com.google.api.services.securitycenter.v1.model.GoogleCloudSecuritycenterV2Cve Maven / Gradle / Ivy
/*
* Licensed under the Apache License, Version 2.0 (the "License"); you may not use this file except
* in compliance with the License. You may obtain a copy of the License at
*
* http://www.apache.org/licenses/LICENSE-2.0
*
* Unless required by applicable law or agreed to in writing, software distributed under the License
* is distributed on an "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express
* or implied. See the License for the specific language governing permissions and limitations under
* the License.
*/
/*
* This code was generated by https://github.com/googleapis/google-api-java-client-services/
* Modify at your own risk.
*/
package com.google.api.services.securitycenter.v1.model;
/**
* CVE stands for Common Vulnerabilities and Exposures. Information from the [CVE
* record](https://www.cve.org/ResourcesSupport/Glossary) that describes this vulnerability.
*
* This is the Java data model class that specifies how to parse/serialize into the JSON that is
* transmitted over HTTP when working with the Security Command Center API. For a detailed
* explanation see:
* https://developers.google.com/api-client-library/java/google-http-java-client/json
*
*
* @author Google, Inc.
*/
@SuppressWarnings("javadoc")
public final class GoogleCloudSecuritycenterV2Cve extends com.google.api.client.json.GenericJson {
/**
* Describe Common Vulnerability Scoring System specified at
* https://www.first.org/cvss/v3.1/specification-document
* The value may be {@code null}.
*/
@com.google.api.client.util.Key
private GoogleCloudSecuritycenterV2Cvssv3 cvssv3;
/**
* Date the first publicly available exploit or PoC was released.
* The value may be {@code null}.
*/
@com.google.api.client.util.Key
private String exploitReleaseDate;
/**
* The exploitation activity of the vulnerability in the wild.
* The value may be {@code null}.
*/
@com.google.api.client.util.Key
private java.lang.String exploitationActivity;
/**
* Date of the earliest known exploitation.
* The value may be {@code null}.
*/
@com.google.api.client.util.Key
private String firstExploitationDate;
/**
* The unique identifier for the vulnerability. e.g. CVE-2021-34527
* The value may be {@code null}.
*/
@com.google.api.client.util.Key
private java.lang.String id;
/**
* The potential impact of the vulnerability if it was to be exploited.
* The value may be {@code null}.
*/
@com.google.api.client.util.Key
private java.lang.String impact;
/**
* Whether or not the vulnerability has been observed in the wild.
* The value may be {@code null}.
*/
@com.google.api.client.util.Key
private java.lang.Boolean observedInTheWild;
/**
* Additional information about the CVE. e.g. https://cve.mitre.org/cgi-
* bin/cvename.cgi?name=CVE-2021-34527
* The value may be {@code null}.
*/
@com.google.api.client.util.Key
private java.util.List references;
/**
* Whether upstream fix is available for the CVE.
* The value may be {@code null}.
*/
@com.google.api.client.util.Key
private java.lang.Boolean upstreamFixAvailable;
/**
* Whether or not the vulnerability was zero day when the finding was published.
* The value may be {@code null}.
*/
@com.google.api.client.util.Key
private java.lang.Boolean zeroDay;
/**
* Describe Common Vulnerability Scoring System specified at
* https://www.first.org/cvss/v3.1/specification-document
* @return value or {@code null} for none
*/
public GoogleCloudSecuritycenterV2Cvssv3 getCvssv3() {
return cvssv3;
}
/**
* Describe Common Vulnerability Scoring System specified at
* https://www.first.org/cvss/v3.1/specification-document
* @param cvssv3 cvssv3 or {@code null} for none
*/
public GoogleCloudSecuritycenterV2Cve setCvssv3(GoogleCloudSecuritycenterV2Cvssv3 cvssv3) {
this.cvssv3 = cvssv3;
return this;
}
/**
* Date the first publicly available exploit or PoC was released.
* @return value or {@code null} for none
*/
public String getExploitReleaseDate() {
return exploitReleaseDate;
}
/**
* Date the first publicly available exploit or PoC was released.
* @param exploitReleaseDate exploitReleaseDate or {@code null} for none
*/
public GoogleCloudSecuritycenterV2Cve setExploitReleaseDate(String exploitReleaseDate) {
this.exploitReleaseDate = exploitReleaseDate;
return this;
}
/**
* The exploitation activity of the vulnerability in the wild.
