Oracle Cloud Infrastructure v2.31.0 published on Thursday, Apr 17, 2025 by Pulumi
oci.Adm.getVulnerabilityAudit
Explore with Pulumi AI
This data source provides details about a specific Vulnerability Audit resource in Oracle Cloud Infrastructure ADM service.
Returns the details of the specified Vulnerability Audit.
Example Usage
import * as pulumi from "@pulumi/pulumi";
import * as oci from "@pulumi/oci";
const testVulnerabilityAudit = oci.Adm.getVulnerabilityAudit({
    vulnerabilityAuditId: testVulnerabilityAuditOciAdmVulnerabilityAudit.id,
});
import pulumi
import pulumi_oci as oci
test_vulnerability_audit = oci.Adm.get_vulnerability_audit(vulnerability_audit_id=test_vulnerability_audit_oci_adm_vulnerability_audit["id"])
package main
import (
	"github.com/pulumi/pulumi-oci/sdk/v2/go/oci/adm"
	"github.com/pulumi/pulumi/sdk/v3/go/pulumi"
)
func main() {
	pulumi.Run(func(ctx *pulumi.Context) error {
		_, err := adm.GetVulnerabilityAudit(ctx, &adm.GetVulnerabilityAuditArgs{
			VulnerabilityAuditId: testVulnerabilityAuditOciAdmVulnerabilityAudit.Id,
		}, nil)
		if err != nil {
			return err
		}
		return nil
	})
}
using System.Collections.Generic;
using System.Linq;
using Pulumi;
using Oci = Pulumi.Oci;
return await Deployment.RunAsync(() => 
{
    var testVulnerabilityAudit = Oci.Adm.GetVulnerabilityAudit.Invoke(new()
    {
        VulnerabilityAuditId = testVulnerabilityAuditOciAdmVulnerabilityAudit.Id,
    });
});
package generated_program;
import com.pulumi.Context;
import com.pulumi.Pulumi;
import com.pulumi.core.Output;
import com.pulumi.oci.Adm.AdmFunctions;
import com.pulumi.oci.Adm.inputs.GetVulnerabilityAuditArgs;
import java.util.List;
import java.util.ArrayList;
import java.util.Map;
import java.io.File;
import java.nio.file.Files;
import java.nio.file.Paths;
public class App {
    public static void main(String[] args) {
        Pulumi.run(App::stack);
    }
    public static void stack(Context ctx) {
        final var testVulnerabilityAudit = AdmFunctions.getVulnerabilityAudit(GetVulnerabilityAuditArgs.builder()
            .vulnerabilityAuditId(testVulnerabilityAuditOciAdmVulnerabilityAudit.id())
            .build());
    }
}
variables:
  testVulnerabilityAudit:
    fn::invoke:
      function: oci:Adm:getVulnerabilityAudit
      arguments:
        vulnerabilityAuditId: ${testVulnerabilityAuditOciAdmVulnerabilityAudit.id}
Using getVulnerabilityAudit
Two invocation forms are available. The direct form accepts plain arguments and either blocks until the result value is available, or returns a Promise-wrapped result. The output form accepts Input-wrapped arguments and returns an Output-wrapped result.
function getVulnerabilityAudit(args: GetVulnerabilityAuditArgs, opts?: InvokeOptions): Promise<GetVulnerabilityAuditResult>
function getVulnerabilityAuditOutput(args: GetVulnerabilityAuditOutputArgs, opts?: InvokeOptions): Output<GetVulnerabilityAuditResult>def get_vulnerability_audit(vulnerability_audit_id: Optional[str] = None,
                            opts: Optional[InvokeOptions] = None) -> GetVulnerabilityAuditResult
def get_vulnerability_audit_output(vulnerability_audit_id: Optional[pulumi.Input[str]] = None,
                            opts: Optional[InvokeOptions] = None) -> Output[GetVulnerabilityAuditResult]func GetVulnerabilityAudit(ctx *Context, args *GetVulnerabilityAuditArgs, opts ...InvokeOption) (*GetVulnerabilityAuditResult, error)
func GetVulnerabilityAuditOutput(ctx *Context, args *GetVulnerabilityAuditOutputArgs, opts ...InvokeOption) GetVulnerabilityAuditResultOutput> Note: This function is named GetVulnerabilityAudit in the Go SDK.
public static class GetVulnerabilityAudit 
{
    public static Task<GetVulnerabilityAuditResult> InvokeAsync(GetVulnerabilityAuditArgs args, InvokeOptions? opts = null)
    public static Output<GetVulnerabilityAuditResult> Invoke(GetVulnerabilityAuditInvokeArgs args, InvokeOptions? opts = null)
}public static CompletableFuture<GetVulnerabilityAuditResult> getVulnerabilityAudit(GetVulnerabilityAuditArgs args, InvokeOptions options)
public static Output<GetVulnerabilityAuditResult> getVulnerabilityAudit(GetVulnerabilityAuditArgs args, InvokeOptions options)
fn::invoke:
  function: oci:Adm/getVulnerabilityAudit:getVulnerabilityAudit
  arguments:
    # arguments dictionaryThe following arguments are supported:
- Vulnerability
Audit stringId  - Unique Vulnerability Audit identifier path parameter.
 
