":"list_item","d":12,"p":{"lines":[483,484]},"v":"targetDistribution NONE
LOW
MEDIUM
HIGH
NOT_DEFINED
"},{"t":"list_item","d":12,"p":{"lines":[484,485]},"v":"confidentialityRequirement LOW
MEDIUM
HIGH
NOT_DEFINED
"},{"t":"list_item","d":12,"p":{"lines":[485,486]},"v":"integrityRequirement LOW
MEDIUM
HIGH
NOT_DEFINED
"},{"t":"list_item","d":12,"p":{"lines":[486,487]},"v":"availabilityRequirement LOW
MEDIUM
HIGH
NOT_DEFINED
"},{"t":"list_item","d":12,"p":{"lines":[487,488]},"v":"environmentalScore"}]},{"t":"list_item","d":10,"p":{"lines":[488,489]},"v":"other","c":[{"t":"list_item","d":12,"p":{"lines":[489,490]},"v":"type"},{"t":"list_item","d":12,"p":{"lines":[490,491]},"v":"content"}]}]},{"t":"list_item","d":8,"p":{"lines":[491,492],"f":true},"v":"configurations []","c":[{"t":"list_item","d":10,"p":{"lines":[492,493]},"v":"lang"},{"t":"list_item","d":10,"p":{"lines":[493,494]},"v":"value"},{"t":"list_item","d":10,"p":{"lines":[494,495],"f":true},"v":"supportingMedia []","c":[{"t":"list_item","d":12,"p":{"lines":[495,496]},"v":"type e.g., text/markdown
"},{"t":"list_item","d":12,"p":{"lines":[496,497]},"v":"base64 ☯"},{"t":"list_item","d":12,"p":{"lines":[497,498]},"v":"value"}]}]},{"t":"list_item","d":8,"p":{"lines":[498,499],"f":true},"v":"workarounds []","c":[{"t":"list_item","d":10,"p":{"lines":[499,500]},"v":"lang"},{"t":"list_item","d":10,"p":{"lines":[500,501]},"v":"value"},{"t":"list_item","d":10,"p":{"lines":[501,502],"f":true},"v":"supportingMedia []","c":[{"t":"list_item","d":12,"p":{"lines":[502,503]},"v":"type e.g., text/markdown
"},{"t":"list_item","d":12,"p":{"lines":[503,504]},"v":"base64 ☯"},{"t":"list_item","d":12,"p":{"lines":[504,505]},"v":"value"}]}]},{"t":"list_item","d":8,"p":{"lines":[505,506],"f":true},"v":"solutions []","c":[{"t":"list_item","d":10,"p":{"lines":[506,507]},"v":"lang"},{"t":"list_item","d":10,"p":{"lines":[507,508]},"v":"value"},{"t":"list_item","d":10,"p":{"lines":[508,509],"f":true},"v":"supportingMedia []","c":[{"t":"list_item","d":12,"p":{"lines":[509,510]},"v":"type e.g., text/markdown
"},{"t":"list_item","d":12,"p":{"lines":[510,511]},"v":"base64 ☯"},{"t":"list_item","d":12,"p":{"lines":[511,512]},"v":"value"}]}]},{"t":"list_item","d":8,"p":{"lines":[512,513],"f":true},"v":"exploits []","c":[{"t":"list_item","d":10,"p":{"lines":[513,514]},"v":"lang"},{"t":"list_item","d":10,"p":{"lines":[514,515]},"v":"value"},{"t":"list_item","d":10,"p":{"lines":[515,516],"f":true},"v":"supportingMedia []","c":[{"t":"list_item","d":12,"p":{"lines":[516,517]},"v":"type e.g., text/markdown
"},{"t":"list_item","d":12,"p":{"lines":[517,518]},"v":"base64 ☯"},{"t":"list_item","d":12,"p":{"lines":[518,519]},"v":"value"}]}]},{"t":"list_item","d":8,"p":{"lines":[519,520],"f":true},"v":"timeline []","c":[{"t":"list_item","d":10,"p":{"lines":[520,521]},"v":"time"},{"t":"list_item","d":10,"p":{"lines":[521,522]},"v":"lang"},{"t":"list_item","d":10,"p":{"lines":[522,523]},"v":"value"}]},{"t":"list_item","d":8,"p":{"lines":[523,524],"f":true},"v":"credits []","c":[{"t":"list_item","d":10,"p":{"lines":[524,525]},"v":"lang"},{"t":"list_item","d":10,"p":{"lines":[525,526]},"v":"value"},{"t":"list_item","d":10,"p":{"lines":[526,527]},"v":"user"},{"t":"list_item","d":10,"p":{"lines":[527,528]},"v":"type finder
reporter
analyst
coordinator
remediation developer
remediation reviewer
remediation verifier
tool
sponsor
other
"}]},{"t":"list_item","d":8,"p":{"lines":[528,529]},"v":"source"},{"t":"list_item","d":8,"p":{"lines":[529,530],"f":true},"v":"tags []"},{"t":"list_item","d":8,"p":{"lines":[530,531],"f":true},"v":"taxonomyMappings []","c":[{"t":"list_item","d":10,"p":{"lines":[531,532]},"v":"taxonomyName"},{"t":"list_item","d":10,"p":{"lines":[532,533]},"v":"taxonomyVersion"},{"t":"list_item","d":10,"p":{"lines":[533,534]},"v":"taxonomyRelations []","c":[{"t":"list_item","d":12,"p":{"lines":[534,535]},"v":"taxonomyId"},{"t":"list_item","d":12,"p":{"lines":[535,536]},"v":"relationshipName"},{"t":"list_item","d":12,"p":{"lines":[536,537]},"v":"relationshipValue"}]}]},{"t":"list_item","d":8,"p":{"lines":[537,538]},"v":"^x_[^.]*$"}]}]}]},{"t":"heading","d":2,"p":{"lines":[538,539]},"v":"Rejected ","c":[{"t":"list_item","d":4,"p":{"lines":[539,540]},"v":"dataType CVE_RECORD
"},{"t":"list_item","d":4,"p":{"lines":[540,541]},"v":"dataVersion 5.1
"},{"t":"list_item","d":4,"p":{"lines":[541,542]},"v":"cveMetadata","c":[{"t":"list_item","d":6,"p":{"lines":[542,543]},"v":"cveId"},{"t":"list_item","d":6,"p":{"lines":[543,544]},"v":"assignerOrgId"},{"t":"list_item","d":6,"p":{"lines":[544,545]},"v":"assignerShortName"},{"t":"list_item","d":6,"p":{"lines":[545,546]},"v":"serial"},{"t":"list_item","d":6,"p":{"lines":[546,547]},"v":"dateUpdated"},{"t":"list_item","d":6,"p":{"lines":[547,548]},"v":"datePublished"},{"t":"list_item","d":6,"p":{"lines":[548,549]},"v":"dateRejected"},{"t":"list_item","d":6,"p":{"lines":[549,550]},"v":"state REJECTED
"},{"t":"list_item","d":6,"p":{"lines":[550,551]},"v":"dateReserved"}]},{"t":"list_item","d":4,"p":{"lines":[551,552]},"v":"containers","c":[{"t":"list_item","d":6,"p":{"lines":[552,553]},"v":"cna","c":[{"t":"list_item","d":8,"p":{"lines":[553,554]},"v":"providerMetadata","c":[{"t":"list_item","d":10,"p":{"lines":[554,555]},"v":"orgId"},{"t":"list_item","d":10,"p":{"lines":[555,556]},"v":"shortName"},{"t":"list_item","d":10,"p":{"lines":[556,557]},"v":"dateUpdated"}]},{"t":"list_item","d":8,"p":{"lines":[557,558]},"v":"rejectedReasons []","c":[{"t":"list_item","d":10,"p":{"lines":[558,559]},"v":"lang"},{"t":"list_item","d":10,"p":{"lines":[559,560]},"v":"value"},{"t":"list_item","d":10,"p":{"lines":[560,561],"f":true},"v":"supportingMedia []","c":[{"t":"list_item","d":12,"p":{"lines":[561,562]},"v":"type e.g., text/markdown
"},{"t":"list_item","d":12,"p":{"lines":[562,563]},"v":"base64 ☯"},{"t":"list_item","d":12,"p":{"lines":[563,564]},"v":"value"}]}]},{"t":"list_item","d":8,"p":{"lines":[564,565]},"v":"replacedBy []"},{"t":"list_item","d":8,"p":{"lines":[565,566]},"v":"^x_[^.]*$"}]}]}]}]})
+ })(() => window.markmap,null,{"t":"heading","d":1,"p":{"lines":[0,1]},"v":"CVE JSON Record","c":[{"t":"heading","d":2,"p":{"lines":[1,2]},"v":"Published ","c":[{"t":"list_item","d":4,"p":{"lines":[2,3]},"v":"dataType CVE_RECORD