* @return value or {@code null} for none
*/
public java.lang.String getExploitationActivity() {
return exploitationActivity;
}
/**
* The exploitation activity of the vulnerability in the wild.
* @param exploitationActivity exploitationActivity or {@code null} for none
*/
public GoogleCloudSecuritycenterV2Cve setExploitationActivity(java.lang.String exploitationActivity) {
this.exploitationActivity = exploitationActivity;
return this;
}
/**
* Date of the earliest known exploitation.
* @return value or {@code null} for none
*/
public String getFirstExploitationDate() {
return firstExploitationDate;
}
/**
* Date of the earliest known exploitation.
* @param firstExploitationDate firstExploitationDate or {@code null} for none
*/
public GoogleCloudSecuritycenterV2Cve setFirstExploitationDate(String firstExploitationDate) {
this.firstExploitationDate = firstExploitationDate;
return this;
}
/**
* The unique identifier for the vulnerability. e.g. CVE-2021-34527
* @return value or {@code null} for none
*/
public java.lang.String getId() {
return id;
}
/**
* The unique identifier for the vulnerability. e.g. CVE-2021-34527
* @param id id or {@code null} for none
*/
public GoogleCloudSecuritycenterV2Cve setId(java.lang.String id) {
this.id = id;
return this;
}
/**
* The potential impact of the vulnerability if it was to be exploited.
* @return value or {@code null} for none
*/
public java.lang.String getImpact() {
return impact;
}
/**
* The potential impact of the vulnerability if it was to be exploited.
* @param impact impact or {@code null} for none
*/
public GoogleCloudSecuritycenterV2Cve setImpact(java.lang.String impact) {
this.impact = impact;
return this;
}
/**
* Whether or not the vulnerability has been observed in the wild.
* @return value or {@code null} for none
*/
public java.lang.Boolean getObservedInTheWild() {
return observedInTheWild;
}
/**
* Whether or not the vulnerability has been observed in the wild.
* @param observedInTheWild observedInTheWild or {@code null} for none
*/
public GoogleCloudSecuritycenterV2Cve setObservedInTheWild(java.lang.Boolean observedInTheWild) {
this.observedInTheWild = observedInTheWild;
return this;
}
/**
* Additional information about the CVE. e.g. https://cve.mitre.org/cgi-
* bin/cvename.cgi?name=CVE-2021-34527
* @return value or {@code null} for none
*/
public java.util.List getReferences() {
return references;
}
/**
* Additional information about the CVE. e.g. https://cve.mitre.org/cgi-
* bin/cvename.cgi?name=CVE-2021-34527
* @param references references or {@code null} for none
*/
public GoogleCloudSecuritycenterV2Cve setReferences(java.util.List references) {
this.references = references;
return this;
}
/**
* Whether upstream fix is available for the CVE.
* @return value or {@code null} for none
*/
public java.lang.Boolean getUpstreamFixAvailable() {
return upstreamFixAvailable;
}
/**
* Whether upstream fix is available for the CVE.
* @param upstreamFixAvailable upstreamFixAvailable or {@code null} for none
*/
public GoogleCloudSecuritycenterV2Cve setUpstreamFixAvailable(java.lang.Boolean upstreamFixAvailable) {
this.upstreamFixAvailable = upstreamFixAvailable;
return this;
}
/**
* Whether or not the vulnerability was zero day when the finding was published.
* @return value or {@code null} for none
*/
public java.lang.Boolean getZeroDay() {
return zeroDay;
}
/**
* Whether or not the vulnerability was zero day when the finding was published.
* @param zeroDay zeroDay or {@code null} for none
*/
public GoogleCloudSecuritycenterV2Cve setZeroDay(java.lang.Boolean zeroDay) {
this.zeroDay = zeroDay;
return this;
}
@Override
public GoogleCloudSecuritycenterV2Cve set(String fieldName, Object value) {
return (GoogleCloudSecuritycenterV2Cve) super.set(fieldName, value);
}
@Override
public GoogleCloudSecuritycenterV2Cve clone() {
return (GoogleCloudSecuritycenterV2Cve) super.clone();
}
}
© 2015 - 2024 Weber Informatics LLC | Privacy Policy