com.google.api.services.securitycenter.v1.model.Cvssv3 Maven / Gradle / Ivy
/*
* Licensed under the Apache License, Version 2.0 (the "License"); you may not use this file except
* in compliance with the License. You may obtain a copy of the License at
*
* http://www.apache.org/licenses/LICENSE-2.0
*
* Unless required by applicable law or agreed to in writing, software distributed under the License
* is distributed on an "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express
* or implied. See the License for the specific language governing permissions and limitations under
* the License.
*/
/*
* This code was generated by https://github.com/googleapis/google-api-java-client-services/
* Modify at your own risk.
*/
package com.google.api.services.securitycenter.v1.model;
/**
* Common Vulnerability Scoring System version 3.
*
* This is the Java data model class that specifies how to parse/serialize into the JSON that is
* transmitted over HTTP when working with the Security Command Center API. For a detailed
* explanation see:
* https://developers.google.com/api-client-library/java/google-http-java-client/json
*
*
* @author Google, Inc.
*/
@SuppressWarnings("javadoc")
public final class Cvssv3 extends com.google.api.client.json.GenericJson {
/**
* This metric describes the conditions beyond the attacker's control that must exist in order to
* exploit the vulnerability.
* The value may be {@code null}.
*/
@com.google.api.client.util.Key
private java.lang.String attackComplexity;
/**
* Base Metrics Represents the intrinsic characteristics of a vulnerability that are constant over
* time and across user environments. This metric reflects the context by which vulnerability
* exploitation is possible.
* The value may be {@code null}.
*/
@com.google.api.client.util.Key
private java.lang.String attackVector;
/**
* This metric measures the impact to the availability of the impacted component resulting from a
* successfully exploited vulnerability.
* The value may be {@code null}.
*/
@com.google.api.client.util.Key
private java.lang.String availabilityImpact;
/**
* The base score is a function of the base metric scores.
* The value may be {@code null}.
*/
@com.google.api.client.util.Key
private java.lang.Double baseScore;
/**
* This metric measures the impact to the confidentiality of the information resources managed by
* a software component due to a successfully exploited vulnerability.
* The value may be {@code null}.
*/
@com.google.api.client.util.Key
private java.lang.String confidentialityImpact;
/**
* This metric measures the impact to integrity of a successfully exploited vulnerability.
* The value may be {@code null}.
*/
@com.google.api.client.util.Key
private java.lang.String integrityImpact;
/**
* This metric describes the level of privileges an attacker must possess before successfully
* exploiting the vulnerability.
* The value may be {@code null}.
*/
@com.google.api.client.util.Key
private java.lang.String privilegesRequired;
/**
* The Scope metric captures whether a vulnerability in one vulnerable component impacts resources
* in components beyond its security scope.
* The value may be {@code null}.
*/
@com.google.api.client.util.Key
private java.lang.String scope;
/**
* This metric captures the requirement for a human user, other than the attacker, to participate
* in the successful compromise of the vulnerable component.
* The value may be {@code null}.
*/
@com.google.api.client.util.Key
private java.lang.String userInteraction;
/**
* This metric describes the conditions beyond the attacker's control that must exist in order to
* exploit the vulnerability.
* @return value or {@code null} for none
*/
public java.lang.String getAttackComplexity() {
return attackComplexity;
}
/**
* This metric describes the conditions beyond the attacker's control that must exist in order to
* exploit the vulnerability.
* @param attackComplexity attackComplexity or {@code null} for none
*/
public Cvssv3 setAttackComplexity(java.lang.String attackComplexity) {
this.attackComplexity = attackComplexity;
return this;
}
/**
* Base Metrics Represents the intrinsic characteristics of a vulnerability that are constant over
* time and across user environments. This metric reflects the context by which vulnerability
* exploitation is possible.
* @return value or {@code null} for none
*/
public java.lang.String getAttackVector() {
return attackVector;
}
/**
* Base Metrics Represents the intrinsic characteristics of a vulnerability that are constant over
* time and across user environments. This metric reflects the context by which vulnerability
* exploitation is possible.