"},{"t":"list_item","d":4,"p":{"lines":[3,4]},"v":"dataVersion"},{"t":"list_item","d":4,"p":{"lines":[4,5]},"v":"cveMetadata","c":[{"t":"list_item","d":6,"p":{"lines":[5,6]},"v":"cveId"},{"t":"list_item","d":6,"p":{"lines":[6,7]},"v":"assignerOrgId"},{"t":"list_item","d":6,"p":{"lines":[7,8]},"v":"assignerShortName"},{"t":"list_item","d":6,"p":{"lines":[8,9]},"v":"requesterUserId"},{"t":"list_item","d":6,"p":{"lines":[9,10]},"v":"dateUpdated"},{"t":"list_item","d":6,"p":{"lines":[10,11]},"v":"serial"},{"t":"list_item","d":6,"p":{"lines":[11,12]},"v":"dateReserved"},{"t":"list_item","d":6,"p":{"lines":[12,13]},"v":"datePublished"},{"t":"list_item","d":6,"p":{"lines":[13,14]},"v":"state PUBLISHED
"}]},{"t":"list_item","d":4,"p":{"lines":[14,15]},"v":"containers","c":[{"t":"list_item","d":6,"p":{"lines":[15,16]},"v":"cna","c":[{"t":"list_item","d":8,"p":{"lines":[16,17]},"v":"providerMetadata","c":[{"t":"list_item","d":10,"p":{"lines":[17,18]},"v":"orgId"},{"t":"list_item","d":10,"p":{"lines":[18,19]},"v":"shortName"},{"t":"list_item","d":10,"p":{"lines":[19,20]},"v":"dateUpdated"}]},{"t":"list_item","d":8,"p":{"lines":[20,21]},"v":"dateAssigned"},{"t":"list_item","d":8,"p":{"lines":[21,22]},"v":"datePublic"},{"t":"list_item","d":8,"p":{"lines":[22,23]},"v":"title"},{"t":"list_item","d":8,"p":{"lines":[23,24]},"v":"descriptions []","c":[{"t":"list_item","d":10,"p":{"lines":[24,25]},"v":"lang"},{"t":"list_item","d":10,"p":{"lines":[25,26]},"v":"value"},{"t":"list_item","d":10,"p":{"lines":[26,27],"f":true},"v":"supportingMedia []","c":[{"t":"list_item","d":12,"p":{"lines":[27,28]},"v":"type e.g., text/markdown
"},{"t":"list_item","d":12,"p":{"lines":[28,29]},"v":"base64 ☯"},{"t":"list_item","d":12,"p":{"lines":[29,30]},"v":"value"}]}]},{"t":"list_item","d":8,"p":{"lines":[30,31]},"v":"affected []","c":[{"t":"list_item","d":10,"p":{"lines":[31,32]},"v":"vendor"},{"t":"list_item","d":10,"p":{"lines":[32,33]},"v":"product"},{"t":"list_item","d":10,"p":{"lines":[33,34]},"v":"collectionURL e.g., https://access.redhat.com/downloads/content/package-browser
"},{"t":"list_item","d":10,"p":{"lines":[34,35]},"v":"packageName"},{"t":"list_item","d":10,"p":{"lines":[35,36]},"v":"cpes []"},{"t":"list_item","d":10,"p":{"lines":[36,37]},"v":"modules []"},{"t":"list_item","d":10,"p":{"lines":[37,38]},"v":"programFiles []"},{"t":"list_item","d":10,"p":{"lines":[38,39]},"v":"programRoutines []","c":[{"t":"list_item","d":12,"p":{"lines":[39,40]},"v":"name"}]},{"t":"list_item","d":10,"p":{"lines":[40,41]},"v":"platforms []"},{"t":"list_item","d":10,"p":{"lines":[41,42]},"v":"repo"},{"t":"list_item","d":10,"p":{"lines":[42,43]},"v":"defaultStatus affected
unaffected
unknown
"},{"t":"list_item","d":10,"p":{"lines":[43,44]},"v":"versions []","c":[{"t":"list_item","d":12,"p":{"lines":[44,45]},"v":"version"},{"t":"list_item","d":12,"p":{"lines":[45,46]},"v":"status affected
unaffected
unknown
"},{"t":"list_item","d":12,"p":{"lines":[46,47]},"v":"versionType e.g., custom
"},{"t":"list_item","d":12,"p":{"lines":[47,48]},"v":"lessThan"},{"t":"list_item","d":12,"p":{"lines":[48,49]},"v":"lessThanOrEqual"},{"t":"list_item","d":12,"p":{"lines":[49,50]},"v":"changes []","c":[{"t":"list_item","d":14,"p":{"lines":[50,51]},"v":"at"},{"t":"list_item","d":14,"p":{"lines":[51,52]},"v":"status affected
unaffected
unknown
"}]}]}]},{"t":"list_item","d":8,"p":{"lines":[52,53]},"v":"problemTypes []","c":[{"t":"list_item","d":10,"p":{"lines":[53,54]},"v":"descriptions []","c":[{"t":"list_item","d":12,"p":{"lines":[54,55]},"v":"lang"},{"t":"list_item","d":12,"p":{"lines":[55,56]},"v":"description"},{"t":"list_item","d":12,"p":{"lines":[56,57]},"v":"cweId"},{"t":"list_item","d":12,"p":{"lines":[57,58]},"v":"type"},{"t":"list_item","d":12,"p":{"lines":[58,59]},"v":"references []","c":[{"t":"list_item","d":14,"p":{"lines":[59,60]},"v":"url"},{"t":"list_item","d":14,"p":{"lines":[60,61]},"v":"name"},{"t":"list_item","d":14,"p":{"lines":[61,62],"f":true},"v":"tags []"}]}]}]},{"t":"list_item","d":8,"p":{"lines":[62,63]},"v":"references []","c":[{"t":"list_item","d":10,"p":{"lines":[63,64]},"v":"url"},{"t":"list_item","d":10,"p":{"lines":[64,65]},"v":"name"},{"t":"list_item","d":10,"p":{"lines":[65,66],"f":true},"v":"tags []"}]},{"t":"list_item","d":8,"p":{"lines":[66,67],"f":true},"v":"impacts []","c":[{"t":"list_item","d":10,"p":{"lines":[67,68]},"v":"capecId"},{"t":"list_item","d":10,"p":{"lines":[68,69]},"v":"descriptions []","c":[{"t":"list_item","d":12,"p":{"lines":[69,70]},"v":"lang"},{"t":"list_item","d":12,"p":{"lines":[70,71]},"v":"value"},{"t":"list_item","d":12,"p":{"lines":[71,72],"f":true},"v":"supportingMedia []","c":[{"t":"list_item","d":14,"p":{"lines":[72,73]},"v":"type e.g., text/markdown
"},{"t":"list_item","d":14,"p":{"lines":[73,74]},"v":"base64 ☯"},{"t":"list_item","d":14,"p":{"lines":[74,75]},"v":"value"}]}]}]},{"t":"list_item","d":8,"p":{"lines":[75,76],"f":true},"v":"metrics []","c":[{"t":"list_item","d":10,"p":{"lines":[76,77]},"v":"format"},{"t":"list_item","d":10,"p":{"lines":[77,78]},"v":"scenarios []","c":[{"t":"list_item","d":12,"p":{"lines":[78,79]},"v":"lang"},{"t":"list_item","d":12,"p":{"lines":[79,80]},"v":"value"}]},{"t":"list_item","d":10,"p":{"lines":[80,81]},"v":"cvssV4_0","c":[{"t":"list_item","d":12,"p":{"lines":[81,82]},"v":"version 4.0
"},{"t":"list_item","d":12,"p":{"lines":[82,83]},"v":"vectorString"},{"t":"list_item","d":12,"p":{"lines":[83,84]},"v":"baseScore"},{"t":"list_item","d":12,"p":{"lines":[84,85]},"v":"baseSeverity NONE
LOW
MEDIUM
HIGH
CRITICAL
"},{"t":"list_item","d":12,"p":{"lines":[85,86]},"v":"attackVector NETWORK
ADJACENT
LOCAL
PHYSICAL
"},{"t":"list_item","d":12,"p":{"lines":[86,87]},"v":"attackComplexity HIGH
LOW
"},{"t":"list_item","d":12,"p":{"lines":[87,88]},"v":"attackRequirements NONE
PRESENT
"},{"t":"list_item","d":12,"p":{"lines":[88,89]},"v":"privilegesRequired HIGH
LOW
NONE
"},{"t":"list_item","d":12,"p":{"lines":[89,90]},"v":"userInteraction NONE
PASSIVE
ACTIVE
"},{"t":"list_item","d":12,"p":{"lines":[90,91]},"v":"vulnConfidentialityImpact NONE
LOW
HIGH
"},{"t":"list_item","d":12,"p":{"lines":[91,92]},"v":"vulnIntegrityImpact NONE
LOW
HIGH
"},{"t":"list_item","d":12,"p":{"lines":[92,93]},"v":"vulnAvailabilityImpact NONE
LOW
HIGH
"},{"t":"list_item","d":12,"p":{"lines":[93,94]},"v":"subConfidentialityImpact NONE
LOW
HIGH
"},{"t":"list_item","d":12,"p":{"lines":[94,95]},"v":"subIntegrityImpact NONE
LOW
HIGH
"},{"t":"list_item","d":12,"p":{"lines":[95,96]},"v":"subAvailabilityImpact NONE
LOW
HIGH
"},{"t":"list_item","d":12,"p":{"lines":[96,97]},"v":"exploitMaturity UNREPORTED
PROOF_OF_CONCEPT
ATTACKED
NOT_DEFINED
"},{"t":"list_item","d":12,"p":{"lines":[97,98]},"v":"confidentialityRequirement LOW
MEDIUM
HIGH
NOT_DEFINED
"},{"t":"list_item","d":12,"p":{"lines":[98,99]},"v":"integrityRequirement LOW
MEDIUM
HIGH
NOT_DEFINED