- Vulnerability
Audit stringId  - Unique Vulnerability Audit identifier path parameter.
 
- vulnerability
Audit StringId  - Unique Vulnerability Audit identifier path parameter.
 
- vulnerability
Audit stringId  - Unique Vulnerability Audit identifier path parameter.
 
- vulnerability_
audit_ strid  - Unique Vulnerability Audit identifier path parameter.
 
- vulnerability
Audit StringId  - Unique Vulnerability Audit identifier path parameter.
 
getVulnerabilityAudit Result
The following output properties are available:
- Application
Dependencies List<GetVulnerability Audit Application Dependency>  - Build
Type string - The type of the build tool is restricted to only two values MAVEN or UNSET. Use UNSET when the list of application dependencies is not Maven-related or is a mix of Maven and other ecosystems. This option is soon to be deprecated.
 - Compartment
Id string - The compartment Oracle Cloud identifier (OCID) of the vulnerability audit.
 - Configurations
List<Get
Vulnerability Audit Configuration>  - Configuration for a vulnerability audit. A vulnerable application dependency is ignored if its name does match any of the items in 
exclusions, or all of the associated Vulnerabilies have a CVSS v2 score belowmaxPermissibleCvssV2Scoreand a CVSS v3 score belowmaxPermissibleCvssV3Score. type: object - Dictionary<string, string>
 - Defined tags for this resource. Each key is predefined and scoped to a namespace. Example: 
{"foo-namespace.bar-key": "value"} - Display
Name string - The name of the vulnerability audit.
 - Dictionary<string, string>
 - Simple key-value pair that is applied without any predefined name, type or scope. Exists for cross-compatibility only. Example: 
{"bar-key": "value"} - Id string
 - Unique vulnerability identifier, e.g. CVE-1999-0067.
 - Is
Success bool - Indicates if an audit succeeded according to the configuration. The value is 
nullif the audit is in theCREATINGstate. - Knowledge
Base stringId  - The Oracle Cloud identifier (OCID) of the knowledge base.
 - Lifecycle
Details string - Details on the lifecycle state.
 - Max
Observed doubleCvss V2score  - Maximum Common Vulnerability Scoring System Version 2 score observed for non-ignored vulnerable application dependencies.
 - Max
Observed doubleCvss V2score With Ignored  - Maximum Common Vulnerability Scoring System Version 2 score observed for vulnerable application dependencies including ignored ones.
 - Max
Observed doubleCvss V3score  - Maximum Common Vulnerability Scoring System Version 3 score observed for non-ignored vulnerable application dependencies.
 - Max
Observed doubleCvss V3score With Ignored  - Maximum Common Vulnerability Scoring System Version 3 score observed for vulnerable application dependencies including ignored ones.
 - Max
Observed stringSeverity  - Maximum ADM Severity observed for non-ignored vulnerable application dependencies.
 - Max
Observed stringSeverity With Ignored  - Maximum ADM Severity observed for vulnerable application dependencies including ignored ones.
 - Sources
List<Get
Vulnerability Audit Source>  - Source that published the vulnerability
 - State string
 - The current lifecycle state of the vulnerability audit.
 - Dictionary<string, string>
 - Usage of system tag keys. These predefined keys are scoped to namespaces. Example: 
{"orcl-cloud.free-tier-retained": "true"} - Time
Created string - The creation date and time of the vulnerability audit (formatted according to RFC3339).
 - Time
Updated string - The update date and time of the vulnerability audit (formatted according to RFC3339).
 - Usage
Datas List<GetVulnerability Audit Usage Data>  - The source details of the usage data in object storage. The usage data file uploaded to object storage must be a gzip archive of the JSON usage data returned from the GraalVM native-image-inspect tool after a native-image build. Set 
sourceTypetoobjectStorageTupleand use UsageDataViaObjectStorageTupleDetails when specifying the namespace, bucket name, and object name. - Vulnerabilities
List<Get
Vulnerability Audit Vulnerability>  - List of vulnerabilities found in the vulnerability audit. If a vulnerability affects multiple dependencies, the metadata returned here consists of audit-wide aggregates.
 - Vulnerability
Audit stringId  - Vulnerable
Artifacts intCount  - Count of non-ignored vulnerable application dependencies.
 - Vulnerable
Artifacts intCount With Ignored  - Count of all vulnerable application dependencies.
 
