NAME
STIX::Vulnerability - STIX Domain Object (SDO) - Vulnerability
SYNOPSIS
use STIX::Vulnerability;
my $vulnerability = STIX::Vulnerability->new();
DESCRIPTION
A Vulnerability is a mistake in software that can be directly used by a hacker to gain access to a system or network.
METHODS
STIX::Vulnerability inherits all methods from STIX::Common::Properties and implements the following new ones.
- STIX::Vulnerability->new(%properties)
-
Create a new instance of STIX::Vulnerability.
- $vulnerability->description
-
A description that provides more details and context about the Vulnerability.
- $vulnerability->id
- $vulnerability->name
-
The name used to identify the Vulnerability.
- $vulnerability->type
-
The type of this object, which MUST be the literal
vulnerability
.
HELPERS
- $vulnerability->TO_JSON
-
Encode the object in JSON.
- $vulnerability->to_hash
-
Return the object HASH.
- $vulnerability->to_string
-
Encode the object in JSON.
- $vulnerability->validate
-
Validate the object using JSON Schema (see STIX::Schema).
SUPPORT
Bugs / Feature Requests
Please report any bugs or feature requests through the issue tracker at https://github.com/giterlizzi/perl-STIX/issues. You will be notified automatically of any progress on your issue.
Source Code
This is open source software. The code repository is available for public review and contribution under the terms of the license.
https://github.com/giterlizzi/perl-STIX
git clone https://github.com/giterlizzi/perl-STIX.git
AUTHOR
Giuseppe Di Terlizzi <gdt@cpan.org>
LICENSE AND COPYRIGHT
This software is copyright (c) 2024 by Giuseppe Di Terlizzi.
This is free software; you can redistribute it and/or modify it under the same terms as the Perl 5 programming language system itself.