"},{"t":"list_item","d":12,"p":{"lines":[99,100]},"v":"availabilityRequirement LOW
MEDIUM
HIGH
NOT_DEFINED
"},{"t":"list_item","d":12,"p":{"lines":[100,101]},"v":"modifiedAttackVector NETWORK
ADJACENT
LOCAL
PHYSICAL
NOT_DEFINED
"},{"t":"list_item","d":12,"p":{"lines":[101,102]},"v":"modifiedAttackComplexity HIGH
LOW
NOT_DEFINED
"},{"t":"list_item","d":12,"p":{"lines":[102,103]},"v":"modifiedAttackRequirements NONE
PRESENT
NOT_DEFINED
"},{"t":"list_item","d":12,"p":{"lines":[103,104]},"v":"modifiedPrivilegesRequired HIGH
LOW
NONE
NOT_DEFINED
"},{"t":"list_item","d":12,"p":{"lines":[104,105]},"v":"modifiedUserInteraction NONE
PASSIVE
ACTIVE
NOT_DEFINED
"},{"t":"list_item","d":12,"p":{"lines":[105,106]},"v":"modifiedVulnConfidentialityImpact NONE
LOW
HIGH
NOT_DEFINED
"},{"t":"list_item","d":12,"p":{"lines":[106,107]},"v":"modifiedVulnIntegrityImpact NONE
LOW
HIGH
NOT_DEFINED
"},{"t":"list_item","d":12,"p":{"lines":[107,108]},"v":"modifiedVulnAvailabilityImpact NONE
LOW
HIGH
NOT_DEFINED
"},{"t":"list_item","d":12,"p":{"lines":[108,109]},"v":"modifiedSubConfidentialityImpact NONE
LOW
HIGH
NOT_DEFINED
"},{"t":"list_item","d":12,"p":{"lines":[109,110]},"v":"modifiedSubIntegrityImpact NONE
LOW
HIGH
SAFETY
NOT_DEFINED
"},{"t":"list_item","d":12,"p":{"lines":[110,111]},"v":"modifiedSubAvailabilityImpact NONE
LOW
HIGH
SAFETY
NOT_DEFINED
"},{"t":"list_item","d":12,"p":{"lines":[111,112]},"v":"Safety NEGLIGIBLE
PRESENT
NOT_DEFINED
"},{"t":"list_item","d":12,"p":{"lines":[112,113]},"v":"Automatable NO
YES
NOT_DEFINED
"},{"t":"list_item","d":12,"p":{"lines":[113,114]},"v":"Recovery AUTOMATIC
USER
IRRECOVERABLE
NOT_DEFINED
"},{"t":"list_item","d":12,"p":{"lines":[114,115]},"v":"valueDensity DIFFUSE
CONCENTRATED
NOT_DEFINED
"},{"t":"list_item","d":12,"p":{"lines":[115,116]},"v":"vulnerabilityResponseEffort LOW
MODERATE
HIGH
NOT_DEFINED
"},{"t":"list_item","d":12,"p":{"lines":[116,117]},"v":"providerUrgency CLEAR
GREEN
AMBER
RED
NOT_DEFINED
","c":[{"t":"list_item","d":14,"p":{"lines":[117,118]},"v":"baseScore"},{"t":"list_item","d":14,"p":{"lines":[118,119]},"v":"baseSeverity"},{"t":"list_item","d":14,"p":{"lines":[119,120]},"v":"baseScore"},{"t":"list_item","d":14,"p":{"lines":[120,121]},"v":"baseSeverity"},{"t":"list_item","d":14,"p":{"lines":[121,122]},"v":"baseScore"},{"t":"list_item","d":14,"p":{"lines":[122,123]},"v":"baseSeverity"},{"t":"list_item","d":14,"p":{"lines":[123,124]},"v":"baseScore"},{"t":"list_item","d":14,"p":{"lines":[124,125]},"v":"baseSeverity"},{"t":"list_item","d":14,"p":{"lines":[125,126]},"v":"baseScore"},{"t":"list_item","d":14,"p":{"lines":[126,127]},"v":"baseSeverity"},{"t":"list_item","d":14,"p":{"lines":[127,128]},"v":"threatScore"},{"t":"list_item","d":14,"p":{"lines":[128,129]},"v":"threatSeverity"},{"t":"list_item","d":14,"p":{"lines":[129,130]},"v":"threatScore"},{"t":"list_item","d":14,"p":{"lines":[130,131]},"v":"threatSeverity"},{"t":"list_item","d":14,"p":{"lines":[131,132]},"v":"threatScore"},{"t":"list_item","d":14,"p":{"lines":[132,133]},"v":"threatSeverity"},{"t":"list_item","d":14,"p":{"lines":[133,134]},"v":"threatScore"},{"t":"list_item","d":14,"p":{"lines":[134,135]},"v":"threatSeverity"},{"t":"list_item","d":14,"p":{"lines":[135,136]},"v":"threatScore"},{"t":"list_item","d":14,"p":{"lines":[136,137]},"v":"threatSeverity"},{"t":"list_item","d":14,"p":{"lines":[137,138]},"v":"environmentalScore"},{"t":"list_item","d":14,"p":{"lines":[138,139]},"v":"environmentalSeverity"},{"t":"list_item","d":14,"p":{"lines":[139,140]},"v":"environmentalScore"},{"t":"list_item","d":14,"p":{"lines":[140,141]},"v":"environmentalSeverity"},{"t":"list_item","d":14,"p":{"lines":[141,142]},"v":"environmentalScore"},{"t":"list_item","d":14,"p":{"lines":[142,143]},"v":"environmentalSeverity"},{"t":"list_item","d":14,"p":{"lines":[143,144]},"v":"environmentalScore"},{"t":"list_item","d":14,"p":{"lines":[144,145]},"v":"environmentalSeverity"},{"t":"list_item","d":14,"p":{"lines":[145,146]},"v":"environmentalScore"},{"t":"list_item","d":14,"p":{"lines":[146,147]},"v":"environmentalSeverity"}]}]},{"t":"list_item","d":10,"p":{"lines":[147,148],"f":true},"v":"cvssV3_1 ","c":[{"t":"list_item","d":12,"p":{"lines":[148,149]},"v":"version 3.1
"},{"t":"list_item","d":12,"p":{"lines":[149,150]},"v":"vectorString"},{"t":"list_item","d":12,"p":{"lines":[150,151]},"v":"attackVector NETWORK
ADJACENT_NETWORK
LOCAL
PHYSICAL
"},{"t":"list_item","d":12,"p":{"lines":[151,152]},"v":"attackComplexity HIGH
LOW
"},{"t":"list_item","d":12,"p":{"lines":[152,153]},"v":"privilegesRequired HIGH
LOW
NONE
"},{"t":"list_item","d":12,"p":{"lines":[153,154]},"v":"userInteraction NONE
REQUIRED
"},{"t":"list_item","d":12,"p":{"lines":[154,155]},"v":"scope UNCHANGED
CHANGED
"},{"t":"list_item","d":12,"p":{"lines":[155,156]},"v":"confidentialityImpact NONE
LOW
HIGH
"},{"t":"list_item","d":12,"p":{"lines":[156,157]},"v":"integrityImpact NONE
LOW
HIGH
"},{"t":"list_item","d":12,"p":{"lines":[157,158]},"v":"availabilityImpact NONE
LOW
HIGH
"},{"t":"list_item","d":12,"p":{"lines":[158,159]},"v":"baseScore"},{"t":"list_item","d":12,"p":{"lines":[159,160]},"v":"baseSeverity NONE
LOW
MEDIUM
HIGH
CRITICAL
"},{"t":"list_item","d":12,"p":{"lines":[160,161]},"v":"exploitCodeMaturity UNPROVEN
PROOF_OF_CONCEPT
FUNCTIONAL
HIGH
NOT_DEFINED
"},{"t":"list_item","d":12,"p":{"lines":[161,162]},"v":"remediationLevel OFFICIAL_FIX
TEMPORARY_FIX
WORKAROUND
UNAVAILABLE
NOT_DEFINED
"},{"t":"list_item","d":12,"p":{"lines":[162,163]},"v":"reportConfidence UNKNOWN
REASONABLE
CONFIRMED
NOT_DEFINED
"},{"t":"list_item","d":12,"p":{"lines":[163,164]},"v":"temporalScore"},{"t":"list_item","d":12,"p":{"lines":[164,165]},"v":"temporalSeverity NONE
LOW
MEDIUM
HIGH
CRITICAL
"},{"t":"list_item","d":12,"p":{"lines":[165,166]},"v":"confidentialityRequirement LOW
MEDIUM
HIGH
NOT_DEFINED
"},{"t":"list_item","d":12,"p":{"lines":[166,167]},"v":"integrityRequirement LOW
MEDIUM
HIGH
NOT_DEFINED
"},{"t":"list_item","d":12,"p":{"lines":[167,168]},"v":"availabilityRequirement LOW
MEDIUM
HIGH
NOT_DEFINED
"},{"t":"list_item","d":12,"p":{"lines":[168,169]},"v":"modifiedAttackVector NETWORK
ADJACENT_NETWORK
LOCAL
PHYSICAL
NOT_DEFINED
"},{"t":"list_item","d":12,"p":{"lines":[169,170]},"v":"modifiedAttackComplexity HIGH
LOW
NOT_DEFINED
"},{"t":"list_item","d":12,"p":{"lines":[170,171]},"v":"modifiedPrivilegesRequired HIGH
LOW
NONE
NOT_DEFINED
"},{"t":"list_item","d":12,"p":{"lines":[171,172]},"v":"modifiedUserInteraction NONE
REQUIRED
NOT_DEFINED
"},{"t":"list_item","d":12,"p":{"lines":[172,173]},"v":"modifiedScope UNCHANGED
CHANGED
NOT_DEFINED
