All Downloads are FREE. Search and download functionalities are using the official Maven repository.

io.grafeas.v1beta1.vulnerability.Cvss Maven / Gradle / Ivy

/*
 * Copyright 2024 Google LLC
 *
 * Licensed under the Apache License, Version 2.0 (the "License");
 * you may not use this file except in compliance with the License.
 * You may obtain a copy of the License at
 *
 *     https://www.apache.org/licenses/LICENSE-2.0
 *
 * Unless required by applicable law or agreed to in writing, software
 * distributed under the License is distributed on an "AS IS" BASIS,
 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
 * See the License for the specific language governing permissions and
 * limitations under the License.
 */
// Generated by the protocol buffer compiler.  DO NOT EDIT!
// source: google/devtools/containeranalysis/v1beta1/cvss/cvss.proto

// Protobuf Java Version: 3.25.5
package io.grafeas.v1beta1.vulnerability;

public final class Cvss {
  private Cvss() {}

  public static void registerAllExtensions(com.google.protobuf.ExtensionRegistryLite registry) {}

  public static void registerAllExtensions(com.google.protobuf.ExtensionRegistry registry) {
    registerAllExtensions((com.google.protobuf.ExtensionRegistryLite) registry);
  }

  static final com.google.protobuf.Descriptors.Descriptor
      internal_static_grafeas_v1beta1_vulnerability_CVSSv3_descriptor;
  static final com.google.protobuf.GeneratedMessageV3.FieldAccessorTable
      internal_static_grafeas_v1beta1_vulnerability_CVSSv3_fieldAccessorTable;

  public static com.google.protobuf.Descriptors.FileDescriptor getDescriptor() {
    return descriptor;
  }

  private static com.google.protobuf.Descriptors.FileDescriptor descriptor;

  static {
    java.lang.String[] descriptorData = {
      "\n9google/devtools/containeranalysis/v1be"
          + "ta1/cvss/cvss.proto\022\035grafeas.v1beta1.vul"
          + "nerability\"\335\n\n\006CVSSv3\022\022\n\nbase_score\030\001 \001("
          + "\002\022\034\n\024exploitability_score\030\002 \001(\002\022\024\n\014impac"
          + "t_score\030\003 \001(\002\022I\n\rattack_vector\030\005 \001(\01622.g"
          + "rafeas.v1beta1.vulnerability.CVSSv3.Atta"
          + "ckVector\022Q\n\021attack_complexity\030\006 \001(\01626.gr"
          + "afeas.v1beta1.vulnerability.CVSSv3.Attac"
          + "kComplexity\022U\n\023privileges_required\030\007 \001(\016"
          + "28.grafeas.v1beta1.vulnerability.CVSSv3."
          + "PrivilegesRequired\022O\n\020user_interaction\030\010"
          + " \001(\01625.grafeas.v1beta1.vulnerability.CVS"
          + "Sv3.UserInteraction\022:\n\005scope\030\t \001(\0162+.gra"
          + "feas.v1beta1.vulnerability.CVSSv3.Scope\022"
          + "L\n\026confidentiality_impact\030\n \001(\0162,.grafea"
          + "s.v1beta1.vulnerability.CVSSv3.Impact\022F\n"
          + "\020integrity_impact\030\013 \001(\0162,.grafeas.v1beta"
          + "1.vulnerability.CVSSv3.Impact\022I\n\023availab"
          + "ility_impact\030\014 \001(\0162,.grafeas.v1beta1.vul"
          + "nerability.CVSSv3.Impact\"\231\001\n\014AttackVecto"
          + "r\022\035\n\031ATTACK_VECTOR_UNSPECIFIED\020\000\022\031\n\025ATTA"
          + "CK_VECTOR_NETWORK\020\001\022\032\n\026ATTACK_VECTOR_ADJ"
          + "ACENT\020\002\022\027\n\023ATTACK_VECTOR_LOCAL\020\003\022\032\n\026ATTA"
          + "CK_VECTOR_PHYSICAL\020\004\"l\n\020AttackComplexity"
          + "\022!\n\035ATTACK_COMPLEXITY_UNSPECIFIED\020\000\022\031\n\025A"
          + "TTACK_COMPLEXITY_LOW\020\001\022\032\n\026ATTACK_COMPLEX"
          + "ITY_HIGH\020\002\"\222\001\n\022PrivilegesRequired\022#\n\037PRI"
          + "VILEGES_REQUIRED_UNSPECIFIED\020\000\022\034\n\030PRIVIL"
          + "EGES_REQUIRED_NONE\020\001\022\033\n\027PRIVILEGES_REQUI"
          + "RED_LOW\020\002\022\034\n\030PRIVILEGES_REQUIRED_HIGH\020\003\""
          + "m\n\017UserInteraction\022 \n\034USER_INTERACTION_U"
          + "NSPECIFIED\020\000\022\031\n\025USER_INTERACTION_NONE\020\001\022"
          + "\035\n\031USER_INTERACTION_REQUIRED\020\002\"F\n\005Scope\022"
          + "\025\n\021SCOPE_UNSPECIFIED\020\000\022\023\n\017SCOPE_UNCHANGE"
          + "D\020\001\022\021\n\rSCOPE_CHANGED\020\002\"R\n\006Impact\022\026\n\022IMPA"
          + "CT_UNSPECIFIED\020\000\022\017\n\013IMPACT_HIGH\020\001\022\016\n\nIMP"
          + "ACT_LOW\020\002\022\017\n\013IMPACT_NONE\020\003B\204\001\n io.grafea"
          + "s.v1beta1.vulnerabilityP\001ZXcloud.google."
          + "com/go/containeranalysis/apiv1beta1/cont"
          + "aineranalysispb;containeranalysispb\242\002\003GR"
          + "Ab\006proto3"
    };
    descriptor =
        com.google.protobuf.Descriptors.FileDescriptor.internalBuildGeneratedFileFrom(
            descriptorData, new com.google.protobuf.Descriptors.FileDescriptor[] {});
    internal_static_grafeas_v1beta1_vulnerability_CVSSv3_descriptor =
        getDescriptor().getMessageTypes().get(0);
    internal_static_grafeas_v1beta1_vulnerability_CVSSv3_fieldAccessorTable =
        new com.google.protobuf.GeneratedMessageV3.FieldAccessorTable(
            internal_static_grafeas_v1beta1_vulnerability_CVSSv3_descriptor,
            new java.lang.String[] {
              "BaseScore",
              "ExploitabilityScore",
              "ImpactScore",
              "AttackVector",
              "AttackComplexity",
              "PrivilegesRequired",
              "UserInteraction",
              "Scope",
              "ConfidentialityImpact",
              "IntegrityImpact",
              "AvailabilityImpact",
            });
  }

  // @@protoc_insertion_point(outer_class_scope)
}




© 2015 - 2025 Weber Informatics LLC | Privacy Policy