You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: schema/bom-1.5.proto
+14-1Lines changed: 14 additions & 1 deletion
Original file line number
Diff line number
Diff line change
@@ -701,7 +701,7 @@ message Vulnerability {
701
701
repeatedint32cwes=6;
702
702
// A description of the vulnerability as provided by the source.
703
703
optionalstringdescription=7;
704
-
// If available, an in-depth description of the vulnerability as provided by the source organization. Details often include examples, proof-of-concepts, and other information useful in understanding root cause.
704
+
// If available, an in-depth description of the vulnerability as provided by the source organization. Details often include information useful in understanding root cause.
705
705
optionalstringdetail=8;
706
706
// Recommendations of how the vulnerability can be remediated or mitigated.
707
707
optionalstringrecommendation=9;
@@ -725,6 +725,19 @@ message Vulnerability {
725
725
repeatedPropertyproperties=18;
726
726
// The date and time (timestamp) when the vulnerability record was rejected (if applicable).
727
727
optionalgoogle.protobuf.Timestamprejected=19;
728
+
// Evidence used to reproduce the vulnerability.
729
+
optionalProofOfConceptproofOfConcept=20;
730
+
// A bypass, usually temporary, of the vulnerability that reduces its likelihood and/or impact. Workarounds often involve changes to configuration or deployments.
731
+
optionalstringworkaround=21;
732
+
}
733
+
734
+
messageProofOfConcept {
735
+
// Precise steps to reproduce the vulnerability.
736
+
optionalstringreproductionSteps=1;
737
+
// A description of the environment in which reproduction was possible.
738
+
optionalstringenvironment=2;
739
+
// Supporting material that helps in reproducing or understanding how reproduction is possible. This may include screenshots, payloads, and PoC exploit code.
Copy file name to clipboardExpand all lines: schema/bom-1.5.schema.json
+30-2Lines changed: 30 additions & 2 deletions
Original file line number
Diff line number
Diff line change
@@ -1912,13 +1912,41 @@
1912
1912
"detail": {
1913
1913
"type": "string",
1914
1914
"title": "Details",
1915
-
"description": "If available, an in-depth description of the vulnerability as provided by the source organization. Details often include examples, proof-of-concepts, and other information useful in understanding root cause."
1915
+
"description": "If available, an in-depth description of the vulnerability as provided by the source organization. Details often include information useful in understanding root cause."
1916
1916
},
1917
1917
"recommendation": {
1918
1918
"type": "string",
1919
-
"title": "Details",
1919
+
"title": "Recommendation",
1920
1920
"description": "Recommendations of how the vulnerability can be remediated or mitigated."
1921
1921
},
1922
+
"workaround": {
1923
+
"type": "string",
1924
+
"title": "Workarounds",
1925
+
"description": "A bypass, usually temporary, of the vulnerability that reduces its likelihood and/or impact. Workarounds often involve changes to configuration or deployments."
1926
+
},
1927
+
"proofOfConcept": {
1928
+
"type": "object",
1929
+
"title": "Proof of Concept",
1930
+
"description": "Evidence used to reproduce the vulnerability.",
1931
+
"properties": {
1932
+
"reproductionSteps": {
1933
+
"type": "string",
1934
+
"title": "Steps to Reproduce",
1935
+
"description": "Precise steps to reproduce the vulnerability."
1936
+
},
1937
+
"environment": {
1938
+
"type": "string",
1939
+
"title": "Environment",
1940
+
"description": "A description of the environment in which reproduction was possible."
1941
+
},
1942
+
"supportingMaterial": {
1943
+
"type": "array",
1944
+
"title": "Supporting Material",
1945
+
"description": "Supporting material that helps in reproducing or understanding how reproduction is possible. This may include screenshots, payloads, and PoC exploit code.",
<xs:documentation>A bypass, usually temporary, of the vulnerability that reduces its likelihood and/or impact. Workarounds often involve changes to configuration or deployments.</xs:documentation>
<xs:documentation>Supporting material that helps in reproducing or understanding how reproduction is possible. This may include screenshots, payloads, and PoC exploit code.</xs:documentation>
0 commit comments