- Application
Dependencies []GetVulnerability Audit Application Dependency  - Build
Type string - The type of the build tool is restricted to only two values MAVEN or UNSET. Use UNSET when the list of application dependencies is not Maven-related or is a mix of Maven and other ecosystems. This option is soon to be deprecated.
 - Compartment
Id string - The compartment Oracle Cloud identifier (OCID) of the vulnerability audit.
 - Configurations
[]Get
Vulnerability Audit Configuration  - Configuration for a vulnerability audit. A vulnerable application dependency is ignored if its name does match any of the items in 
exclusions, or all of the associated Vulnerabilies have a CVSS v2 score belowmaxPermissibleCvssV2Scoreand a CVSS v3 score belowmaxPermissibleCvssV3Score. type: object - map[string]string
 - Defined tags for this resource. Each key is predefined and scoped to a namespace. Example: 
{"foo-namespace.bar-key": "value"} - Display
Name string - The name of the vulnerability audit.
 - map[string]string
 - Simple key-value pair that is applied without any predefined name, type or scope. Exists for cross-compatibility only. Example: 
{"bar-key": "value"} - Id string
 - Unique vulnerability identifier, e.g. CVE-1999-0067.
 - Is
Success bool - Indicates if an audit succeeded according to the configuration. The value is 
nullif the audit is in theCREATINGstate. - Knowledge
Base stringId  - The Oracle Cloud identifier (OCID) of the knowledge base.
 - Lifecycle
Details string - Details on the lifecycle state.
 - Max
Observed float64Cvss V2score  - Maximum Common Vulnerability Scoring System Version 2 score observed for non-ignored vulnerable application dependencies.
 - Max
Observed float64Cvss V2score With Ignored  - Maximum Common Vulnerability Scoring System Version 2 score observed for vulnerable application dependencies including ignored ones.
 - Max
Observed float64Cvss V3score  - Maximum Common Vulnerability Scoring System Version 3 score observed for non-ignored vulnerable application dependencies.
 - Max
Observed float64Cvss V3score With Ignored  - Maximum Common Vulnerability Scoring System Version 3 score observed for vulnerable application dependencies including ignored ones.
 - Max
Observed stringSeverity  - Maximum ADM Severity observed for non-ignored vulnerable application dependencies.
 - Max
Observed stringSeverity With Ignored  - Maximum ADM Severity observed for vulnerable application dependencies including ignored ones.
 - Sources
[]Get
Vulnerability Audit Source  - Source that published the vulnerability
 - State string
 - The current lifecycle state of the vulnerability audit.
 - map[string]string
 - Usage of system tag keys. These predefined keys are scoped to namespaces. Example: 
{"orcl-cloud.free-tier-retained": "true"} - Time
Created string - The creation date and time of the vulnerability audit (formatted according to RFC3339).
 - Time
Updated string - The update date and time of the vulnerability audit (formatted according to RFC3339).
 - Usage
Datas []GetVulnerability Audit Usage Data  - The source details of the usage data in object storage. The usage data file uploaded to object storage must be a gzip archive of the JSON usage data returned from the GraalVM native-image-inspect tool after a native-image build. Set 
sourceTypetoobjectStorageTupleand use UsageDataViaObjectStorageTupleDetails when specifying the namespace, bucket name, and object name. - Vulnerabilities
[]Get
Vulnerability Audit Vulnerability  - List of vulnerabilities found in the vulnerability audit. If a vulnerability affects multiple dependencies, the metadata returned here consists of audit-wide aggregates.
 - Vulnerability
Audit stringId  - Vulnerable
Artifacts intCount  - Count of non-ignored vulnerable application dependencies.
 - Vulnerable
Artifacts intCount With Ignored  - Count of all vulnerable application dependencies.
 
- application
Dependencies List<GetVulnerability Audit Application Dependency>  - build
Type String - The type of the build tool is restricted to only two values MAVEN or UNSET. Use UNSET when the list of application dependencies is not Maven-related or is a mix of Maven and other ecosystems. This option is soon to be deprecated.
 - compartment
Id String - The compartment Oracle Cloud identifier (OCID) of the vulnerability audit.
 - configurations
List<Get
Vulnerability Audit Configuration>  - Configuration for a vulnerability audit. A vulnerable application dependency is ignored if its name does match any of the items in 
exclusions, or all of the associated Vulnerabilies have a CVSS v2 score belowmaxPermissibleCvssV2Scoreand a CVSS v3 score belowmaxPermissibleCvssV3Score. type: object - Map<String,String>
 - Defined tags for this resource. Each key is predefined and scoped to a namespace. Example: 
{"foo-namespace.bar-key": "value"} - display
Name String - The name of the vulnerability audit.
 - Map<String,String>
 - Simple key-value pair that is applied without any predefined name, type or scope. Exists for cross-compatibility only. Example: 
{"bar-key": "value"} - id String
 - Unique vulnerability identifier, e.g. CVE-1999-0067.
 - is
Success Boolean - Indicates if an audit succeeded according to the configuration. The value is 
nullif the audit is in theCREATINGstate. - knowledge
Base StringId  - The Oracle Cloud identifier (OCID) of the knowledge base.
 - lifecycle
Details String - Details on the lifecycle state.
 - max
Observed DoubleCvss V2score  - Maximum Common Vulnerability Scoring System Version 2 score observed for non-ignored vulnerable application dependencies.
 - max
Observed DoubleCvss V2score With Ignored  - Maximum Common Vulnerability Scoring System Version 2 score observed for vulnerable application dependencies including ignored ones.
 - max
Observed DoubleCvss V3score  - Maximum Common Vulnerability Scoring System Version 3 score observed for non-ignored vulnerable application dependencies.
 - max
Observed DoubleCvss V3score With Ignored  - Maximum Common Vulnerability Scoring System Version 3 score observed for vulnerable application dependencies including ignored ones.
 - max
Observed StringSeverity  - Maximum ADM Severity observed for non-ignored vulnerable application dependencies.
 - max
Observed StringSeverity With Ignored  - Maximum ADM Severity observed for vulnerable application dependencies including ignored ones.
 - sources
List<Get
Vulnerability Audit Source>  - Source that published the vulnerability
 - state String
 - The current lifecycle state of the vulnerability audit.
 - Map<String,String>
 - Usage of system tag keys. These predefined keys are scoped to namespaces. Example: 
{"orcl-cloud.free-tier-retained": "true"} - time
Created String - The creation date and time of the vulnerability audit (formatted according to RFC3339).
 - time
Updated String - The update date and time of the vulnerability audit (formatted according to RFC3339).
 - usage
Datas List<GetVulnerability Audit Usage Data>  - The source details of the usage data in object storage. The usage data file uploaded to object storage must be a gzip archive of the JSON usage data returned from the GraalVM native-image-inspect tool after a native-image build. Set 
sourceTypetoobjectStorageTupleand use UsageDataViaObjectStorageTupleDetails when specifying the namespace, bucket name, and object name. - vulnerabilities
List<Get
Vulnerability Audit Vulnerability>  - List of vulnerabilities found in the vulnerability audit. If a vulnerability affects multiple dependencies, the metadata returned here consists of audit-wide aggregates.
 - vulnerability
Audit StringId  - vulnerable
Artifacts IntegerCount  - Count of non-ignored vulnerable application dependencies.
 - vulnerable
Artifacts IntegerCount With Ignored  - Count of all vulnerable application dependencies.
 