"},{"t":"list_item","d":12,"p":{"lines":[173,174]},"v":"modifiedConfidentialityImpact NONE
LOW
HIGH
NOT_DEFINED
"},{"t":"list_item","d":12,"p":{"lines":[174,175]},"v":"modifiedIntegrityImpact NONE
LOW
HIGH
NOT_DEFINED
"},{"t":"list_item","d":12,"p":{"lines":[175,176]},"v":"modifiedAvailabilityImpact NONE
LOW
HIGH
NOT_DEFINED
"},{"t":"list_item","d":12,"p":{"lines":[176,177]},"v":"environmentalScore"},{"t":"list_item","d":12,"p":{"lines":[177,178]},"v":"environmentalSeverity NONE
LOW
MEDIUM
HIGH
CRITICAL
"}]},{"t":"list_item","d":10,"p":{"lines":[178,179],"f":true},"v":"cvssV3_0 ","c":[{"t":"list_item","d":12,"p":{"lines":[179,180]},"v":"version 3.0
"},{"t":"list_item","d":12,"p":{"lines":[180,181]},"v":"vectorString"},{"t":"list_item","d":12,"p":{"lines":[181,182]},"v":"attackVector NETWORK
ADJACENT_NETWORK
LOCAL
PHYSICAL
"},{"t":"list_item","d":12,"p":{"lines":[182,183]},"v":"attackComplexity HIGH
LOW
"},{"t":"list_item","d":12,"p":{"lines":[183,184]},"v":"privilegesRequired HIGH
LOW
NONE
"},{"t":"list_item","d":12,"p":{"lines":[184,185]},"v":"userInteraction NONE
REQUIRED
"},{"t":"list_item","d":12,"p":{"lines":[185,186]},"v":"scope UNCHANGED
CHANGED
"},{"t":"list_item","d":12,"p":{"lines":[186,187]},"v":"confidentialityImpact NONE
LOW
HIGH
"},{"t":"list_item","d":12,"p":{"lines":[187,188]},"v":"integrityImpact NONE
LOW
HIGH
"},{"t":"list_item","d":12,"p":{"lines":[188,189]},"v":"availabilityImpact NONE
LOW
HIGH
"},{"t":"list_item","d":12,"p":{"lines":[189,190]},"v":"baseScore"},{"t":"list_item","d":12,"p":{"lines":[190,191]},"v":"baseSeverity NONE
LOW
MEDIUM
HIGH
CRITICAL
"},{"t":"list_item","d":12,"p":{"lines":[191,192]},"v":"exploitCodeMaturity UNPROVEN
PROOF_OF_CONCEPT
FUNCTIONAL
HIGH
NOT_DEFINED
"},{"t":"list_item","d":12,"p":{"lines":[192,193]},"v":"remediationLevel OFFICIAL_FIX
TEMPORARY_FIX
WORKAROUND
UNAVAILABLE
NOT_DEFINED
"},{"t":"list_item","d":12,"p":{"lines":[193,194]},"v":"reportConfidence UNKNOWN
REASONABLE
CONFIRMED
NOT_DEFINED
"},{"t":"list_item","d":12,"p":{"lines":[194,195]},"v":"temporalScore"},{"t":"list_item","d":12,"p":{"lines":[195,196]},"v":"temporalSeverity NONE
LOW
MEDIUM
HIGH
CRITICAL
"},{"t":"list_item","d":12,"p":{"lines":[196,197]},"v":"confidentialityRequirement LOW
MEDIUM
HIGH
NOT_DEFINED
"},{"t":"list_item","d":12,"p":{"lines":[197,198]},"v":"integrityRequirement LOW
MEDIUM
HIGH
NOT_DEFINED
"},{"t":"list_item","d":12,"p":{"lines":[198,199]},"v":"availabilityRequirement LOW
MEDIUM
HIGH
NOT_DEFINED
"},{"t":"list_item","d":12,"p":{"lines":[199,200]},"v":"modifiedAttackVector NETWORK
ADJACENT_NETWORK
LOCAL
PHYSICAL
NOT_DEFINED
"},{"t":"list_item","d":12,"p":{"lines":[200,201]},"v":"modifiedAttackComplexity HIGH
LOW
NOT_DEFINED
"},{"t":"list_item","d":12,"p":{"lines":[201,202]},"v":"modifiedPrivilegesRequired HIGH
LOW
NONE
NOT_DEFINED
"},{"t":"list_item","d":12,"p":{"lines":[202,203]},"v":"modifiedUserInteraction NONE
REQUIRED
NOT_DEFINED
"},{"t":"list_item","d":12,"p":{"lines":[203,204]},"v":"modifiedScope UNCHANGED
CHANGED
NOT_DEFINED
"},{"t":"list_item","d":12,"p":{"lines":[204,205]},"v":"modifiedConfidentialityImpact NONE
LOW
HIGH
NOT_DEFINED
"},{"t":"list_item","d":12,"p":{"lines":[205,206]},"v":"modifiedIntegrityImpact NONE
LOW
HIGH
NOT_DEFINED
"},{"t":"list_item","d":12,"p":{"lines":[206,207]},"v":"modifiedAvailabilityImpact NONE
LOW
HIGH
NOT_DEFINED
"},{"t":"list_item","d":12,"p":{"lines":[207,208]},"v":"environmentalScore"},{"t":"list_item","d":12,"p":{"lines":[208,209]},"v":"environmentalSeverity NONE
LOW
MEDIUM
HIGH
CRITICAL
"}]},{"t":"list_item","d":10,"p":{"lines":[209,210],"f":true},"v":"cvssV2_0 ","c":[{"t":"list_item","d":12,"p":{"lines":[210,211]},"v":"version 2.0
"},{"t":"list_item","d":12,"p":{"lines":[211,212]},"v":"vectorString"},{"t":"list_item","d":12,"p":{"lines":[212,213]},"v":"accessVector NETWORK
ADJACENT_NETWORK
LOCAL
"},{"t":"list_item","d":12,"p":{"lines":[213,214]},"v":"accessComplexity HIGH
MEDIUM
LOW
"},{"t":"list_item","d":12,"p":{"lines":[214,215]},"v":"authentication MULTIPLE
SINGLE
NONE
"},{"t":"list_item","d":12,"p":{"lines":[215,216]},"v":"confidentialityImpact NONE
PARTIAL
COMPLETE
"},{"t":"list_item","d":12,"p":{"lines":[216,217]},"v":"integrityImpact NONE
PARTIAL
COMPLETE
"},{"t":"list_item","d":12,"p":{"lines":[217,218]},"v":"availabilityImpact NONE
PARTIAL
COMPLETE
"},{"t":"list_item","d":12,"p":{"lines":[218,219]},"v":"baseScore"},{"t":"list_item","d":12,"p":{"lines":[219,220]},"v":"exploitability UNPROVEN
PROOF_OF_CONCEPT
FUNCTIONAL
HIGH
NOT_DEFINED
"},{"t":"list_item","d":12,"p":{"lines":[220,221]},"v":"remediationLevel OFFICIAL_FIX
TEMPORARY_FIX
WORKAROUND
UNAVAILABLE
NOT_DEFINED
"},{"t":"list_item","d":12,"p":{"lines":[221,222]},"v":"reportConfidence UNCONFIRMED
UNCORROBORATED
CONFIRMED
NOT_DEFINED
"},{"t":"list_item","d":12,"p":{"lines":[222,223]},"v":"temporalScore"},{"t":"list_item","d":12,"p":{"lines":[223,224]},"v":"collateralDamagePotential NONE
LOW
LOW_MEDIUM
MEDIUM_HIGH
HIGH
NOT_DEFINED
"},{"t":"list_item","d":12,"p":{"lines":[224,225]},"v":"targetDistribution NONE
LOW
MEDIUM
HIGH
NOT_DEFINED
"},{"t":"list_item","d":12,"p":{"lines":[225,226]},"v":"confidentialityRequirement LOW
MEDIUM
HIGH
NOT_DEFINED
"},{"t":"list_item","d":12,"p":{"lines":[226,227]},"v":"integrityRequirement LOW
MEDIUM
HIGH
NOT_DEFINED
"},{"t":"list_item","d":12,"p":{"lines":[227,228]},"v":"availabilityRequirement LOW
MEDIUM
HIGH
NOT_DEFINED
"},{"t":"list_item","d":12,"p":{"lines":[228,229]},"v":"environmentalScore"}]},{"t":"list_item","d":10,"p":{"lines":[229,230]},"v":"other","c":[{"t":"list_item","d":12,"p":{"lines":[230,231]},"v":"type"},{"t":"list_item","d":12,"p":{"lines":[231,232]},"v":"content"}]}]},{"t":"list_item","d":8,"p":{"lines":[232,233],"f":true},"v":"configurations []","c":[{"t":"list_item","d":10,"p":{"lines":[233,234]},"v":"lang"},{"t":"list_item","d":10,"p":{"lines":[234,235]},"v":"value"},{"t":"list_item","d":10,"p":{"lines":[235,236],"f":true},"v":"supportingMedia []","c":[{"t":"list_item","d":12,"p":{"lines":[236,237]},"v":"type e.g., text/markdown
"},{"t":"list_item","d":12,"p":{"lines":[237,238]},"v":"base64 ☯"},{"t":"list_item","d":12,"p":{"lines":[238,239]},"v":"value"}]}]},{"t":"list_item","d":8,"p":{"lines":[239,240],"f":true},"v":"workarounds []","c":[{"t":"list_item","d":10,"p":{"lines":[240,241]},"v":"lang"},{"t":"list_item","d":10,"p":{"lines":[241,242]},"v":"value"},{"t":"list_item","d":10,"p":{"lines":[242,243],"f":true},"v":"supportingMedia []","c":[{"t":"list_item","d":12,"p":{"lines":[243,244]},"v":"type e.g., text/markdown
