All Downloads are FREE. Search and download functionalities are using the official Maven repository.

com.google.api.services.securitycenter.v1.model.Cve Maven / Gradle / Ivy

There is a newer version: v1-rev20241111-2.0.0
Show newest version
/*
 * Licensed under the Apache License, Version 2.0 (the "License"); you may not use this file except
 * in compliance with the License. You may obtain a copy of the License at
 *
 * http://www.apache.org/licenses/LICENSE-2.0
 *
 * Unless required by applicable law or agreed to in writing, software distributed under the License
 * is distributed on an "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express
 * or implied. See the License for the specific language governing permissions and limitations under
 * the License.
 */
/*
 * This code was generated by https://github.com/googleapis/google-api-java-client-services/
 * Modify at your own risk.
 */

package com.google.api.services.securitycenter.v1.model;

/**
 * CVE stands for Common Vulnerabilities and Exposures. Information from the [CVE
 * record](https://www.cve.org/ResourcesSupport/Glossary) that describes this vulnerability.
 *
 * 

This is the Java data model class that specifies how to parse/serialize into the JSON that is * transmitted over HTTP when working with the Security Command Center API. For a detailed * explanation see: * https://developers.google.com/api-client-library/java/google-http-java-client/json *

* * @author Google, Inc. */ @SuppressWarnings("javadoc") public final class Cve extends com.google.api.client.json.GenericJson { /** * Describe Common Vulnerability Scoring System specified at * https://www.first.org/cvss/v3.1/specification-document * The value may be {@code null}. */ @com.google.api.client.util.Key private Cvssv3 cvssv3; /** * Date the first publicly available exploit or PoC was released. * The value may be {@code null}. */ @com.google.api.client.util.Key private String exploitReleaseDate; /** * The exploitation activity of the vulnerability in the wild. * The value may be {@code null}. */ @com.google.api.client.util.Key private java.lang.String exploitationActivity; /** * Date of the earliest known exploitation. * The value may be {@code null}. */ @com.google.api.client.util.Key private String firstExploitationDate; /** * The unique identifier for the vulnerability. e.g. CVE-2021-34527 * The value may be {@code null}. */ @com.google.api.client.util.Key private java.lang.String id; /** * The potential impact of the vulnerability if it was to be exploited. * The value may be {@code null}. */ @com.google.api.client.util.Key private java.lang.String impact; /** * Whether or not the vulnerability has been observed in the wild. * The value may be {@code null}. */ @com.google.api.client.util.Key private java.lang.Boolean observedInTheWild; /** * Additional information about the CVE. e.g. https://cve.mitre.org/cgi- * bin/cvename.cgi?name=CVE-2021-34527 * The value may be {@code null}. */ @com.google.api.client.util.Key private java.util.List references; /** * Whether upstream fix is available for the CVE. * The value may be {@code null}. */ @com.google.api.client.util.Key private java.lang.Boolean upstreamFixAvailable; /** * Whether or not the vulnerability was zero day when the finding was published. * The value may be {@code null}. */ @com.google.api.client.util.Key private java.lang.Boolean zeroDay; /** * Describe Common Vulnerability Scoring System specified at * https://www.first.org/cvss/v3.1/specification-document * @return value or {@code null} for none */ public Cvssv3 getCvssv3() { return cvssv3; } /** * Describe Common Vulnerability Scoring System specified at * https://www.first.org/cvss/v3.1/specification-document * @param cvssv3 cvssv3 or {@code null} for none */ public Cve setCvssv3(Cvssv3 cvssv3) { this.cvssv3 = cvssv3; return this; } /** * Date the first publicly available exploit or PoC was released. * @return value or {@code null} for none */ public String getExploitReleaseDate() { return exploitReleaseDate; } /** * Date the first publicly available exploit or PoC was released. * @param exploitReleaseDate exploitReleaseDate or {@code null} for none */ public Cve setExploitReleaseDate(String exploitReleaseDate) { this.exploitReleaseDate = exploitReleaseDate; return this; } /** * The exploitation activity of the vulnerability in the wild. * @return value or {@code null} for none */ public java.lang.String getExploitationActivity() { return exploitationActivity; } /** * The exploitation activity of the vulnerability in the wild. * @param exploitationActivity exploitationActivity or {@code null} for none */ public Cve setExploitationActivity(java.lang.String exploitationActivity) { this.exploitationActivity = exploitationActivity; return this; } /** * Date of the earliest known exploitation. * @return value or {@code null} for none */ public String getFirstExploitationDate() { return firstExploitationDate; } /** * Date of the earliest known exploitation. * @param firstExploitationDate firstExploitationDate or {@code null} for none */ public Cve setFirstExploitationDate(String firstExploitationDate) { this.firstExploitationDate = firstExploitationDate; return this; } /** * The unique identifier for the vulnerability. e.g. CVE-2021-34527 * @return value or {@code null} for none */ public java.lang.String getId() { return id; } /** * The unique identifier for the vulnerability. e.g. CVE-2021-34527 * @param id id or {@code null} for none */ public Cve setId(java.lang.String id) { this.id = id; return this; } /** * The potential impact of the vulnerability if it was to be exploited. * @return value or {@code null} for none */ public java.lang.String getImpact() { return impact; } /** * The potential impact of the vulnerability if it was to be exploited. * @param impact impact or {@code null} for none */ public Cve setImpact(java.lang.String impact) { this.impact = impact; return this; } /** * Whether or not the vulnerability has been observed in the wild. * @return value or {@code null} for none */ public java.lang.Boolean getObservedInTheWild() { return observedInTheWild; } /** * Whether or not the vulnerability has been observed in the wild. * @param observedInTheWild observedInTheWild or {@code null} for none */ public Cve setObservedInTheWild(java.lang.Boolean observedInTheWild) { this.observedInTheWild = observedInTheWild; return this; } /** * Additional information about the CVE. e.g. https://cve.mitre.org/cgi- * bin/cvename.cgi?name=CVE-2021-34527 * @return value or {@code null} for none */ public java.util.List getReferences() { return references; } /** * Additional information about the CVE. e.g. https://cve.mitre.org/cgi- * bin/cvename.cgi?name=CVE-2021-34527 * @param references references or {@code null} for none */ public Cve setReferences(java.util.List references) { this.references = references; return this; } /** * Whether upstream fix is available for the CVE. * @return value or {@code null} for none */ public java.lang.Boolean getUpstreamFixAvailable() { return upstreamFixAvailable; } /** * Whether upstream fix is available for the CVE. * @param upstreamFixAvailable upstreamFixAvailable or {@code null} for none */ public Cve setUpstreamFixAvailable(java.lang.Boolean upstreamFixAvailable) { this.upstreamFixAvailable = upstreamFixAvailable; return this; } /** * Whether or not the vulnerability was zero day when the finding was published. * @return value or {@code null} for none */ public java.lang.Boolean getZeroDay() { return zeroDay; } /** * Whether or not the vulnerability was zero day when the finding was published. * @param zeroDay zeroDay or {@code null} for none */ public Cve setZeroDay(java.lang.Boolean zeroDay) { this.zeroDay = zeroDay; return this; } @Override public Cve set(String fieldName, Object value) { return (Cve) super.set(fieldName, value); } @Override public Cve clone() { return (Cve) super.clone(); } }




© 2015 - 2024 Weber Informatics LLC | Privacy Policy