All Downloads are FREE. Search and download functionalities are using the official Maven repository.

com.google.api.services.securitycenter.v1.model.GoogleCloudSecuritycenterV2Cvssv3 Maven / Gradle / Ivy

There is a newer version: v1-rev20241111-2.0.0
Show newest version
/*
 * Licensed under the Apache License, Version 2.0 (the "License"); you may not use this file except
 * in compliance with the License. You may obtain a copy of the License at
 *
 * http://www.apache.org/licenses/LICENSE-2.0
 *
 * Unless required by applicable law or agreed to in writing, software distributed under the License
 * is distributed on an "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express
 * or implied. See the License for the specific language governing permissions and limitations under
 * the License.
 */
/*
 * This code was generated by https://github.com/googleapis/google-api-java-client-services/
 * Modify at your own risk.
 */

package com.google.api.services.securitycenter.v1.model;

/**
 * Common Vulnerability Scoring System version 3.
 *
 * 

This is the Java data model class that specifies how to parse/serialize into the JSON that is * transmitted over HTTP when working with the Security Command Center API. For a detailed * explanation see: * https://developers.google.com/api-client-library/java/google-http-java-client/json *

* * @author Google, Inc. */ @SuppressWarnings("javadoc") public final class GoogleCloudSecuritycenterV2Cvssv3 extends com.google.api.client.json.GenericJson { /** * This metric describes the conditions beyond the attacker's control that must exist in order to * exploit the vulnerability. * The value may be {@code null}. */ @com.google.api.client.util.Key private java.lang.String attackComplexity; /** * Base Metrics Represents the intrinsic characteristics of a vulnerability that are constant over * time and across user environments. This metric reflects the context by which vulnerability * exploitation is possible. * The value may be {@code null}. */ @com.google.api.client.util.Key private java.lang.String attackVector; /** * This metric measures the impact to the availability of the impacted component resulting from a * successfully exploited vulnerability. * The value may be {@code null}. */ @com.google.api.client.util.Key private java.lang.String availabilityImpact; /** * The base score is a function of the base metric scores. * The value may be {@code null}. */ @com.google.api.client.util.Key private java.lang.Double baseScore; /** * This metric measures the impact to the confidentiality of the information resources managed by * a software component due to a successfully exploited vulnerability. * The value may be {@code null}. */ @com.google.api.client.util.Key private java.lang.String confidentialityImpact; /** * This metric measures the impact to integrity of a successfully exploited vulnerability. * The value may be {@code null}. */ @com.google.api.client.util.Key private java.lang.String integrityImpact; /** * This metric describes the level of privileges an attacker must possess before successfully * exploiting the vulnerability. * The value may be {@code null}. */ @com.google.api.client.util.Key private java.lang.String privilegesRequired; /** * The Scope metric captures whether a vulnerability in one vulnerable component impacts resources * in components beyond its security scope. * The value may be {@code null}. */ @com.google.api.client.util.Key private java.lang.String scope; /** * This metric captures the requirement for a human user, other than the attacker, to participate * in the successful compromise of the vulnerable component. * The value may be {@code null}. */ @com.google.api.client.util.Key private java.lang.String userInteraction; /** * This metric describes the conditions beyond the attacker's control that must exist in order to * exploit the vulnerability. * @return value or {@code null} for none */ public java.lang.String getAttackComplexity() { return attackComplexity; } /** * This metric describes the conditions beyond the attacker's control that must exist in order to * exploit the vulnerability. * @param attackComplexity attackComplexity or {@code null} for none */ public GoogleCloudSecuritycenterV2Cvssv3 setAttackComplexity(java.lang.String attackComplexity) { this.attackComplexity = attackComplexity; return this; } /** * Base Metrics Represents the intrinsic characteristics of a vulnerability that are constant over * time and across user environments. This metric reflects the context by which vulnerability * exploitation is possible. * @return value or {@code null} for none */ public java.lang.String getAttackVector() { return attackVector; } /** * Base Metrics Represents the intrinsic characteristics of a vulnerability that are constant over * time and across user environments. This metric reflects the context by which vulnerability * exploitation is possible. * @param attackVector attackVector or {@code null} for none */ public GoogleCloudSecuritycenterV2Cvssv3 setAttackVector(java.lang.String attackVector) { this.attackVector = attackVector; return this; } /** * This metric measures the impact to the availability of the impacted component resulting from a * successfully exploited vulnerability. * @return value or {@code null} for none */ public java.lang.String getAvailabilityImpact() { return availabilityImpact; } /** * This metric measures the impact to the availability of the impacted component resulting from a * successfully exploited vulnerability. * @param availabilityImpact availabilityImpact or {@code null} for none */ public GoogleCloudSecuritycenterV2Cvssv3 setAvailabilityImpact(java.lang.String availabilityImpact) { this.availabilityImpact = availabilityImpact; return this; } /** * The base score is a function of the base metric scores. * @return value or {@code null} for none */ public java.lang.Double getBaseScore() { return baseScore; } /** * The base score is a function of the base metric scores. * @param baseScore baseScore or {@code null} for none */ public GoogleCloudSecuritycenterV2Cvssv3 setBaseScore(java.lang.Double baseScore) { this.baseScore = baseScore; return this; } /** * This metric measures the impact to the confidentiality of the information resources managed by * a software component due to a successfully exploited vulnerability. * @return value or {@code null} for none */ public java.lang.String getConfidentialityImpact() { return confidentialityImpact; } /** * This metric measures the impact to the confidentiality of the information resources managed by * a software component due to a successfully exploited vulnerability. * @param confidentialityImpact confidentialityImpact or {@code null} for none */ public GoogleCloudSecuritycenterV2Cvssv3 setConfidentialityImpact(java.lang.String confidentialityImpact) { this.confidentialityImpact = confidentialityImpact; return this; } /** * This metric measures the impact to integrity of a successfully exploited vulnerability. * @return value or {@code null} for none */ public java.lang.String getIntegrityImpact() { return integrityImpact; } /** * This metric measures the impact to integrity of a successfully exploited vulnerability. * @param integrityImpact integrityImpact or {@code null} for none */ public GoogleCloudSecuritycenterV2Cvssv3 setIntegrityImpact(java.lang.String integrityImpact) { this.integrityImpact = integrityImpact; return this; } /** * This metric describes the level of privileges an attacker must possess before successfully * exploiting the vulnerability. * @return value or {@code null} for none */ public java.lang.String getPrivilegesRequired() { return privilegesRequired; } /** * This metric describes the level of privileges an attacker must possess before successfully * exploiting the vulnerability. * @param privilegesRequired privilegesRequired or {@code null} for none */ public GoogleCloudSecuritycenterV2Cvssv3 setPrivilegesRequired(java.lang.String privilegesRequired) { this.privilegesRequired = privilegesRequired; return this; } /** * The Scope metric captures whether a vulnerability in one vulnerable component impacts resources * in components beyond its security scope. * @return value or {@code null} for none */ public java.lang.String getScope() { return scope; } /** * The Scope metric captures whether a vulnerability in one vulnerable component impacts resources * in components beyond its security scope. * @param scope scope or {@code null} for none */ public GoogleCloudSecuritycenterV2Cvssv3 setScope(java.lang.String scope) { this.scope = scope; return this; } /** * This metric captures the requirement for a human user, other than the attacker, to participate * in the successful compromise of the vulnerable component. * @return value or {@code null} for none */ public java.lang.String getUserInteraction() { return userInteraction; } /** * This metric captures the requirement for a human user, other than the attacker, to participate * in the successful compromise of the vulnerable component. * @param userInteraction userInteraction or {@code null} for none */ public GoogleCloudSecuritycenterV2Cvssv3 setUserInteraction(java.lang.String userInteraction) { this.userInteraction = userInteraction; return this; } @Override public GoogleCloudSecuritycenterV2Cvssv3 set(String fieldName, Object value) { return (GoogleCloudSecuritycenterV2Cvssv3) super.set(fieldName, value); } @Override public GoogleCloudSecuritycenterV2Cvssv3 clone() { return (GoogleCloudSecuritycenterV2Cvssv3) super.clone(); } }




© 2015 - 2024 Weber Informatics LLC | Privacy Policy