All Downloads are FREE. Search and download functionalities are using the official Maven repository.

io.grafeas.v1beta1.vulnerability.VulnerabilityOrBuilder Maven / Gradle / Ivy

/*
 * Copyright 2024 Google LLC
 *
 * Licensed under the Apache License, Version 2.0 (the "License");
 * you may not use this file except in compliance with the License.
 * You may obtain a copy of the License at
 *
 *     https://www.apache.org/licenses/LICENSE-2.0
 *
 * Unless required by applicable law or agreed to in writing, software
 * distributed under the License is distributed on an "AS IS" BASIS,
 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
 * See the License for the specific language governing permissions and
 * limitations under the License.
 */
// Generated by the protocol buffer compiler.  DO NOT EDIT!
// source: google/devtools/containeranalysis/v1beta1/vulnerability/vulnerability.proto

// Protobuf Java Version: 3.25.5
package io.grafeas.v1beta1.vulnerability;

public interface VulnerabilityOrBuilder
    extends
    // @@protoc_insertion_point(interface_extends:grafeas.v1beta1.vulnerability.Vulnerability)
    com.google.protobuf.MessageOrBuilder {

  /**
   *
   *
   * 
   * The CVSS score for this vulnerability.
   * 
* * float cvss_score = 1; * * @return The cvssScore. */ float getCvssScore(); /** * * *
   * Note provider assigned impact of the vulnerability.
   * 
* * .grafeas.v1beta1.vulnerability.Severity severity = 2; * * @return The enum numeric value on the wire for severity. */ int getSeverityValue(); /** * * *
   * Note provider assigned impact of the vulnerability.
   * 
* * .grafeas.v1beta1.vulnerability.Severity severity = 2; * * @return The severity. */ io.grafeas.v1beta1.vulnerability.Severity getSeverity(); /** * * *
   * All information about the package to specifically identify this
   * vulnerability. One entry per (version range and cpe_uri) the package
   * vulnerability has manifested in.
   * 
* * repeated .grafeas.v1beta1.vulnerability.Vulnerability.Detail details = 3; */ java.util.List getDetailsList(); /** * * *
   * All information about the package to specifically identify this
   * vulnerability. One entry per (version range and cpe_uri) the package
   * vulnerability has manifested in.
   * 
* * repeated .grafeas.v1beta1.vulnerability.Vulnerability.Detail details = 3; */ io.grafeas.v1beta1.vulnerability.Vulnerability.Detail getDetails(int index); /** * * *
   * All information about the package to specifically identify this
   * vulnerability. One entry per (version range and cpe_uri) the package
   * vulnerability has manifested in.
   * 
* * repeated .grafeas.v1beta1.vulnerability.Vulnerability.Detail details = 3; */ int getDetailsCount(); /** * * *
   * All information about the package to specifically identify this
   * vulnerability. One entry per (version range and cpe_uri) the package
   * vulnerability has manifested in.
   * 
* * repeated .grafeas.v1beta1.vulnerability.Vulnerability.Detail details = 3; */ java.util.List getDetailsOrBuilderList(); /** * * *
   * All information about the package to specifically identify this
   * vulnerability. One entry per (version range and cpe_uri) the package
   * vulnerability has manifested in.
   * 
* * repeated .grafeas.v1beta1.vulnerability.Vulnerability.Detail details = 3; */ io.grafeas.v1beta1.vulnerability.Vulnerability.DetailOrBuilder getDetailsOrBuilder(int index); /** * * *
   * The full description of the CVSSv3.
   * 
* * .grafeas.v1beta1.vulnerability.CVSSv3 cvss_v3 = 4; * * @return Whether the cvssV3 field is set. */ boolean hasCvssV3(); /** * * *
   * The full description of the CVSSv3.
   * 
* * .grafeas.v1beta1.vulnerability.CVSSv3 cvss_v3 = 4; * * @return The cvssV3. */ io.grafeas.v1beta1.vulnerability.CVSSv3 getCvssV3(); /** * * *
   * The full description of the CVSSv3.
   * 
* * .grafeas.v1beta1.vulnerability.CVSSv3 cvss_v3 = 4; */ io.grafeas.v1beta1.vulnerability.CVSSv3OrBuilder getCvssV3OrBuilder(); /** * * *
   * Windows details get their own format because the information format and
   * model don't match a normal detail. Specifically Windows updates are done as
   * patches, thus Windows vulnerabilities really are a missing package, rather
   * than a package being at an incorrect version.
   * 
* * repeated .grafeas.v1beta1.vulnerability.Vulnerability.WindowsDetail windows_details = 5; * */ java.util.List getWindowsDetailsList(); /** * * *
   * Windows details get their own format because the information format and
   * model don't match a normal detail. Specifically Windows updates are done as
   * patches, thus Windows vulnerabilities really are a missing package, rather
   * than a package being at an incorrect version.
   * 
* * repeated .grafeas.v1beta1.vulnerability.Vulnerability.WindowsDetail windows_details = 5; * */ io.grafeas.v1beta1.vulnerability.Vulnerability.WindowsDetail getWindowsDetails(int index); /** * * *
   * Windows details get their own format because the information format and
   * model don't match a normal detail. Specifically Windows updates are done as
   * patches, thus Windows vulnerabilities really are a missing package, rather
   * than a package being at an incorrect version.
   * 
* * repeated .grafeas.v1beta1.vulnerability.Vulnerability.WindowsDetail windows_details = 5; * */ int getWindowsDetailsCount(); /** * * *
   * Windows details get their own format because the information format and
   * model don't match a normal detail. Specifically Windows updates are done as
   * patches, thus Windows vulnerabilities really are a missing package, rather
   * than a package being at an incorrect version.
   * 
* * repeated .grafeas.v1beta1.vulnerability.Vulnerability.WindowsDetail windows_details = 5; * */ java.util.List getWindowsDetailsOrBuilderList(); /** * * *
   * Windows details get their own format because the information format and
   * model don't match a normal detail. Specifically Windows updates are done as
   * patches, thus Windows vulnerabilities really are a missing package, rather
   * than a package being at an incorrect version.
   * 
* * repeated .grafeas.v1beta1.vulnerability.Vulnerability.WindowsDetail windows_details = 5; * */ io.grafeas.v1beta1.vulnerability.Vulnerability.WindowsDetailOrBuilder getWindowsDetailsOrBuilder( int index); /** * * *
   * The time this information was last changed at the source. This is an
   * upstream timestamp from the underlying information source - e.g. Ubuntu
   * security tracker.
   * 
* * .google.protobuf.Timestamp source_update_time = 6; * * @return Whether the sourceUpdateTime field is set. */ boolean hasSourceUpdateTime(); /** * * *
   * The time this information was last changed at the source. This is an
   * upstream timestamp from the underlying information source - e.g. Ubuntu
   * security tracker.
   * 
* * .google.protobuf.Timestamp source_update_time = 6; * * @return The sourceUpdateTime. */ com.google.protobuf.Timestamp getSourceUpdateTime(); /** * * *
   * The time this information was last changed at the source. This is an
   * upstream timestamp from the underlying information source - e.g. Ubuntu
   * security tracker.
   * 
* * .google.protobuf.Timestamp source_update_time = 6; */ com.google.protobuf.TimestampOrBuilder getSourceUpdateTimeOrBuilder(); }




© 2015 - 2025 Weber Informatics LLC | Privacy Policy