"},{"t":"list_item","d":12,"p":{"lines":[244,245]},"v":"base64 ☯"},{"t":"list_item","d":12,"p":{"lines":[245,246]},"v":"value"}]}]},{"t":"list_item","d":8,"p":{"lines":[246,247],"f":true},"v":"solutions []","c":[{"t":"list_item","d":10,"p":{"lines":[247,248]},"v":"lang"},{"t":"list_item","d":10,"p":{"lines":[248,249]},"v":"value"},{"t":"list_item","d":10,"p":{"lines":[249,250],"f":true},"v":"supportingMedia []","c":[{"t":"list_item","d":12,"p":{"lines":[250,251]},"v":"type e.g., text/markdown
"},{"t":"list_item","d":12,"p":{"lines":[251,252]},"v":"base64 ☯"},{"t":"list_item","d":12,"p":{"lines":[252,253]},"v":"value"}]}]},{"t":"list_item","d":8,"p":{"lines":[253,254],"f":true},"v":"exploits []","c":[{"t":"list_item","d":10,"p":{"lines":[254,255]},"v":"lang"},{"t":"list_item","d":10,"p":{"lines":[255,256]},"v":"value"},{"t":"list_item","d":10,"p":{"lines":[256,257],"f":true},"v":"supportingMedia []","c":[{"t":"list_item","d":12,"p":{"lines":[257,258]},"v":"type e.g., text/markdown
"},{"t":"list_item","d":12,"p":{"lines":[258,259]},"v":"base64 ☯"},{"t":"list_item","d":12,"p":{"lines":[259,260]},"v":"value"}]}]},{"t":"list_item","d":8,"p":{"lines":[260,261],"f":true},"v":"timeline []","c":[{"t":"list_item","d":10,"p":{"lines":[261,262]},"v":"time"},{"t":"list_item","d":10,"p":{"lines":[262,263]},"v":"lang"},{"t":"list_item","d":10,"p":{"lines":[263,264]},"v":"value"}]},{"t":"list_item","d":8,"p":{"lines":[264,265],"f":true},"v":"credits []","c":[{"t":"list_item","d":10,"p":{"lines":[265,266]},"v":"lang"},{"t":"list_item","d":10,"p":{"lines":[266,267]},"v":"value"},{"t":"list_item","d":10,"p":{"lines":[267,268]},"v":"user"},{"t":"list_item","d":10,"p":{"lines":[268,269]},"v":"type finder
reporter
analyst
coordinator
remediation developer
remediation reviewer
remediation verifier
tool
sponsor
other
"}]},{"t":"list_item","d":8,"p":{"lines":[269,270]},"v":"source"},{"t":"list_item","d":8,"p":{"lines":[270,271],"f":true},"v":"tags []"},{"t":"list_item","d":8,"p":{"lines":[271,272],"f":true},"v":"taxonomyMappings []","c":[{"t":"list_item","d":10,"p":{"lines":[272,273]},"v":"taxonomyName"},{"t":"list_item","d":10,"p":{"lines":[273,274]},"v":"taxonomyVersion"},{"t":"list_item","d":10,"p":{"lines":[274,275]},"v":"taxonomyRelations []","c":[{"t":"list_item","d":12,"p":{"lines":[275,276]},"v":"taxonomyId"},{"t":"list_item","d":12,"p":{"lines":[276,277]},"v":"relationshipName"},{"t":"list_item","d":12,"p":{"lines":[277,278]},"v":"relationshipValue"}]}]},{"t":"list_item","d":8,"p":{"lines":[278,279]},"v":"^x_[^.]*$"}]},{"t":"list_item","d":6,"p":{"lines":[279,280],"f":true},"v":"adp []","c":[{"t":"list_item","d":8,"p":{"lines":[280,281]},"v":"providerMetadata","c":[{"t":"list_item","d":10,"p":{"lines":[281,282]},"v":"orgId"},{"t":"list_item","d":10,"p":{"lines":[282,283]},"v":"shortName"},{"t":"list_item","d":10,"p":{"lines":[283,284]},"v":"dateUpdated"}]},{"t":"list_item","d":8,"p":{"lines":[284,285]},"v":"datePublic"},{"t":"list_item","d":8,"p":{"lines":[285,286]},"v":"title"},{"t":"list_item","d":8,"p":{"lines":[286,287]},"v":"descriptions []","c":[{"t":"list_item","d":10,"p":{"lines":[287,288]},"v":"lang"},{"t":"list_item","d":10,"p":{"lines":[288,289]},"v":"value"},{"t":"list_item","d":10,"p":{"lines":[289,290],"f":true},"v":"supportingMedia []","c":[{"t":"list_item","d":12,"p":{"lines":[290,291]},"v":"type e.g., text/markdown
"},{"t":"list_item","d":12,"p":{"lines":[291,292]},"v":"base64 ☯"},{"t":"list_item","d":12,"p":{"lines":[292,293]},"v":"value"}]}]},{"t":"list_item","d":8,"p":{"lines":[293,294]},"v":"affected []","c":[{"t":"list_item","d":10,"p":{"lines":[294,295]},"v":"vendor"},{"t":"list_item","d":10,"p":{"lines":[295,296]},"v":"product"},{"t":"list_item","d":10,"p":{"lines":[296,297]},"v":"collectionURL e.g., https://access.redhat.com/downloads/content/package-browser
"},{"t":"list_item","d":10,"p":{"lines":[297,298]},"v":"packageName"},{"t":"list_item","d":10,"p":{"lines":[298,299]},"v":"cpes []"},{"t":"list_item","d":10,"p":{"lines":[299,300]},"v":"modules []"},{"t":"list_item","d":10,"p":{"lines":[300,301]},"v":"programFiles []"},{"t":"list_item","d":10,"p":{"lines":[301,302]},"v":"programRoutines []","c":[{"t":"list_item","d":12,"p":{"lines":[302,303]},"v":"name"}]},{"t":"list_item","d":10,"p":{"lines":[303,304]},"v":"platforms []"},{"t":"list_item","d":10,"p":{"lines":[304,305]},"v":"repo"},{"t":"list_item","d":10,"p":{"lines":[305,306]},"v":"defaultStatus affected
unaffected
unknown
"},{"t":"list_item","d":10,"p":{"lines":[306,307]},"v":"versions []","c":[{"t":"list_item","d":12,"p":{"lines":[307,308]},"v":"version"},{"t":"list_item","d":12,"p":{"lines":[308,309]},"v":"status affected
unaffected
unknown
"},{"t":"list_item","d":12,"p":{"lines":[309,310]},"v":"versionType e.g., custom
"},{"t":"list_item","d":12,"p":{"lines":[310,311]},"v":"lessThan"},{"t":"list_item","d":12,"p":{"lines":[311,312]},"v":"lessThanOrEqual"},{"t":"list_item","d":12,"p":{"lines":[312,313]},"v":"changes []","c":[{"t":"list_item","d":14,"p":{"lines":[313,314]},"v":"at"},{"t":"list_item","d":14,"p":{"lines":[314,315]},"v":"status affected
unaffected
unknown
"}]}]}]},{"t":"list_item","d":8,"p":{"lines":[315,316]},"v":"problemTypes []","c":[{"t":"list_item","d":10,"p":{"lines":[316,317]},"v":"descriptions []","c":[{"t":"list_item","d":12,"p":{"lines":[317,318]},"v":"lang"},{"t":"list_item","d":12,"p":{"lines":[318,319]},"v":"description"},{"t":"list_item","d":12,"p":{"lines":[319,320]},"v":"cweId"},{"t":"list_item","d":12,"p":{"lines":[320,321]},"v":"type"},{"t":"list_item","d":12,"p":{"lines":[321,322]},"v":"references []","c":[{"t":"list_item","d":14,"p":{"lines":[322,323]},"v":"url"},{"t":"list_item","d":14,"p":{"lines":[323,324]},"v":"name"},{"t":"list_item","d":14,"p":{"lines":[324,325],"f":true},"v":"tags []"}]}]}]},{"t":"list_item","d":8,"p":{"lines":[325,326]},"v":"references []","c":[{"t":"list_item","d":10,"p":{"lines":[326,327]},"v":"url"},{"t":"list_item","d":10,"p":{"lines":[327,328]},"v":"name"},{"t":"list_item","d":10,"p":{"lines":[328,329],"f":true},"v":"tags []"}]},{"t":"list_item","d":8,"p":{"lines":[329,330],"f":true},"v":"impacts []","c":[{"t":"list_item","d":10,"p":{"lines":[330,331]},"v":"capecId"},{"t":"list_item","d":10,"p":{"lines":[331,332]},"v":"descriptions []","c":[{"t":"list_item","d":12,"p":{"lines":[332,333]},"v":"lang"},{"t":"list_item","d":12,"p":{"lines":[333,334]},"v":"value"},{"t":"list_item","d":12,"p":{"lines":[334,335],"f":true},"v":"supportingMedia []","c":[{"t":"list_item","d":14,"p":{"lines":[335,336]},"v":"type e.g., text/markdown
