
io.grafeas.v1beta1.vulnerability.VulnerabilityOrBuilder Maven / Gradle / Ivy
/*
* Copyright 2024 Google LLC
*
* Licensed under the Apache License, Version 2.0 (the "License");
* you may not use this file except in compliance with the License.
* You may obtain a copy of the License at
*
* https://www.apache.org/licenses/LICENSE-2.0
*
* Unless required by applicable law or agreed to in writing, software
* distributed under the License is distributed on an "AS IS" BASIS,
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
* See the License for the specific language governing permissions and
* limitations under the License.
*/
// Generated by the protocol buffer compiler. DO NOT EDIT!
// source: google/devtools/containeranalysis/v1beta1/vulnerability/vulnerability.proto
// Protobuf Java Version: 3.25.5
package io.grafeas.v1beta1.vulnerability;
public interface VulnerabilityOrBuilder
extends
// @@protoc_insertion_point(interface_extends:grafeas.v1beta1.vulnerability.Vulnerability)
com.google.protobuf.MessageOrBuilder {
/**
*
*
*
* The CVSS score for this vulnerability.
*
*
* float cvss_score = 1;
*
* @return The cvssScore.
*/
float getCvssScore();
/**
*
*
*
* Note provider assigned impact of the vulnerability.
*
*
* .grafeas.v1beta1.vulnerability.Severity severity = 2;
*
* @return The enum numeric value on the wire for severity.
*/
int getSeverityValue();
/**
*
*
*
* Note provider assigned impact of the vulnerability.
*
*
* .grafeas.v1beta1.vulnerability.Severity severity = 2;
*
* @return The severity.
*/
io.grafeas.v1beta1.vulnerability.Severity getSeverity();
/**
*
*
*
* All information about the package to specifically identify this
* vulnerability. One entry per (version range and cpe_uri) the package
* vulnerability has manifested in.
*
*
* repeated .grafeas.v1beta1.vulnerability.Vulnerability.Detail details = 3;
*/
java.util.List getDetailsList();
/**
*
*
*
* All information about the package to specifically identify this
* vulnerability. One entry per (version range and cpe_uri) the package
* vulnerability has manifested in.
*
*
* repeated .grafeas.v1beta1.vulnerability.Vulnerability.Detail details = 3;
*/
io.grafeas.v1beta1.vulnerability.Vulnerability.Detail getDetails(int index);
/**
*
*
*
* All information about the package to specifically identify this
* vulnerability. One entry per (version range and cpe_uri) the package
* vulnerability has manifested in.
*
*
* repeated .grafeas.v1beta1.vulnerability.Vulnerability.Detail details = 3;
*/
int getDetailsCount();
/**
*
*
*
* All information about the package to specifically identify this
* vulnerability. One entry per (version range and cpe_uri) the package
* vulnerability has manifested in.
*
*
* repeated .grafeas.v1beta1.vulnerability.Vulnerability.Detail details = 3;
*/
java.util.List extends io.grafeas.v1beta1.vulnerability.Vulnerability.DetailOrBuilder>
getDetailsOrBuilderList();
/**
*
*
*
* All information about the package to specifically identify this
* vulnerability. One entry per (version range and cpe_uri) the package
* vulnerability has manifested in.
*
*
* repeated .grafeas.v1beta1.vulnerability.Vulnerability.Detail details = 3;
*/
io.grafeas.v1beta1.vulnerability.Vulnerability.DetailOrBuilder getDetailsOrBuilder(int index);
/**
*
*
*
* The full description of the CVSSv3.
*
*
* .grafeas.v1beta1.vulnerability.CVSSv3 cvss_v3 = 4;
*
* @return Whether the cvssV3 field is set.
*/
boolean hasCvssV3();
/**
*
*
*
* The full description of the CVSSv3.
*
*
* .grafeas.v1beta1.vulnerability.CVSSv3 cvss_v3 = 4;
*
* @return The cvssV3.
*/
io.grafeas.v1beta1.vulnerability.CVSSv3 getCvssV3();
/**
*
*
*
* The full description of the CVSSv3.
*
*
* .grafeas.v1beta1.vulnerability.CVSSv3 cvss_v3 = 4;
*/
io.grafeas.v1beta1.vulnerability.CVSSv3OrBuilder getCvssV3OrBuilder();
/**
*
*
*
* Windows details get their own format because the information format and
* model don't match a normal detail. Specifically Windows updates are done as
* patches, thus Windows vulnerabilities really are a missing package, rather
* than a package being at an incorrect version.
*
*
* repeated .grafeas.v1beta1.vulnerability.Vulnerability.WindowsDetail windows_details = 5;
*
*/
java.util.List
getWindowsDetailsList();
/**
*
*
*
* Windows details get their own format because the information format and
* model don't match a normal detail. Specifically Windows updates are done as
* patches, thus Windows vulnerabilities really are a missing package, rather
* than a package being at an incorrect version.
*
*
* repeated .grafeas.v1beta1.vulnerability.Vulnerability.WindowsDetail windows_details = 5;
*
*/
io.grafeas.v1beta1.vulnerability.Vulnerability.WindowsDetail getWindowsDetails(int index);
/**
*
*
*
* Windows details get their own format because the information format and
* model don't match a normal detail. Specifically Windows updates are done as
* patches, thus Windows vulnerabilities really are a missing package, rather
* than a package being at an incorrect version.
*
*
* repeated .grafeas.v1beta1.vulnerability.Vulnerability.WindowsDetail windows_details = 5;
*
*/
int getWindowsDetailsCount();
/**
*
*
*
* Windows details get their own format because the information format and
* model don't match a normal detail. Specifically Windows updates are done as
* patches, thus Windows vulnerabilities really are a missing package, rather
* than a package being at an incorrect version.
*
*
* repeated .grafeas.v1beta1.vulnerability.Vulnerability.WindowsDetail windows_details = 5;
*
*/
java.util.List extends io.grafeas.v1beta1.vulnerability.Vulnerability.WindowsDetailOrBuilder>
getWindowsDetailsOrBuilderList();
/**
*
*
*
* Windows details get their own format because the information format and
* model don't match a normal detail. Specifically Windows updates are done as
* patches, thus Windows vulnerabilities really are a missing package, rather
* than a package being at an incorrect version.
*
*
* repeated .grafeas.v1beta1.vulnerability.Vulnerability.WindowsDetail windows_details = 5;
*
*/
io.grafeas.v1beta1.vulnerability.Vulnerability.WindowsDetailOrBuilder getWindowsDetailsOrBuilder(
int index);
/**
*
*
*
* The time this information was last changed at the source. This is an
* upstream timestamp from the underlying information source - e.g. Ubuntu
* security tracker.
*
*
* .google.protobuf.Timestamp source_update_time = 6;
*
* @return Whether the sourceUpdateTime field is set.
*/
boolean hasSourceUpdateTime();
/**
*
*
*
* The time this information was last changed at the source. This is an
* upstream timestamp from the underlying information source - e.g. Ubuntu
* security tracker.
*
*
* .google.protobuf.Timestamp source_update_time = 6;
*
* @return The sourceUpdateTime.
*/
com.google.protobuf.Timestamp getSourceUpdateTime();
/**
*
*
*
* The time this information was last changed at the source. This is an
* upstream timestamp from the underlying information source - e.g. Ubuntu
* security tracker.
*
*
* .google.protobuf.Timestamp source_update_time = 6;
*/
com.google.protobuf.TimestampOrBuilder getSourceUpdateTimeOrBuilder();
}
© 2015 - 2025 Weber Informatics LLC | Privacy Policy