Skip to content

Commit 8887a13

Browse files
authored
Refactor SsvcDecisionPoint base class mixins (#743)
* create a `_Valued` mixin * add `_Valued` mixin to base decision point class. Also reorder mixins to adjust default json output key order * update json examples to reflect new base class mixin ordering * add len() to _Valued mixin * add tests
1 parent 77baef3 commit 8887a13

File tree

114 files changed

+274
-225
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

114 files changed

+274
-225
lines changed

data/json/decision_points/automatable_2_0_0.json

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,10 +1,10 @@
11
{
2+
"name": "Automatable",
3+
"description": "Can an attacker reliably automate creating exploitation events for this vulnerability?",
24
"namespace": "ssvc",
35
"version": "2.0.0",
46
"schemaVersion": "1-0-1",
57
"key": "A",
6-
"name": "Automatable",
7-
"description": "Can an attacker reliably automate creating exploitation events for this vulnerability?",
88
"values": [
99
{
1010
"key": "N",

data/json/decision_points/cvss/access_complexity_1_0_0.json

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,10 +1,10 @@
11
{
2+
"name": "Access Complexity",
3+
"description": "This metric measures the complexity of the attack required to exploit the vulnerability once an attacker has gained access to the target system.",
24
"namespace": "cvss",
35
"version": "1.0.0",
46
"schemaVersion": "1-0-1",
57
"key": "AC",
6-
"name": "Access Complexity",
7-
"description": "This metric measures the complexity of the attack required to exploit the vulnerability once an attacker has gained access to the target system.",
88
"values": [
99
{
1010
"key": "L",

data/json/decision_points/cvss/access_complexity_2_0_0.json

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,10 +1,10 @@
11
{
2+
"name": "Access Complexity",
3+
"description": "This metric measures the complexity of the attack required to exploit the vulnerability once an attacker has gained access to the target system.",
24
"namespace": "cvss",
35
"version": "2.0.0",
46
"schemaVersion": "1-0-1",
57
"key": "AC",
6-
"name": "Access Complexity",
7-
"description": "This metric measures the complexity of the attack required to exploit the vulnerability once an attacker has gained access to the target system.",
88
"values": [
99
{
1010
"key": "L",

data/json/decision_points/cvss/access_vector_1_0_0.json

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,10 +1,10 @@
11
{
2+
"name": "Access Vector",
3+
"description": "This metric measures whether or not the vulnerability is exploitable locally or remotely.",
24
"namespace": "cvss",
35
"version": "1.0.0",
46
"schemaVersion": "1-0-1",
57
"key": "AV",
6-
"name": "Access Vector",
7-
"description": "This metric measures whether or not the vulnerability is exploitable locally or remotely.",
88
"values": [
99
{
1010
"key": "L",

data/json/decision_points/cvss/access_vector_2_0_0.json

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,10 +1,10 @@
11
{
2+
"name": "Access Vector",
3+
"description": "This metric reflects the context by which vulnerability exploitation is possible.",
24
"namespace": "cvss",
35
"version": "2.0.0",
46
"schemaVersion": "1-0-1",
57
"key": "AV",
6-
"name": "Access Vector",
7-
"description": "This metric reflects the context by which vulnerability exploitation is possible.",
88
"values": [
99
{
1010
"key": "L",

data/json/decision_points/cvss/attack_complexity_3_0_0.json

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,10 +1,10 @@
11
{
2+
"name": "Attack Complexity",
3+
"description": "This metric describes the conditions beyond the attacker's control that must exist in order to exploit the vulnerability.",
24
"namespace": "cvss",
35
"version": "3.0.0",
46
"schemaVersion": "1-0-1",
57
"key": "AC",
6-
"name": "Attack Complexity",
7-
"description": "This metric describes the conditions beyond the attacker's control that must exist in order to exploit the vulnerability.",
88
"values": [
99
{
1010
"key": "L",

data/json/decision_points/cvss/attack_complexity_3_0_1.json

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,10 +1,10 @@
11
{
2+
"name": "Attack Complexity",
3+
"description": "This metric captures measurable actions that must be taken by the attacker to actively evade or circumvent existing built-in security-enhancing conditions in order to obtain a working exploit. ",
24
"namespace": "cvss",
35
"version": "3.0.1",
46
"schemaVersion": "1-0-1",
57
"key": "AC",
6-
"name": "Attack Complexity",
7-
"description": "This metric captures measurable actions that must be taken by the attacker to actively evade or circumvent existing built-in security-enhancing conditions in order to obtain a working exploit. ",
88
"values": [
99
{
1010
"key": "L",

data/json/decision_points/cvss/attack_requirements_1_0_0.json

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,10 +1,10 @@
11
{
2+
"name": "Attack Requirements",
3+
"description": "This metric captures the prerequisite deployment and execution conditions or variables of the vulnerable system that enable the attack.",
24
"namespace": "cvss",
35
"version": "1.0.0",
46
"schemaVersion": "1-0-1",
57
"key": "AT",
6-
"name": "Attack Requirements",
7-
"description": "This metric captures the prerequisite deployment and execution conditions or variables of the vulnerable system that enable the attack.",
88
"values": [
99
{
1010
"key": "N",

data/json/decision_points/cvss/attack_vector_3_0_0.json

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,10 +1,10 @@
11
{
2+
"name": "Attack Vector",
3+
"description": "This metric reflects the context by which vulnerability exploitation is possible. ",
24
"namespace": "cvss",
35
"version": "3.0.0",
46
"schemaVersion": "1-0-1",
57
"key": "AV",
6-
"name": "Attack Vector",
7-
"description": "This metric reflects the context by which vulnerability exploitation is possible. ",
88
"values": [
99
{
1010
"key": "P",

data/json/decision_points/cvss/attack_vector_3_0_1.json

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,10 +1,10 @@
11
{
2+
"name": "Attack Vector",
3+
"description": "This metric reflects the context by which vulnerability exploitation is possible. This metric value (and consequently the resulting severity) will be larger the more remote (logically, and physically) an attacker can be in order to exploit the vulnerable system. The assumption is that the number of potential attackers for a vulnerability that could be exploited from across a network is larger than the number of potential attackers that could exploit a vulnerability requiring physical access to a device, and therefore warrants a greater severity.",
24
"namespace": "cvss",
35
"version": "3.0.1",
46
"schemaVersion": "1-0-1",
57
"key": "AV",
6-
"name": "Attack Vector",
7-
"description": "This metric reflects the context by which vulnerability exploitation is possible. This metric value (and consequently the resulting severity) will be larger the more remote (logically, and physically) an attacker can be in order to exploit the vulnerable system. The assumption is that the number of potential attackers for a vulnerability that could be exploited from across a network is larger than the number of potential attackers that could exploit a vulnerability requiring physical access to a device, and therefore warrants a greater severity.",
88
"values": [
99
{
1010
"key": "P",

0 commit comments

Comments
 (0)