"},{"t":"list_item","d":14,"p":{"lines":[336,337]},"v":"base64 ☯"},{"t":"list_item","d":14,"p":{"lines":[337,338]},"v":"value"}]}]}]},{"t":"list_item","d":8,"p":{"lines":[338,339],"f":true},"v":"metrics []","c":[{"t":"list_item","d":10,"p":{"lines":[339,340]},"v":"format"},{"t":"list_item","d":10,"p":{"lines":[340,341]},"v":"scenarios []","c":[{"t":"list_item","d":12,"p":{"lines":[341,342]},"v":"lang"},{"t":"list_item","d":12,"p":{"lines":[342,343]},"v":"value"}]},{"t":"list_item","d":10,"p":{"lines":[343,344]},"v":"cvssV4_0","c":[{"t":"list_item","d":12,"p":{"lines":[344,345]},"v":"version 4.0
"},{"t":"list_item","d":12,"p":{"lines":[345,346]},"v":"vectorString"},{"t":"list_item","d":12,"p":{"lines":[346,347]},"v":"baseScore"},{"t":"list_item","d":12,"p":{"lines":[347,348]},"v":"baseSeverity NONE
LOW
MEDIUM
HIGH
CRITICAL
"},{"t":"list_item","d":12,"p":{"lines":[348,349]},"v":"attackVector NETWORK
ADJACENT
LOCAL
PHYSICAL
"},{"t":"list_item","d":12,"p":{"lines":[349,350]},"v":"attackComplexity HIGH
LOW
"},{"t":"list_item","d":12,"p":{"lines":[350,351]},"v":"attackRequirements NONE
PRESENT
"},{"t":"list_item","d":12,"p":{"lines":[351,352]},"v":"privilegesRequired HIGH
LOW
NONE
"},{"t":"list_item","d":12,"p":{"lines":[352,353]},"v":"userInteraction NONE
PASSIVE
ACTIVE
"},{"t":"list_item","d":12,"p":{"lines":[353,354]},"v":"vulnConfidentialityImpact NONE
LOW
HIGH
"},{"t":"list_item","d":12,"p":{"lines":[354,355]},"v":"vulnIntegrityImpact NONE
LOW
HIGH
"},{"t":"list_item","d":12,"p":{"lines":[355,356]},"v":"vulnAvailabilityImpact NONE
LOW
HIGH
"},{"t":"list_item","d":12,"p":{"lines":[356,357]},"v":"subConfidentialityImpact NONE
LOW
HIGH
"},{"t":"list_item","d":12,"p":{"lines":[357,358]},"v":"subIntegrityImpact NONE
LOW
HIGH
"},{"t":"list_item","d":12,"p":{"lines":[358,359]},"v":"subAvailabilityImpact NONE
LOW
HIGH
"},{"t":"list_item","d":12,"p":{"lines":[359,360]},"v":"exploitMaturity UNREPORTED
PROOF_OF_CONCEPT
ATTACKED
NOT_DEFINED
"},{"t":"list_item","d":12,"p":{"lines":[360,361]},"v":"confidentialityRequirement LOW
MEDIUM
HIGH
NOT_DEFINED
"},{"t":"list_item","d":12,"p":{"lines":[361,362]},"v":"integrityRequirement LOW
MEDIUM
HIGH
NOT_DEFINED
"},{"t":"list_item","d":12,"p":{"lines":[362,363]},"v":"availabilityRequirement LOW
MEDIUM
HIGH
NOT_DEFINED
"},{"t":"list_item","d":12,"p":{"lines":[363,364]},"v":"modifiedAttackVector NETWORK
ADJACENT
LOCAL
PHYSICAL
NOT_DEFINED
"},{"t":"list_item","d":12,"p":{"lines":[364,365]},"v":"modifiedAttackComplexity HIGH
LOW
NOT_DEFINED
"},{"t":"list_item","d":12,"p":{"lines":[365,366]},"v":"modifiedAttackRequirements NONE
PRESENT
NOT_DEFINED
"},{"t":"list_item","d":12,"p":{"lines":[366,367]},"v":"modifiedPrivilegesRequired HIGH
LOW
NONE
NOT_DEFINED
"},{"t":"list_item","d":12,"p":{"lines":[367,368]},"v":"modifiedUserInteraction NONE
PASSIVE
ACTIVE
NOT_DEFINED
"},{"t":"list_item","d":12,"p":{"lines":[368,369]},"v":"modifiedVulnConfidentialityImpact NONE
LOW
HIGH
NOT_DEFINED
"},{"t":"list_item","d":12,"p":{"lines":[369,370]},"v":"modifiedVulnIntegrityImpact NONE
LOW
HIGH
NOT_DEFINED
"},{"t":"list_item","d":12,"p":{"lines":[370,371]},"v":"modifiedVulnAvailabilityImpact NONE
LOW
HIGH
NOT_DEFINED
"},{"t":"list_item","d":12,"p":{"lines":[371,372]},"v":"modifiedSubConfidentialityImpact NONE
LOW
HIGH
NOT_DEFINED
"},{"t":"list_item","d":12,"p":{"lines":[372,373]},"v":"modifiedSubIntegrityImpact NONE
LOW
HIGH
SAFETY
NOT_DEFINED
"},{"t":"list_item","d":12,"p":{"lines":[373,374]},"v":"modifiedSubAvailabilityImpact NONE
LOW
HIGH
SAFETY
NOT_DEFINED
"},{"t":"list_item","d":12,"p":{"lines":[374,375]},"v":"Safety NEGLIGIBLE
PRESENT
NOT_DEFINED
"},{"t":"list_item","d":12,"p":{"lines":[375,376]},"v":"Automatable NO
YES
NOT_DEFINED
"},{"t":"list_item","d":12,"p":{"lines":[376,377]},"v":"Recovery AUTOMATIC
USER
IRRECOVERABLE
NOT_DEFINED
"},{"t":"list_item","d":12,"p":{"lines":[377,378]},"v":"valueDensity DIFFUSE
CONCENTRATED
NOT_DEFINED
"},{"t":"list_item","d":12,"p":{"lines":[378,379]},"v":"vulnerabilityResponseEffort LOW
MODERATE
HIGH
NOT_DEFINED
"},{"t":"list_item","d":12,"p":{"lines":[379,380]},"v":"providerUrgency CLEAR
GREEN
AMBER
RED
NOT_DEFINED
","c":[{"t":"list_item","d":14,"p":{"lines":[380,381]},"v":"baseScore"},{"t":"list_item","d":14,"p":{"lines":[381,382]},"v":"baseSeverity"},{"t":"list_item","d":14,"p":{"lines":[382,383]},"v":"baseScore"},{"t":"list_item","d":14,"p":{"lines":[383,384]},"v":"baseSeverity"},{"t":"list_item","d":14,"p":{"lines":[384,385]},"v":"baseScore"},{"t":"list_item","d":14,"p":{"lines":[385,386]},"v":"baseSeverity"},{"t":"list_item","d":14,"p":{"lines":[386,387]},"v":"baseScore"},{"t":"list_item","d":14,"p":{"lines":[387,388]},"v":"baseSeverity"},{"t":"list_item","d":14,"p":{"lines":[388,389]},"v":"baseScore"},{"t":"list_item","d":14,"p":{"lines":[389,390]},"v":"baseSeverity"},{"t":"list_item","d":14,"p":{"lines":[390,391]},"v":"threatScore"},{"t":"list_item","d":14,"p":{"lines":[391,392]},"v":"threatSeverity"},{"t":"list_item","d":14,"p":{"lines":[392,393]},"v":"threatScore"},{"t":"list_item","d":14,"p":{"lines":[393,394]},"v":"threatSeverity"},{"t":"list_item","d":14,"p":{"lines":[394,395]},"v":"threatScore"},{"t":"list_item","d":14,"p":{"lines":[395,396]},"v":"threatSeverity"},{"t":"list_item","d":14,"p":{"lines":[396,397]},"v":"threatScore"},{"t":"list_item","d":14,"p":{"lines":[397,398]},"v":"threatSeverity"},{"t":"list_item","d":14,"p":{"lines":[398,399]},"v":"threatScore"},{"t":"list_item","d":14,"p":{"lines":[399,400]},"v":"threatSeverity"},{"t":"list_item","d":14,"p":{"lines":[400,401]},"v":"environmentalScore"},{"t":"list_item","d":14,"p":{"lines":[401,402]},"v":"environmentalSeverity"},{"t":"list_item","d":14,"p":{"lines":[402,403]},"v":"environmentalScore"},{"t":"list_item","d":14,"p":{"lines":[403,404]},"v":"environmentalSeverity"},{"t":"list_item","d":14,"p":{"lines":[404,405]},"v":"environmentalScore"},{"t":"list_item","d":14,"p":{"lines":[405,406]},"v":"environmentalSeverity"},{"t":"list_item","d":14,"p":{"lines":[406,407]},"v":"environmentalScore"},{"t":"list_item","d":14,"p":{"lines":[407,408]},"v":"environmentalSeverity"},{"t":"list_item","d":14,"p":{"lines":[408,409]},"v":"environmentalScore"},{"t":"list_item","d":14,"p":{"lines":[409,410]},"v":"environmentalSeverity"}]}]},{"t":"list_item","d":10,"p":{"lines":[410,411],"f":true},"v":"cvssV3_1 ","c":[{"t":"list_item","d":12,"p":{"lines":[411,412]},"v":"version 3.1
"},{"t":"list_item","d":12,"p":{"lines":[412,413]},"v":"vectorString"},{"t":"list_item","d":12,"p":{"lines":[413,414]},"v":"attackVector NETWORK
ADJACENT_NETWORK
LOCAL
PHYSICAL
"},{"t":"list_item","d":12,"p":{"lines":[414,415]},"v":"attackComplexity HIGH
