com.google.cloud.securitycenter.v1.CveOrBuilder Maven / Gradle / Ivy
Go to download
Show more of this group Show more artifacts with this name
Show all versions of proto-google-cloud-securitycenter-v1 Show documentation
Show all versions of proto-google-cloud-securitycenter-v1 Show documentation
PROTO library for proto-google-cloud-securitycenter-v1
The newest version!
/*
* Copyright 2024 Google LLC
*
* Licensed under the Apache License, Version 2.0 (the "License");
* you may not use this file except in compliance with the License.
* You may obtain a copy of the License at
*
* https://www.apache.org/licenses/LICENSE-2.0
*
* Unless required by applicable law or agreed to in writing, software
* distributed under the License is distributed on an "AS IS" BASIS,
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
* See the License for the specific language governing permissions and
* limitations under the License.
*/
// Generated by the protocol buffer compiler. DO NOT EDIT!
// source: google/cloud/securitycenter/v1/vulnerability.proto
// Protobuf Java Version: 3.25.5
package com.google.cloud.securitycenter.v1;
public interface CveOrBuilder
extends
// @@protoc_insertion_point(interface_extends:google.cloud.securitycenter.v1.Cve)
com.google.protobuf.MessageOrBuilder {
/**
*
*
*
* The unique identifier for the vulnerability. e.g. CVE-2021-34527
*
*
* string id = 1;
*
* @return The id.
*/
java.lang.String getId();
/**
*
*
*
* The unique identifier for the vulnerability. e.g. CVE-2021-34527
*
*
* string id = 1;
*
* @return The bytes for id.
*/
com.google.protobuf.ByteString getIdBytes();
/**
*
*
*
* Additional information about the CVE.
* e.g. https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-34527
*
*
* repeated .google.cloud.securitycenter.v1.Reference references = 2;
*/
java.util.List getReferencesList();
/**
*
*
*
* Additional information about the CVE.
* e.g. https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-34527
*
*
* repeated .google.cloud.securitycenter.v1.Reference references = 2;
*/
com.google.cloud.securitycenter.v1.Reference getReferences(int index);
/**
*
*
*
* Additional information about the CVE.
* e.g. https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-34527
*
*
* repeated .google.cloud.securitycenter.v1.Reference references = 2;
*/
int getReferencesCount();
/**
*
*
*
* Additional information about the CVE.
* e.g. https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-34527
*
*
* repeated .google.cloud.securitycenter.v1.Reference references = 2;
*/
java.util.List extends com.google.cloud.securitycenter.v1.ReferenceOrBuilder>
getReferencesOrBuilderList();
/**
*
*
*
* Additional information about the CVE.
* e.g. https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-34527
*
*
* repeated .google.cloud.securitycenter.v1.Reference references = 2;
*/
com.google.cloud.securitycenter.v1.ReferenceOrBuilder getReferencesOrBuilder(int index);
/**
*
*
*
* Describe Common Vulnerability Scoring System specified at
* https://www.first.org/cvss/v3.1/specification-document
*
*
* .google.cloud.securitycenter.v1.Cvssv3 cvssv3 = 3;
*
* @return Whether the cvssv3 field is set.
*/
boolean hasCvssv3();
/**
*
*
*
* Describe Common Vulnerability Scoring System specified at
* https://www.first.org/cvss/v3.1/specification-document
*
*
* .google.cloud.securitycenter.v1.Cvssv3 cvssv3 = 3;
*
* @return The cvssv3.
*/
com.google.cloud.securitycenter.v1.Cvssv3 getCvssv3();
/**
*
*
*
* Describe Common Vulnerability Scoring System specified at
* https://www.first.org/cvss/v3.1/specification-document
*
*
* .google.cloud.securitycenter.v1.Cvssv3 cvssv3 = 3;
*/
com.google.cloud.securitycenter.v1.Cvssv3OrBuilder getCvssv3OrBuilder();
/**
*
*
*
* Whether upstream fix is available for the CVE.
*
*
* bool upstream_fix_available = 4;
*
* @return The upstreamFixAvailable.
*/
boolean getUpstreamFixAvailable();
/**
*
*
*
* The potential impact of the vulnerability if it was to be exploited.
*
*
* .google.cloud.securitycenter.v1.Cve.RiskRating impact = 5;
*
* @return The enum numeric value on the wire for impact.
*/
int getImpactValue();
/**
*
*
*
* The potential impact of the vulnerability if it was to be exploited.
*
*
* .google.cloud.securitycenter.v1.Cve.RiskRating impact = 5;
*
* @return The impact.
*/
com.google.cloud.securitycenter.v1.Cve.RiskRating getImpact();
/**
*
*
*
* The exploitation activity of the vulnerability in the wild.
*
*
* .google.cloud.securitycenter.v1.Cve.ExploitationActivity exploitation_activity = 6;
*
*
* @return The enum numeric value on the wire for exploitationActivity.
*/
int getExploitationActivityValue();
/**
*
*
*
* The exploitation activity of the vulnerability in the wild.
*
*
* .google.cloud.securitycenter.v1.Cve.ExploitationActivity exploitation_activity = 6;
*
*
* @return The exploitationActivity.
*/
com.google.cloud.securitycenter.v1.Cve.ExploitationActivity getExploitationActivity();
/**
*
*
*
* Whether or not the vulnerability has been observed in the wild.
*
*
* bool observed_in_the_wild = 7;
*
* @return The observedInTheWild.
*/
boolean getObservedInTheWild();
/**
*
*
*
* Whether or not the vulnerability was zero day when the finding was
* published.
*
*
* bool zero_day = 8;
*
* @return The zeroDay.
*/
boolean getZeroDay();
/**
*
*
*
* Date the first publicly available exploit or PoC was released.
*
*
* .google.protobuf.Timestamp exploit_release_date = 9;
*
* @return Whether the exploitReleaseDate field is set.
*/
boolean hasExploitReleaseDate();
/**
*
*
*
* Date the first publicly available exploit or PoC was released.
*
*
* .google.protobuf.Timestamp exploit_release_date = 9;
*
* @return The exploitReleaseDate.
*/
com.google.protobuf.Timestamp getExploitReleaseDate();
/**
*
*
*
* Date the first publicly available exploit or PoC was released.
*
*
* .google.protobuf.Timestamp exploit_release_date = 9;
*/
com.google.protobuf.TimestampOrBuilder getExploitReleaseDateOrBuilder();
}
© 2015 - 2024 Weber Informatics LLC | Privacy Policy