- application
Dependencies GetVulnerability Audit Application Dependency[]  - build
Type string - The type of the build tool is restricted to only two values MAVEN or UNSET. Use UNSET when the list of application dependencies is not Maven-related or is a mix of Maven and other ecosystems. This option is soon to be deprecated.
 - compartment
Id string - The compartment Oracle Cloud identifier (OCID) of the vulnerability audit.
 - configurations
Get
Vulnerability Audit Configuration[]  - Configuration for a vulnerability audit. A vulnerable application dependency is ignored if its name does match any of the items in 
exclusions, or all of the associated Vulnerabilies have a CVSS v2 score belowmaxPermissibleCvssV2Scoreand a CVSS v3 score belowmaxPermissibleCvssV3Score. type: object - {[key: string]: string}
 - Defined tags for this resource. Each key is predefined and scoped to a namespace. Example: 
{"foo-namespace.bar-key": "value"} - display
Name string - The name of the vulnerability audit.
 - {[key: string]: string}
 - Simple key-value pair that is applied without any predefined name, type or scope. Exists for cross-compatibility only. Example: 
{"bar-key": "value"} - id string
 - Unique vulnerability identifier, e.g. CVE-1999-0067.
 - is
Success boolean - Indicates if an audit succeeded according to the configuration. The value is 
nullif the audit is in theCREATINGstate. - knowledge
Base stringId  - The Oracle Cloud identifier (OCID) of the knowledge base.
 - lifecycle
Details string - Details on the lifecycle state.
 - max
Observed numberCvss V2score  - Maximum Common Vulnerability Scoring System Version 2 score observed for non-ignored vulnerable application dependencies.
 - max
Observed numberCvss V2score With Ignored  - Maximum Common Vulnerability Scoring System Version 2 score observed for vulnerable application dependencies including ignored ones.
 - max
Observed numberCvss V3score  - Maximum Common Vulnerability Scoring System Version 3 score observed for non-ignored vulnerable application dependencies.
 - max
Observed numberCvss V3score With Ignored  - Maximum Common Vulnerability Scoring System Version 3 score observed for vulnerable application dependencies including ignored ones.
 - max
Observed stringSeverity  - Maximum ADM Severity observed for non-ignored vulnerable application dependencies.
 - max
Observed stringSeverity With Ignored  - Maximum ADM Severity observed for vulnerable application dependencies including ignored ones.
 - sources
Get
Vulnerability Audit Source[]  - Source that published the vulnerability
 - state string
 - The current lifecycle state of the vulnerability audit.
 - {[key: string]: string}
 - Usage of system tag keys. These predefined keys are scoped to namespaces. Example: 
{"orcl-cloud.free-tier-retained": "true"} - time
Created string - The creation date and time of the vulnerability audit (formatted according to RFC3339).
 - time
Updated string - The update date and time of the vulnerability audit (formatted according to RFC3339).
 - usage
Datas GetVulnerability Audit Usage Data[]  - The source details of the usage data in object storage. The usage data file uploaded to object storage must be a gzip archive of the JSON usage data returned from the GraalVM native-image-inspect tool after a native-image build. Set 
sourceTypetoobjectStorageTupleand use UsageDataViaObjectStorageTupleDetails when specifying the namespace, bucket name, and object name. - vulnerabilities
Get
Vulnerability Audit Vulnerability[]  - List of vulnerabilities found in the vulnerability audit. If a vulnerability affects multiple dependencies, the metadata returned here consists of audit-wide aggregates.
 - vulnerability
Audit stringId  - vulnerable
Artifacts numberCount  - Count of non-ignored vulnerable application dependencies.
 - vulnerable
Artifacts numberCount With Ignored  - Count of all vulnerable application dependencies.
 