LOW
"},{"t":"list_item","d":12,"p":{"lines":[415,416]},"v":"privilegesRequired HIGH
LOW
NONE
"},{"t":"list_item","d":12,"p":{"lines":[416,417]},"v":"userInteraction NONE
REQUIRED
"},{"t":"list_item","d":12,"p":{"lines":[417,418]},"v":"scope UNCHANGED
CHANGED
"},{"t":"list_item","d":12,"p":{"lines":[418,419]},"v":"confidentialityImpact NONE
LOW
HIGH
"},{"t":"list_item","d":12,"p":{"lines":[419,420]},"v":"integrityImpact NONE
LOW
HIGH
"},{"t":"list_item","d":12,"p":{"lines":[420,421]},"v":"availabilityImpact NONE
LOW
HIGH
"},{"t":"list_item","d":12,"p":{"lines":[421,422]},"v":"baseScore"},{"t":"list_item","d":12,"p":{"lines":[422,423]},"v":"baseSeverity NONE
LOW
MEDIUM
HIGH
CRITICAL
"},{"t":"list_item","d":12,"p":{"lines":[423,424]},"v":"exploitCodeMaturity UNPROVEN
PROOF_OF_CONCEPT
FUNCTIONAL
HIGH
NOT_DEFINED
"},{"t":"list_item","d":12,"p":{"lines":[424,425]},"v":"remediationLevel OFFICIAL_FIX
TEMPORARY_FIX
WORKAROUND
UNAVAILABLE
NOT_DEFINED
"},{"t":"list_item","d":12,"p":{"lines":[425,426]},"v":"reportConfidence UNKNOWN
REASONABLE
CONFIRMED
NOT_DEFINED
"},{"t":"list_item","d":12,"p":{"lines":[426,427]},"v":"temporalScore"},{"t":"list_item","d":12,"p":{"lines":[427,428]},"v":"temporalSeverity NONE
LOW
MEDIUM
HIGH
CRITICAL
"},{"t":"list_item","d":12,"p":{"lines":[428,429]},"v":"confidentialityRequirement LOW
MEDIUM
HIGH
NOT_DEFINED
"},{"t":"list_item","d":12,"p":{"lines":[429,430]},"v":"integrityRequirement LOW
MEDIUM
HIGH
NOT_DEFINED
"},{"t":"list_item","d":12,"p":{"lines":[430,431]},"v":"availabilityRequirement LOW
MEDIUM
HIGH
NOT_DEFINED
"},{"t":"list_item","d":12,"p":{"lines":[431,432]},"v":"modifiedAttackVector NETWORK
ADJACENT_NETWORK
LOCAL
PHYSICAL
NOT_DEFINED
"},{"t":"list_item","d":12,"p":{"lines":[432,433]},"v":"modifiedAttackComplexity HIGH
LOW
NOT_DEFINED
"},{"t":"list_item","d":12,"p":{"lines":[433,434]},"v":"modifiedPrivilegesRequired HIGH
LOW
NONE
NOT_DEFINED
"},{"t":"list_item","d":12,"p":{"lines":[434,435]},"v":"modifiedUserInteraction NONE
REQUIRED
NOT_DEFINED
"},{"t":"list_item","d":12,"p":{"lines":[435,436]},"v":"modifiedScope UNCHANGED
CHANGED
NOT_DEFINED
"},{"t":"list_item","d":12,"p":{"lines":[436,437]},"v":"modifiedConfidentialityImpact NONE
LOW
HIGH
NOT_DEFINED
"},{"t":"list_item","d":12,"p":{"lines":[437,438]},"v":"modifiedIntegrityImpact NONE
LOW
HIGH
NOT_DEFINED
"},{"t":"list_item","d":12,"p":{"lines":[438,439]},"v":"modifiedAvailabilityImpact NONE
LOW
HIGH
NOT_DEFINED
"},{"t":"list_item","d":12,"p":{"lines":[439,440]},"v":"environmentalScore"},{"t":"list_item","d":12,"p":{"lines":[440,441]},"v":"environmentalSeverity NONE
LOW
MEDIUM
HIGH
CRITICAL
"}]},{"t":"list_item","d":10,"p":{"lines":[441,442],"f":true},"v":"cvssV3_0 ","c":[{"t":"list_item","d":12,"p":{"lines":[442,443]},"v":"version 3.0
"},{"t":"list_item","d":12,"p":{"lines":[443,444]},"v":"vectorString"},{"t":"list_item","d":12,"p":{"lines":[444,445]},"v":"attackVector NETWORK
ADJACENT_NETWORK
LOCAL
PHYSICAL
"},{"t":"list_item","d":12,"p":{"lines":[445,446]},"v":"attackComplexity HIGH
LOW
"},{"t":"list_item","d":12,"p":{"lines":[446,447]},"v":"privilegesRequired HIGH
LOW
NONE
"},{"t":"list_item","d":12,"p":{"lines":[447,448]},"v":"userInteraction NONE
REQUIRED
"},{"t":"list_item","d":12,"p":{"lines":[448,449]},"v":"scope UNCHANGED
CHANGED
"},{"t":"list_item","d":12,"p":{"lines":[449,450]},"v":"confidentialityImpact NONE
LOW
HIGH
"},{"t":"list_item","d":12,"p":{"lines":[450,451]},"v":"integrityImpact NONE
LOW
HIGH
"},{"t":"list_item","d":12,"p":{"lines":[451,452]},"v":"availabilityImpact NONE
LOW
HIGH
"},{"t":"list_item","d":12,"p":{"lines":[452,453]},"v":"baseScore"},{"t":"list_item","d":12,"p":{"lines":[453,454]},"v":"baseSeverity NONE
LOW
MEDIUM
HIGH
CRITICAL
"},{"t":"list_item","d":12,"p":{"lines":[454,455]},"v":"exploitCodeMaturity UNPROVEN
PROOF_OF_CONCEPT
FUNCTIONAL
HIGH
NOT_DEFINED
"},{"t":"list_item","d":12,"p":{"lines":[455,456]},"v":"remediationLevel OFFICIAL_FIX
TEMPORARY_FIX
WORKAROUND
UNAVAILABLE
NOT_DEFINED
"},{"t":"list_item","d":12,"p":{"lines":[456,457]},"v":"reportConfidence UNKNOWN
REASONABLE
CONFIRMED
NOT_DEFINED
"},{"t":"list_item","d":12,"p":{"lines":[457,458]},"v":"temporalScore"},{"t":"list_item","d":12,"p":{"lines":[458,459]},"v":"temporalSeverity NONE
LOW
MEDIUM
HIGH
CRITICAL
"},{"t":"list_item","d":12,"p":{"lines":[459,460]},"v":"confidentialityRequirement LOW
MEDIUM
HIGH
NOT_DEFINED
"},{"t":"list_item","d":12,"p":{"lines":[460,461]},"v":"integrityRequirement LOW
MEDIUM
HIGH
NOT_DEFINED
"},{"t":"list_item","d":12,"p":{"lines":[461,462]},"v":"availabilityRequirement LOW
MEDIUM
HIGH
NOT_DEFINED
"},{"t":"list_item","d":12,"p":{"lines":[462,463]},"v":"modifiedAttackVector NETWORK
ADJACENT_NETWORK
LOCAL
PHYSICAL
NOT_DEFINED
"},{"t":"list_item","d":12,"p":{"lines":[463,464]},"v":"modifiedAttackComplexity HIGH
LOW
NOT_DEFINED
"},{"t":"list_item","d":12,"p":{"lines":[464,465]},"v":"modifiedPrivilegesRequired HIGH
LOW
NONE
NOT_DEFINED
"},{"t":"list_item","d":12,"p":{"lines":[465,466]},"v":"modifiedUserInteraction NONE
REQUIRED
NOT_DEFINED
"},{"t":"list_item","d":12,"p":{"lines":[466,467]},"v":"modifiedScope UNCHANGED
CHANGED
NOT_DEFINED
"},{"t":"list_item","d":12,"p":{"lines":[467,468]},"v":"modifiedConfidentialityImpact NONE
LOW
HIGH
NOT_DEFINED
"},{"t":"list_item","d":12,"p":{"lines":[468,469]},"v":"modifiedIntegrityImpact NONE
LOW
HIGH
NOT_DEFINED
"},{"t":"list_item","d":12,"p":{"lines":[469,470]},"v":"modifiedAvailabilityImpact NONE
LOW
HIGH
NOT_DEFINED
"},{"t":"list_item","d":12,"p":{"lines":[470,471]},"v":"environmentalScore"},{"t":"list_item","d":12,"p":{"lines":[471,472]},"v":"environmentalSeverity NONE
LOW
MEDIUM
HIGH
CRITICAL
"}]},{"t":"list_item","d":10,"p":{"lines":[472,473],"f":true},"v":"cvssV2_0 ","c":[{"t":"list_item","d":12,"p":{"lines":[473,474]},"v":"version 2.0
"},{"t":"list_item","d":12,"p":{"lines":[474,475]},"v":"vectorString"},{"t":"list_item","d":12,"p":{"lines":[475,476]},"v":"accessVector NETWORK
ADJACENT_NETWORK
LOCAL
"},{"t":"list_item","d":12,"p":{"lines":[476,477]},"v":"accessComplexity HIGH
MEDIUM
LOW
"},{"t":"list_item","d":12,"p":{"lines":[477,478]},"v":"authentication MULTIPLE
SINGLE
NONE
"},{"t":"list_item","d":12,"p":{"lines":[478,479]},"v":"confidentialityImpact NONE
PARTIAL
COMPLETE
"},{"t":"list_item","d":12,"p":{"lines":[479,480]},"v":"integrityImpact NONE
PARTIAL
COMPLETE
"},{"t":"list_item","d":12,"p":{"lines":[480,481]},"v":"availabilityImpact NONE
PARTIAL
COMPLETE
"},{"t":"list_item","d":12,"p":{"lines":[481,482]},"v":"baseScore"},{"t":"list_item","d":12,"p":{"lines":[482,483]},"v":"exploitability UNPROVEN
