Expand description
The main module containing the scoring mechanism & deployment contexts
Structs
The staging area for analyzing a piece of software
The context that describes the environment in which the vulnerability was found.
The score report of a single piece of software.
General information about a what scayl version generated a particular score.
The broken-down score of a single vulnerability.
Enums
An error that occurred while analyzing a piece of software
Describes how much access the service has access to the file-system. This information is used in conjunction with information sensitivity to determine the effect of file-system exploits. Selection of these categories should fall on the highest value based on read + write. If a service cannot write to every file but can read every file, it should be given the “Full” identifier.
The Information-Sensitivity category describes the sensitivity of the deployed service’s information. This category is used to analyze the effect of information-targeting vulnerabilities.
The Network Deployment category describes the public internet’s access to the deployed service. This category is used to evaluate the effect of a network-based vulnerability’s impact on the deployed service.
Describes the level of commandline access this service has access to. This category is used to analyze the effect of code-execution vulnerabilities.
The Remote-Access category describes the remote access to the deployed service. This category is used to evaluate the effect of a remote-access vulnerability’s impact on the deployed service.
Traits
A single cvss provider