- application_
dependencies Sequence[adm.Get Vulnerability Audit Application Dependency]  - build_
type str - The type of the build tool is restricted to only two values MAVEN or UNSET. Use UNSET when the list of application dependencies is not Maven-related or is a mix of Maven and other ecosystems. This option is soon to be deprecated.
 - compartment_
id str - The compartment Oracle Cloud identifier (OCID) of the vulnerability audit.
 - configurations
Sequence[adm.
Get Vulnerability Audit Configuration]  - Configuration for a vulnerability audit. A vulnerable application dependency is ignored if its name does match any of the items in 
exclusions, or all of the associated Vulnerabilies have a CVSS v2 score belowmaxPermissibleCvssV2Scoreand a CVSS v3 score belowmaxPermissibleCvssV3Score. type: object - Mapping[str, str]
 - Defined tags for this resource. Each key is predefined and scoped to a namespace. Example: 
{"foo-namespace.bar-key": "value"} - display_
name str - The name of the vulnerability audit.
 - Mapping[str, str]
 - Simple key-value pair that is applied without any predefined name, type or scope. Exists for cross-compatibility only. Example: 
{"bar-key": "value"} - id str
 - Unique vulnerability identifier, e.g. CVE-1999-0067.
 - is_
success bool - Indicates if an audit succeeded according to the configuration. The value is 
nullif the audit is in theCREATINGstate. - knowledge_
base_ strid  - The Oracle Cloud identifier (OCID) of the knowledge base.
 - lifecycle_
details str - Details on the lifecycle state.
 - max_
observed_ floatcvss_ v2score  - Maximum Common Vulnerability Scoring System Version 2 score observed for non-ignored vulnerable application dependencies.
 - max_
observed_ floatcvss_ v2score_ with_ ignored  - Maximum Common Vulnerability Scoring System Version 2 score observed for vulnerable application dependencies including ignored ones.
 - max_
observed_ floatcvss_ v3score  - Maximum Common Vulnerability Scoring System Version 3 score observed for non-ignored vulnerable application dependencies.
 - max_
observed_ floatcvss_ v3score_ with_ ignored  - Maximum Common Vulnerability Scoring System Version 3 score observed for vulnerable application dependencies including ignored ones.
 - max_
observed_ strseverity  - Maximum ADM Severity observed for non-ignored vulnerable application dependencies.
 - max_
observed_ strseverity_ with_ ignored  - Maximum ADM Severity observed for vulnerable application dependencies including ignored ones.
 - sources
Sequence[adm.
Get Vulnerability Audit Source]  - Source that published the vulnerability
 - state str
 - The current lifecycle state of the vulnerability audit.
 - Mapping[str, str]
 - Usage of system tag keys. These predefined keys are scoped to namespaces. Example: 
{"orcl-cloud.free-tier-retained": "true"} - time_
created str - The creation date and time of the vulnerability audit (formatted according to RFC3339).
 - time_
updated str - The update date and time of the vulnerability audit (formatted according to RFC3339).
 - usage_
datas Sequence[adm.Get Vulnerability Audit Usage Data]  - The source details of the usage data in object storage. The usage data file uploaded to object storage must be a gzip archive of the JSON usage data returned from the GraalVM native-image-inspect tool after a native-image build. Set 
sourceTypetoobjectStorageTupleand use UsageDataViaObjectStorageTupleDetails when specifying the namespace, bucket name, and object name. - vulnerabilities
Sequence[adm.
Get Vulnerability Audit Vulnerability]  - List of vulnerabilities found in the vulnerability audit. If a vulnerability affects multiple dependencies, the metadata returned here consists of audit-wide aggregates.
 - vulnerability_
audit_ strid  - vulnerable_
artifacts_ intcount  - Count of non-ignored vulnerable application dependencies.
 - vulnerable_
artifacts_ intcount_ with_ ignored  - Count of all vulnerable application dependencies.
 
