All Downloads are FREE. Search and download functionalities are using the official Maven repository.

com.google.cloud.securitycenter.v2.CveOrBuilder Maven / Gradle / Ivy

There is a newer version: 2.62.0
Show newest version
/*
 * Copyright 2024 Google LLC
 *
 * Licensed under the Apache License, Version 2.0 (the "License");
 * you may not use this file except in compliance with the License.
 * You may obtain a copy of the License at
 *
 *     https://www.apache.org/licenses/LICENSE-2.0
 *
 * Unless required by applicable law or agreed to in writing, software
 * distributed under the License is distributed on an "AS IS" BASIS,
 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
 * See the License for the specific language governing permissions and
 * limitations under the License.
 */
// Generated by the protocol buffer compiler.  DO NOT EDIT!
// source: google/cloud/securitycenter/v2/vulnerability.proto

// Protobuf Java Version: 3.25.3
package com.google.cloud.securitycenter.v2;

public interface CveOrBuilder
    extends
    // @@protoc_insertion_point(interface_extends:google.cloud.securitycenter.v2.Cve)
    com.google.protobuf.MessageOrBuilder {

  /**
   *
   *
   * 
   * The unique identifier for the vulnerability. e.g. CVE-2021-34527
   * 
* * string id = 1; * * @return The id. */ java.lang.String getId(); /** * * *
   * The unique identifier for the vulnerability. e.g. CVE-2021-34527
   * 
* * string id = 1; * * @return The bytes for id. */ com.google.protobuf.ByteString getIdBytes(); /** * * *
   * Additional information about the CVE.
   * e.g. https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-34527
   * 
* * repeated .google.cloud.securitycenter.v2.Reference references = 2; */ java.util.List getReferencesList(); /** * * *
   * Additional information about the CVE.
   * e.g. https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-34527
   * 
* * repeated .google.cloud.securitycenter.v2.Reference references = 2; */ com.google.cloud.securitycenter.v2.Reference getReferences(int index); /** * * *
   * Additional information about the CVE.
   * e.g. https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-34527
   * 
* * repeated .google.cloud.securitycenter.v2.Reference references = 2; */ int getReferencesCount(); /** * * *
   * Additional information about the CVE.
   * e.g. https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-34527
   * 
* * repeated .google.cloud.securitycenter.v2.Reference references = 2; */ java.util.List getReferencesOrBuilderList(); /** * * *
   * Additional information about the CVE.
   * e.g. https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-34527
   * 
* * repeated .google.cloud.securitycenter.v2.Reference references = 2; */ com.google.cloud.securitycenter.v2.ReferenceOrBuilder getReferencesOrBuilder(int index); /** * * *
   * Describe Common Vulnerability Scoring System specified at
   * https://www.first.org/cvss/v3.1/specification-document
   * 
* * .google.cloud.securitycenter.v2.Cvssv3 cvssv3 = 3; * * @return Whether the cvssv3 field is set. */ boolean hasCvssv3(); /** * * *
   * Describe Common Vulnerability Scoring System specified at
   * https://www.first.org/cvss/v3.1/specification-document
   * 
* * .google.cloud.securitycenter.v2.Cvssv3 cvssv3 = 3; * * @return The cvssv3. */ com.google.cloud.securitycenter.v2.Cvssv3 getCvssv3(); /** * * *
   * Describe Common Vulnerability Scoring System specified at
   * https://www.first.org/cvss/v3.1/specification-document
   * 
* * .google.cloud.securitycenter.v2.Cvssv3 cvssv3 = 3; */ com.google.cloud.securitycenter.v2.Cvssv3OrBuilder getCvssv3OrBuilder(); /** * * *
   * Whether upstream fix is available for the CVE.
   * 
* * bool upstream_fix_available = 4; * * @return The upstreamFixAvailable. */ boolean getUpstreamFixAvailable(); /** * * *
   * The potential impact of the vulnerability if it was to be exploited.
   * 
* * .google.cloud.securitycenter.v2.Cve.RiskRating impact = 5; * * @return The enum numeric value on the wire for impact. */ int getImpactValue(); /** * * *
   * The potential impact of the vulnerability if it was to be exploited.
   * 
* * .google.cloud.securitycenter.v2.Cve.RiskRating impact = 5; * * @return The impact. */ com.google.cloud.securitycenter.v2.Cve.RiskRating getImpact(); /** * * *
   * The exploitation activity of the vulnerability in the wild.
   * 
* * .google.cloud.securitycenter.v2.Cve.ExploitationActivity exploitation_activity = 6; * * * @return The enum numeric value on the wire for exploitationActivity. */ int getExploitationActivityValue(); /** * * *
   * The exploitation activity of the vulnerability in the wild.
   * 
* * .google.cloud.securitycenter.v2.Cve.ExploitationActivity exploitation_activity = 6; * * * @return The exploitationActivity. */ com.google.cloud.securitycenter.v2.Cve.ExploitationActivity getExploitationActivity(); /** * * *
   * Whether or not the vulnerability has been observed in the wild.
   * 
* * bool observed_in_the_wild = 7; * * @return The observedInTheWild. */ boolean getObservedInTheWild(); /** * * *
   * Whether or not the vulnerability was zero day when the finding was
   * published.
   * 
* * bool zero_day = 8; * * @return The zeroDay. */ boolean getZeroDay(); }




© 2015 - 2024 Weber Informatics LLC | Privacy Policy