* @param attackVector attackVector or {@code null} for none
*/
public Cvssv3 setAttackVector(java.lang.String attackVector) {
this.attackVector = attackVector;
return this;
}
/**
* This metric measures the impact to the availability of the impacted component resulting from a
* successfully exploited vulnerability.
* @return value or {@code null} for none
*/
public java.lang.String getAvailabilityImpact() {
return availabilityImpact;
}
/**
* This metric measures the impact to the availability of the impacted component resulting from a
* successfully exploited vulnerability.
* @param availabilityImpact availabilityImpact or {@code null} for none
*/
public Cvssv3 setAvailabilityImpact(java.lang.String availabilityImpact) {
this.availabilityImpact = availabilityImpact;
return this;
}
/**
* The base score is a function of the base metric scores.
* @return value or {@code null} for none
*/
public java.lang.Double getBaseScore() {
return baseScore;
}
/**
* The base score is a function of the base metric scores.
* @param baseScore baseScore or {@code null} for none
*/
public Cvssv3 setBaseScore(java.lang.Double baseScore) {
this.baseScore = baseScore;
return this;
}
/**
* This metric measures the impact to the confidentiality of the information resources managed by
* a software component due to a successfully exploited vulnerability.
* @return value or {@code null} for none
*/
public java.lang.String getConfidentialityImpact() {
return confidentialityImpact;
}
/**
* This metric measures the impact to the confidentiality of the information resources managed by
* a software component due to a successfully exploited vulnerability.
* @param confidentialityImpact confidentialityImpact or {@code null} for none
*/
public Cvssv3 setConfidentialityImpact(java.lang.String confidentialityImpact) {
this.confidentialityImpact = confidentialityImpact;
return this;
}
/**
* This metric measures the impact to integrity of a successfully exploited vulnerability.
* @return value or {@code null} for none
*/
public java.lang.String getIntegrityImpact() {
return integrityImpact;
}
/**
* This metric measures the impact to integrity of a successfully exploited vulnerability.
* @param integrityImpact integrityImpact or {@code null} for none
*/
public Cvssv3 setIntegrityImpact(java.lang.String integrityImpact) {
this.integrityImpact = integrityImpact;
return this;
}
/**
* This metric describes the level of privileges an attacker must possess before successfully
* exploiting the vulnerability.
* @return value or {@code null} for none
*/
public java.lang.String getPrivilegesRequired() {
return privilegesRequired;
}
/**
* This metric describes the level of privileges an attacker must possess before successfully
* exploiting the vulnerability.
* @param privilegesRequired privilegesRequired or {@code null} for none
*/
public Cvssv3 setPrivilegesRequired(java.lang.String privilegesRequired) {
this.privilegesRequired = privilegesRequired;
return this;
}
/**
* The Scope metric captures whether a vulnerability in one vulnerable component impacts resources
* in components beyond its security scope.
* @return value or {@code null} for none
*/
public java.lang.String getScope() {
return scope;
}
/**
* The Scope metric captures whether a vulnerability in one vulnerable component impacts resources
* in components beyond its security scope.
* @param scope scope or {@code null} for none
*/
public Cvssv3 setScope(java.lang.String scope) {
this.scope = scope;
return this;
}
/**
* This metric captures the requirement for a human user, other than the attacker, to participate
* in the successful compromise of the vulnerable component.
* @return value or {@code null} for none
*/
public java.lang.String getUserInteraction() {
return userInteraction;
}
/**
* This metric captures the requirement for a human user, other than the attacker, to participate
* in the successful compromise of the vulnerable component.
* @param userInteraction userInteraction or {@code null} for none
*/
public Cvssv3 setUserInteraction(java.lang.String userInteraction) {
this.userInteraction = userInteraction;
return this;
}
@Override
public Cvssv3 set(String fieldName, Object value) {
return (Cvssv3) super.set(fieldName, value);
}
@Override
public Cvssv3 clone() {
return (Cvssv3) super.clone();
}
}
© 2015 - 2024 Weber Informatics LLC | Privacy Policy