- application
Dependencies List<Property Map> - build
Type String - The type of the build tool is restricted to only two values MAVEN or UNSET. Use UNSET when the list of application dependencies is not Maven-related or is a mix of Maven and other ecosystems. This option is soon to be deprecated.
 - compartment
Id String - The compartment Oracle Cloud identifier (OCID) of the vulnerability audit.
 - configurations List<Property Map>
 - Configuration for a vulnerability audit. A vulnerable application dependency is ignored if its name does match any of the items in 
exclusions, or all of the associated Vulnerabilies have a CVSS v2 score belowmaxPermissibleCvssV2Scoreand a CVSS v3 score belowmaxPermissibleCvssV3Score. type: object - Map<String>
 - Defined tags for this resource. Each key is predefined and scoped to a namespace. Example: 
{"foo-namespace.bar-key": "value"} - display
Name String - The name of the vulnerability audit.
 - Map<String>
 - Simple key-value pair that is applied without any predefined name, type or scope. Exists for cross-compatibility only. Example: 
{"bar-key": "value"} - id String
 - Unique vulnerability identifier, e.g. CVE-1999-0067.
 - is
Success Boolean - Indicates if an audit succeeded according to the configuration. The value is 
nullif the audit is in theCREATINGstate. - knowledge
Base StringId  - The Oracle Cloud identifier (OCID) of the knowledge base.
 - lifecycle
Details String - Details on the lifecycle state.
 - max
Observed NumberCvss V2score  - Maximum Common Vulnerability Scoring System Version 2 score observed for non-ignored vulnerable application dependencies.
 - max
Observed NumberCvss V2score With Ignored  - Maximum Common Vulnerability Scoring System Version 2 score observed for vulnerable application dependencies including ignored ones.
 - max
Observed NumberCvss V3score  - Maximum Common Vulnerability Scoring System Version 3 score observed for non-ignored vulnerable application dependencies.
 - max
Observed NumberCvss V3score With Ignored  - Maximum Common Vulnerability Scoring System Version 3 score observed for vulnerable application dependencies including ignored ones.
 - max
Observed StringSeverity  - Maximum ADM Severity observed for non-ignored vulnerable application dependencies.
 - max
Observed StringSeverity With Ignored  - Maximum ADM Severity observed for vulnerable application dependencies including ignored ones.
 - sources List<Property Map>
 - Source that published the vulnerability
 - state String
 - The current lifecycle state of the vulnerability audit.
 - Map<String>
 - Usage of system tag keys. These predefined keys are scoped to namespaces. Example: 
{"orcl-cloud.free-tier-retained": "true"} - time
Created String - The creation date and time of the vulnerability audit (formatted according to RFC3339).
 - time
Updated String - The update date and time of the vulnerability audit (formatted according to RFC3339).
 - usage
Datas List<Property Map> - The source details of the usage data in object storage. The usage data file uploaded to object storage must be a gzip archive of the JSON usage data returned from the GraalVM native-image-inspect tool after a native-image build. Set 
sourceTypetoobjectStorageTupleand use UsageDataViaObjectStorageTupleDetails when specifying the namespace, bucket name, and object name. - vulnerabilities List<Property Map>
 - List of vulnerabilities found in the vulnerability audit. If a vulnerability affects multiple dependencies, the metadata returned here consists of audit-wide aggregates.
 - vulnerability
Audit StringId  - vulnerable
Artifacts NumberCount  - Count of non-ignored vulnerable application dependencies.
 - vulnerable
Artifacts NumberCount With Ignored  - Count of all vulnerable application dependencies.
 
Supporting Types
GetVulnerabilityAuditApplicationDependency    
- Application
Dependency List<string>Node Ids  - Gav string
 - Node
Id string - Purl string
 
- Application
Dependency []stringNode Ids  - Gav string
 - Node
Id string - Purl string
 
- application
Dependency List<String>Node Ids  - gav String
 - node
Id String - purl String
 
- application
Dependency string[]Node Ids  - gav string
 - node
Id string - purl string
 
- application_
dependency_ Sequence[str]node_ ids  - gav str
 - node_
id str - purl str
 
- application
Dependency List<String>Node Ids  - gav String
 - node
Id String - purl String
 
GetVulnerabilityAuditConfiguration   
- Exclusions List<string>
 - A vulnerable application dependency is ignored if its name matches any of the items in 
exclusions. An asterisk (*) in the dependency pattern acts as a wildcard and matches zero or more characters. - Max
Permissible doubleCvss V2score  - A vulnerable application dependency is ignored if the score of its associated Vulnerability is below maxPermissibleCvssV2Score and below maxPermissibleCvssV3Score.
 - Max
Permissible doubleCvss V3score  - A vulnerable application dependency is ignored if the score of its associated Vulnerability is below maxPermissibleCvssV2Score and below maxPermissibleCvssV3Score.
 - Max
Permissible stringSeverity  - A vulnerable application dependency is ignored if the score of its associated Vulnerability is below maxPermissibleSeverity.
 
- Exclusions []string
 - A vulnerable application dependency is ignored if its name matches any of the items in 
exclusions. An asterisk (*) in the dependency pattern acts as a wildcard and matches zero or more characters. - Max
Permissible float64Cvss V2score  - A vulnerable application dependency is ignored if the score of its associated Vulnerability is below maxPermissibleCvssV2Score and below maxPermissibleCvssV3Score.
 - Max
Permissible float64Cvss V3score  - A vulnerable application dependency is ignored if the score of its associated Vulnerability is below maxPermissibleCvssV2Score and below maxPermissibleCvssV3Score.
 - Max
Permissible stringSeverity  - A vulnerable application dependency is ignored if the score of its associated Vulnerability is below maxPermissibleSeverity.
 
- exclusions List<String>
 - A vulnerable application dependency is ignored if its name matches any of the items in 
exclusions. An asterisk (*) in the dependency pattern acts as a wildcard and matches zero or more characters. - max
Permissible DoubleCvss V2score  - A vulnerable application dependency is ignored if the score of its associated Vulnerability is below maxPermissibleCvssV2Score and below maxPermissibleCvssV3Score.
 - max
Permissible DoubleCvss V3score  - A vulnerable application dependency is ignored if the score of its associated Vulnerability is below maxPermissibleCvssV2Score and below maxPermissibleCvssV3Score.
 - max
Permissible StringSeverity  - A vulnerable application dependency is ignored if the score of its associated Vulnerability is below maxPermissibleSeverity.
 