PROOF_OF_CONCEPT
FUNCTIONAL
HIGH
NOT_DEFINED
"},{"t":"list_item","d":12,"p":{"lines":[483,484]},"v":"remediationLevel OFFICIAL_FIX
TEMPORARY_FIX
WORKAROUND
UNAVAILABLE
NOT_DEFINED
"},{"t":"list_item","d":12,"p":{"lines":[484,485]},"v":"reportConfidence UNCONFIRMED
UNCORROBORATED
CONFIRMED
NOT_DEFINED
"},{"t":"list_item","d":12,"p":{"lines":[485,486]},"v":"temporalScore"},{"t":"list_item","d":12,"p":{"lines":[486,487]},"v":"collateralDamagePotential NONE
LOW
LOW_MEDIUM
MEDIUM_HIGH
HIGH
NOT_DEFINED
"},{"t":"list_item","d":12,"p":{"lines":[487,488]},"v":"targetDistribution NONE
LOW
MEDIUM
HIGH
NOT_DEFINED
"},{"t":"list_item","d":12,"p":{"lines":[488,489]},"v":"confidentialityRequirement LOW
MEDIUM
HIGH
NOT_DEFINED
"},{"t":"list_item","d":12,"p":{"lines":[489,490]},"v":"integrityRequirement LOW
MEDIUM
HIGH
NOT_DEFINED
"},{"t":"list_item","d":12,"p":{"lines":[490,491]},"v":"availabilityRequirement LOW
MEDIUM
HIGH
NOT_DEFINED
"},{"t":"list_item","d":12,"p":{"lines":[491,492]},"v":"environmentalScore"}]},{"t":"list_item","d":10,"p":{"lines":[492,493]},"v":"other","c":[{"t":"list_item","d":12,"p":{"lines":[493,494]},"v":"type"},{"t":"list_item","d":12,"p":{"lines":[494,495]},"v":"content"}]}]},{"t":"list_item","d":8,"p":{"lines":[495,496],"f":true},"v":"configurations []","c":[{"t":"list_item","d":10,"p":{"lines":[496,497]},"v":"lang"},{"t":"list_item","d":10,"p":{"lines":[497,498]},"v":"value"},{"t":"list_item","d":10,"p":{"lines":[498,499],"f":true},"v":"supportingMedia []","c":[{"t":"list_item","d":12,"p":{"lines":[499,500]},"v":"type e.g., text/markdown
"},{"t":"list_item","d":12,"p":{"lines":[500,501]},"v":"base64 ☯"},{"t":"list_item","d":12,"p":{"lines":[501,502]},"v":"value"}]}]},{"t":"list_item","d":8,"p":{"lines":[502,503],"f":true},"v":"workarounds []","c":[{"t":"list_item","d":10,"p":{"lines":[503,504]},"v":"lang"},{"t":"list_item","d":10,"p":{"lines":[504,505]},"v":"value"},{"t":"list_item","d":10,"p":{"lines":[505,506],"f":true},"v":"supportingMedia []","c":[{"t":"list_item","d":12,"p":{"lines":[506,507]},"v":"type e.g., text/markdown
"},{"t":"list_item","d":12,"p":{"lines":[507,508]},"v":"base64 ☯"},{"t":"list_item","d":12,"p":{"lines":[508,509]},"v":"value"}]}]},{"t":"list_item","d":8,"p":{"lines":[509,510],"f":true},"v":"solutions []","c":[{"t":"list_item","d":10,"p":{"lines":[510,511]},"v":"lang"},{"t":"list_item","d":10,"p":{"lines":[511,512]},"v":"value"},{"t":"list_item","d":10,"p":{"lines":[512,513],"f":true},"v":"supportingMedia []","c":[{"t":"list_item","d":12,"p":{"lines":[513,514]},"v":"type e.g., text/markdown
"},{"t":"list_item","d":12,"p":{"lines":[514,515]},"v":"base64 ☯"},{"t":"list_item","d":12,"p":{"lines":[515,516]},"v":"value"}]}]},{"t":"list_item","d":8,"p":{"lines":[516,517],"f":true},"v":"exploits []","c":[{"t":"list_item","d":10,"p":{"lines":[517,518]},"v":"lang"},{"t":"list_item","d":10,"p":{"lines":[518,519]},"v":"value"},{"t":"list_item","d":10,"p":{"lines":[519,520],"f":true},"v":"supportingMedia []","c":[{"t":"list_item","d":12,"p":{"lines":[520,521]},"v":"type e.g., text/markdown
"},{"t":"list_item","d":12,"p":{"lines":[521,522]},"v":"base64 ☯"},{"t":"list_item","d":12,"p":{"lines":[522,523]},"v":"value"}]}]},{"t":"list_item","d":8,"p":{"lines":[523,524],"f":true},"v":"timeline []","c":[{"t":"list_item","d":10,"p":{"lines":[524,525]},"v":"time"},{"t":"list_item","d":10,"p":{"lines":[525,526]},"v":"lang"},{"t":"list_item","d":10,"p":{"lines":[526,527]},"v":"value"}]},{"t":"list_item","d":8,"p":{"lines":[527,528],"f":true},"v":"credits []","c":[{"t":"list_item","d":10,"p":{"lines":[528,529]},"v":"lang"},{"t":"list_item","d":10,"p":{"lines":[529,530]},"v":"value"},{"t":"list_item","d":10,"p":{"lines":[530,531]},"v":"user"},{"t":"list_item","d":10,"p":{"lines":[531,532]},"v":"type finder
reporter
analyst
coordinator
remediation developer
remediation reviewer
remediation verifier
tool
sponsor
other
"}]},{"t":"list_item","d":8,"p":{"lines":[532,533]},"v":"source"},{"t":"list_item","d":8,"p":{"lines":[533,534],"f":true},"v":"tags []"},{"t":"list_item","d":8,"p":{"lines":[534,535],"f":true},"v":"taxonomyMappings []","c":[{"t":"list_item","d":10,"p":{"lines":[535,536]},"v":"taxonomyName"},{"t":"list_item","d":10,"p":{"lines":[536,537]},"v":"taxonomyVersion"},{"t":"list_item","d":10,"p":{"lines":[537,538]},"v":"taxonomyRelations []","c":[{"t":"list_item","d":12,"p":{"lines":[538,539]},"v":"taxonomyId"},{"t":"list_item","d":12,"p":{"lines":[539,540]},"v":"relationshipName"},{"t":"list_item","d":12,"p":{"lines":[540,541]},"v":"relationshipValue"}]}]},{"t":"list_item","d":8,"p":{"lines":[541,542]},"v":"^x_[^.]*$"}]}]}]},{"t":"heading","d":2,"p":{"lines":[542,543]},"v":"Rejected ","c":[{"t":"list_item","d":4,"p":{"lines":[543,544]},"v":"dataType CVE_RECORD
"},{"t":"list_item","d":4,"p":{"lines":[544,545]},"v":"dataVersion"},{"t":"list_item","d":4,"p":{"lines":[545,546]},"v":"cveMetadata","c":[{"t":"list_item","d":6,"p":{"lines":[546,547]},"v":"cveId"},{"t":"list_item","d":6,"p":{"lines":[547,548]},"v":"assignerOrgId"},{"t":"list_item","d":6,"p":{"lines":[548,549]},"v":"assignerShortName"},{"t":"list_item","d":6,"p":{"lines":[549,550]},"v":"serial"},{"t":"list_item","d":6,"p":{"lines":[550,551]},"v":"dateUpdated"},{"t":"list_item","d":6,"p":{"lines":[551,552]},"v":"datePublished"},{"t":"list_item","d":6,"p":{"lines":[552,553]},"v":"dateRejected"},{"t":"list_item","d":6,"p":{"lines":[553,554]},"v":"state REJECTED
"},{"t":"list_item","d":6,"p":{"lines":[554,555]},"v":"dateReserved"}]},{"t":"list_item","d":4,"p":{"lines":[555,556]},"v":"containers","c":[{"t":"list_item","d":6,"p":{"lines":[556,557]},"v":"cna","c":[{"t":"list_item","d":8,"p":{"lines":[557,558]},"v":"providerMetadata","c":[{"t":"list_item","d":10,"p":{"lines":[558,559]},"v":"orgId"},{"t":"list_item","d":10,"p":{"lines":[559,560]},"v":"shortName"},{"t":"list_item","d":10,"p":{"lines":[560,561]},"v":"dateUpdated"}]},{"t":"list_item","d":8,"p":{"lines":[561,562]},"v":"rejectedReasons []","c":[{"t":"list_item","d":10,"p":{"lines":[562,563]},"v":"lang"},{"t":"list_item","d":10,"p":{"lines":[563,564]},"v":"value"},{"t":"list_item","d":10,"p":{"lines":[564,565],"f":true},"v":"supportingMedia []","c":[{"t":"list_item","d":12,"p":{"lines":[565,566]},"v":"type e.g., text/markdown
"},{"t":"list_item","d":12,"p":{"lines":[566,567]},"v":"base64 ☯"},{"t":"list_item","d":12,"p":{"lines":[567,568]},"v":"value"}]}]},{"t":"list_item","d":8,"p":{"lines":[568,569]},"v":"replacedBy []"},{"t":"list_item","d":8,"p":{"lines":[569,570]},"v":"^x_[^.]*$"}]}]}]}]})