You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardexpand all lines: docs/dyn/containeranalysis_v1.projects.notes.html
+8
Original file line number
Diff line number
Diff line change
@@ -347,6 +347,7 @@ <h3>Method Details</h3>
347
347
"vendor": "A String", # The name of the vendor of the product.
348
348
},
349
349
],
350
+
"extraDetails": "A String", # Occurrence-specific extra details about the vulnerability.
350
351
"severity": "A String", # The note provider assigned severity of this vulnerability.
351
352
"sourceUpdateTime": "A String", # The time this information was last changed at the source. This is an upstream timestamp from the underlying information source - e.g. Ubuntu security tracker.
352
353
"windowsDetails": [ # Windows details get their own format because the information format and model don't match a normal detail. Specifically Windows updates are done as patches, thus Windows vulnerabilities really are a missing package, rather than a package being at an incorrect version.
@@ -646,6 +647,7 @@ <h3>Method Details</h3>
646
647
"vendor": "A String", # The name of the vendor of the product.
647
648
},
648
649
],
650
+
"extraDetails": "A String", # Occurrence-specific extra details about the vulnerability.
649
651
"severity": "A String", # The note provider assigned severity of this vulnerability.
650
652
"sourceUpdateTime": "A String", # The time this information was last changed at the source. This is an upstream timestamp from the underlying information source - e.g. Ubuntu security tracker.
651
653
"windowsDetails": [ # Windows details get their own format because the information format and model don't match a normal detail. Specifically Windows updates are done as patches, thus Windows vulnerabilities really are a missing package, rather than a package being at an incorrect version.
@@ -950,6 +952,7 @@ <h3>Method Details</h3>
950
952
"vendor": "A String", # The name of the vendor of the product.
951
953
},
952
954
],
955
+
"extraDetails": "A String", # Occurrence-specific extra details about the vulnerability.
953
956
"severity": "A String", # The note provider assigned severity of this vulnerability.
954
957
"sourceUpdateTime": "A String", # The time this information was last changed at the source. This is an upstream timestamp from the underlying information source - e.g. Ubuntu security tracker.
955
958
"windowsDetails": [ # Windows details get their own format because the information format and model don't match a normal detail. Specifically Windows updates are done as patches, thus Windows vulnerabilities really are a missing package, rather than a package being at an incorrect version.
@@ -1246,6 +1249,7 @@ <h3>Method Details</h3>
1246
1249
"vendor": "A String", # The name of the vendor of the product.
1247
1250
},
1248
1251
],
1252
+
"extraDetails": "A String", # Occurrence-specific extra details about the vulnerability.
1249
1253
"severity": "A String", # The note provider assigned severity of this vulnerability.
1250
1254
"sourceUpdateTime": "A String", # The time this information was last changed at the source. This is an upstream timestamp from the underlying information source - e.g. Ubuntu security tracker.
1251
1255
"windowsDetails": [ # Windows details get their own format because the information format and model don't match a normal detail. Specifically Windows updates are done as patches, thus Windows vulnerabilities really are a missing package, rather than a package being at an incorrect version.
@@ -1566,6 +1570,7 @@ <h3>Method Details</h3>
1566
1570
"vendor": "A String", # The name of the vendor of the product.
1567
1571
},
1568
1572
],
1573
+
"extraDetails": "A String", # Occurrence-specific extra details about the vulnerability.
1569
1574
"severity": "A String", # The note provider assigned severity of this vulnerability.
1570
1575
"sourceUpdateTime": "A String", # The time this information was last changed at the source. This is an upstream timestamp from the underlying information source - e.g. Ubuntu security tracker.
1571
1576
"windowsDetails": [ # Windows details get their own format because the information format and model don't match a normal detail. Specifically Windows updates are done as patches, thus Windows vulnerabilities really are a missing package, rather than a package being at an incorrect version.
@@ -1917,6 +1922,7 @@ <h3>Method Details</h3>
1917
1922
"vendor": "A String", # The name of the vendor of the product.
1918
1923
},
1919
1924
],
1925
+
"extraDetails": "A String", # Occurrence-specific extra details about the vulnerability.
1920
1926
"severity": "A String", # The note provider assigned severity of this vulnerability.
1921
1927
"sourceUpdateTime": "A String", # The time this information was last changed at the source. This is an upstream timestamp from the underlying information source - e.g. Ubuntu security tracker.
1922
1928
"windowsDetails": [ # Windows details get their own format because the information format and model don't match a normal detail. Specifically Windows updates are done as patches, thus Windows vulnerabilities really are a missing package, rather than a package being at an incorrect version.
@@ -2230,6 +2236,7 @@ <h3>Method Details</h3>
2230
2236
"vendor": "A String", # The name of the vendor of the product.
2231
2237
},
2232
2238
],
2239
+
"extraDetails": "A String", # Occurrence-specific extra details about the vulnerability.
2233
2240
"severity": "A String", # The note provider assigned severity of this vulnerability.
2234
2241
"sourceUpdateTime": "A String", # The time this information was last changed at the source. This is an upstream timestamp from the underlying information source - e.g. Ubuntu security tracker.
2235
2242
"windowsDetails": [ # Windows details get their own format because the information format and model don't match a normal detail. Specifically Windows updates are done as patches, thus Windows vulnerabilities really are a missing package, rather than a package being at an incorrect version.
@@ -2526,6 +2533,7 @@ <h3>Method Details</h3>
2526
2533
"vendor": "A String", # The name of the vendor of the product.
2527
2534
},
2528
2535
],
2536
+
"extraDetails": "A String", # Occurrence-specific extra details about the vulnerability.
2529
2537
"severity": "A String", # The note provider assigned severity of this vulnerability.
2530
2538
"sourceUpdateTime": "A String", # The time this information was last changed at the source. This is an upstream timestamp from the underlying information source - e.g. Ubuntu security tracker.
2531
2539
"windowsDetails": [ # Windows details get their own format because the information format and model don't match a normal detail. Specifically Windows updates are done as patches, thus Windows vulnerabilities really are a missing package, rather than a package being at an incorrect version.
Copy file name to clipboardexpand all lines: docs/dyn/containeranalysis_v1.projects.occurrences.html
+1
Original file line number
Diff line number
Diff line change
@@ -4516,6 +4516,7 @@ <h3>Method Details</h3>
4516
4516
"vendor": "A String", # The name of the vendor of the product.
4517
4517
},
4518
4518
],
4519
+
"extraDetails": "A String", # Occurrence-specific extra details about the vulnerability.
4519
4520
"severity": "A String", # The note provider assigned severity of this vulnerability.
4520
4521
"sourceUpdateTime": "A String", # The time this information was last changed at the source. This is an upstream timestamp from the underlying information source - e.g. Ubuntu security tracker.
4521
4522
"windowsDetails": [ # Windows details get their own format because the information format and model don't match a normal detail. Specifically Windows updates are done as patches, thus Windows vulnerabilities really are a missing package, rather than a package being at an incorrect version.
0 commit comments