- exclusions string[]
 - A vulnerable application dependency is ignored if its name matches any of the items in 
exclusions. An asterisk (*) in the dependency pattern acts as a wildcard and matches zero or more characters. - max
Permissible numberCvss V2score  - A vulnerable application dependency is ignored if the score of its associated Vulnerability is below maxPermissibleCvssV2Score and below maxPermissibleCvssV3Score.
 - max
Permissible numberCvss V3score  - A vulnerable application dependency is ignored if the score of its associated Vulnerability is below maxPermissibleCvssV2Score and below maxPermissibleCvssV3Score.
 - max
Permissible stringSeverity  - A vulnerable application dependency is ignored if the score of its associated Vulnerability is below maxPermissibleSeverity.
 
- exclusions Sequence[str]
 - A vulnerable application dependency is ignored if its name matches any of the items in 
exclusions. An asterisk (*) in the dependency pattern acts as a wildcard and matches zero or more characters. - max_
permissible_ floatcvss_ v2score  - A vulnerable application dependency is ignored if the score of its associated Vulnerability is below maxPermissibleCvssV2Score and below maxPermissibleCvssV3Score.
 - max_
permissible_ floatcvss_ v3score  - A vulnerable application dependency is ignored if the score of its associated Vulnerability is below maxPermissibleCvssV2Score and below maxPermissibleCvssV3Score.
 - max_
permissible_ strseverity  - A vulnerable application dependency is ignored if the score of its associated Vulnerability is below maxPermissibleSeverity.
 
- exclusions List<String>
 - A vulnerable application dependency is ignored if its name matches any of the items in 
exclusions. An asterisk (*) in the dependency pattern acts as a wildcard and matches zero or more characters. - max
Permissible NumberCvss V2score  - A vulnerable application dependency is ignored if the score of its associated Vulnerability is below maxPermissibleCvssV2Score and below maxPermissibleCvssV3Score.
 - max
Permissible NumberCvss V3score  - A vulnerable application dependency is ignored if the score of its associated Vulnerability is below maxPermissibleCvssV2Score and below maxPermissibleCvssV3Score.
 - max
Permissible StringSeverity  - A vulnerable application dependency is ignored if the score of its associated Vulnerability is below maxPermissibleSeverity.
 
GetVulnerabilityAuditSource   
- Description string
 - Description of the external resource source.
 - Oci
Resource stringId  - The Oracle Cloud identifier (OCID) of the Oracle Cloud Infrastructure resource that triggered the vulnerability audit.
 - Type string
 - Source type of the vulnerability audit.
 
- Description string
 - Description of the external resource source.
 - Oci
Resource stringId  - The Oracle Cloud identifier (OCID) of the Oracle Cloud Infrastructure resource that triggered the vulnerability audit.
 - Type string
 - Source type of the vulnerability audit.
 
- description String
 - Description of the external resource source.
 - oci
Resource StringId  - The Oracle Cloud identifier (OCID) of the Oracle Cloud Infrastructure resource that triggered the vulnerability audit.
 - type String
 - Source type of the vulnerability audit.
 
- description string
 - Description of the external resource source.
 - oci
Resource stringId  - The Oracle Cloud identifier (OCID) of the Oracle Cloud Infrastructure resource that triggered the vulnerability audit.
 - type string
 - Source type of the vulnerability audit.
 
- description str
 - Description of the external resource source.
 - oci_
resource_ strid  - The Oracle Cloud identifier (OCID) of the Oracle Cloud Infrastructure resource that triggered the vulnerability audit.
 - type str
 - Source type of the vulnerability audit.
 
- description String
 - Description of the external resource source.
 - oci
Resource StringId  - The Oracle Cloud identifier (OCID) of the Oracle Cloud Infrastructure resource that triggered the vulnerability audit.
 - type String
 - Source type of the vulnerability audit.
 
GetVulnerabilityAuditUsageData    
- Bucket string
 - The Object Storage bucket to read the usage data from.
 - Namespace string
 - The Object Storage namespace to read the usage data from.
 - Object string
 - The Object Storage object name to read the usage data from.
 - Source
Type string - The destination type. Use 
objectStorageTuplewhen specifying the namespace, bucket name, and object name. 
- Bucket string
 - The Object Storage bucket to read the usage data from.
 - Namespace string
 - The Object Storage namespace to read the usage data from.
 - Object string
 - The Object Storage object name to read the usage data from.
 - Source
Type string - The destination type. Use 
objectStorageTuplewhen specifying the namespace, bucket name, and object name. 
- bucket String
 - The Object Storage bucket to read the usage data from.
 - namespace String
 - The Object Storage namespace to read the usage data from.
 - object String
 - The Object Storage object name to read the usage data from.
 - source
Type String - The destination type. Use 
objectStorageTuplewhen specifying the namespace, bucket name, and object name. 
- bucket string
 - The Object Storage bucket to read the usage data from.
 - namespace string
 - The Object Storage namespace to read the usage data from.
 - object string
 - The Object Storage object name to read the usage data from.
 - source
Type string - The destination type. Use 
objectStorageTuplewhen specifying the namespace, bucket name, and object name. 
- bucket str
 - The Object Storage bucket to read the usage data from.
 - namespace str
 - The Object Storage namespace to read the usage data from.
 - object str
 - The Object Storage object name to read the usage data from.
 - source_
type str - The destination type. Use 
objectStorageTuplewhen specifying the namespace, bucket name, and object name. 
- bucket String
 - The Object Storage bucket to read the usage data from.
 - namespace String
 - The Object Storage namespace to read the usage data from.
 - object String
 - The Object Storage object name to read the usage data from.
 - source
Type String - The destination type. Use 
objectStorageTuplewhen specifying the namespace, bucket name, and object name. 
GetVulnerabilityAuditVulnerability   
- Cvss
V2score double - Common Vulnerability Scoring System (CVSS) Version 2.
 - Cvss
V3score double - Common Vulnerability Scoring System (CVSS) Version 3.
 - Id string
 - Unique vulnerability identifier, e.g. CVE-1999-0067.
 - Is
False boolPositive  - Indicates if the vulnerability is a false positive according to the usage data. If no usage data was provided or the service cannot infer usage of the vulnerable code then this property is 
null. - Is
Ignored bool - Indicates if the vulnerability was ignored according to the audit configuration.
 - Severity string
 - ADM qualitative severity score. Can be either NONE, LOW, MEDIUM, HIGH or CRITICAL.
 - Source string
 - Source that published the vulnerability
 
- Cvss
V2score float64 - Common Vulnerability Scoring System (CVSS) Version 2.
 - Cvss
V3score float64 - Common Vulnerability Scoring System (CVSS) Version 3.
 - Id string
 - Unique vulnerability identifier, e.g. CVE-1999-0067.
 - Is
False boolPositive  - Indicates if the vulnerability is a false positive according to the usage data. If no usage data was provided or the service cannot infer usage of the vulnerable code then this property is 
null. - Is
Ignored bool - Indicates if the vulnerability was ignored according to the audit configuration.
 - Severity string
 - ADM qualitative severity score. Can be either NONE, LOW, MEDIUM, HIGH or CRITICAL.
 - Source string
 - Source that published the vulnerability
 
- cvss
V2score Double - Common Vulnerability Scoring System (CVSS) Version 2.
 - cvss
V3score Double - Common Vulnerability Scoring System (CVSS) Version 3.
 - id String
 - Unique vulnerability identifier, e.g. CVE-1999-0067.
 - is
False BooleanPositive  - Indicates if the vulnerability is a false positive according to the usage data. If no usage data was provided or the service cannot infer usage of the vulnerable code then this property is 
null. - is
Ignored Boolean - Indicates if the vulnerability was ignored according to the audit configuration.
 - severity String
 - ADM qualitative severity score. Can be either NONE, LOW, MEDIUM, HIGH or CRITICAL.
 - source String
 - Source that published the vulnerability
 
- cvss
V2score number - Common Vulnerability Scoring System (CVSS) Version 2.
 - cvss
V3score number - Common Vulnerability Scoring System (CVSS) Version 3.
 - id string
 - Unique vulnerability identifier, e.g. CVE-1999-0067.
 - is
False booleanPositive  - Indicates if the vulnerability is a false positive according to the usage data. If no usage data was provided or the service cannot infer usage of the vulnerable code then this property is 
null. - is
Ignored boolean - Indicates if the vulnerability was ignored according to the audit configuration.
 - severity string
 - ADM qualitative severity score. Can be either NONE, LOW, MEDIUM, HIGH or CRITICAL.
 - source string
 - Source that published the vulnerability
 
- cvss_
v2score float - Common Vulnerability Scoring System (CVSS) Version 2.
 - cvss_
v3score float - Common Vulnerability Scoring System (CVSS) Version 3.
 - id str
 - Unique vulnerability identifier, e.g. CVE-1999-0067.
 - is_
false_ boolpositive  - Indicates if the vulnerability is a false positive according to the usage data. If no usage data was provided or the service cannot infer usage of the vulnerable code then this property is 
null. - is_
ignored bool - Indicates if the vulnerability was ignored according to the audit configuration.
 - severity str
 - ADM qualitative severity score. Can be either NONE, LOW, MEDIUM, HIGH or CRITICAL.
 - source str
 - Source that published the vulnerability
 
- cvss
V2score Number - Common Vulnerability Scoring System (CVSS) Version 2.
 - cvss
V3score Number - Common Vulnerability Scoring System (CVSS) Version 3.
 - id String
 - Unique vulnerability identifier, e.g. CVE-1999-0067.
 - is
False BooleanPositive  - Indicates if the vulnerability is a false positive according to the usage data. If no usage data was provided or the service cannot infer usage of the vulnerable code then this property is 
null. - is
Ignored Boolean - Indicates if the vulnerability was ignored according to the audit configuration.
 - severity String
 - ADM qualitative severity score. Can be either NONE, LOW, MEDIUM, HIGH or CRITICAL.
 - source String
 - Source that published the vulnerability
 
Package Details
- Repository
 - oci pulumi/pulumi-oci
 - License
 - Apache-2.0
 - Notes
 - This Pulumi package is based on the 
ociTerraform Provider.