JFIF  x x C         C     "        } !1AQa "q2#BR$3br %&'()*456789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz        w !1AQ aq"2B #3Rbr{ gilour

File "VulnerabilityOccurrence.php"

Full Path: /home/palsarh/web/palsarh.in/public_html/vendor/google/apiclient-services/src/OnDemandScanning/VulnerabilityOccurrence.php
File size: 10 KB
MIME-type: text/x-php
Charset: utf-8

<?php
/*
 * Copyright 2014 Google Inc.
 *
 * Licensed under the Apache License, Version 2.0 (the "License"); you may not
 * use this file except in compliance with the License. You may obtain a copy of
 * the License at
 *
 * http://www.apache.org/licenses/LICENSE-2.0
 *
 * Unless required by applicable law or agreed to in writing, software
 * distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
 * WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the
 * License for the specific language governing permissions and limitations under
 * the License.
 */

namespace Google\Service\OnDemandScanning;

class VulnerabilityOccurrence extends \Google\Collection
{
  public const CVSS_VERSION_CVSS_VERSION_UNSPECIFIED = 'CVSS_VERSION_UNSPECIFIED';
  public const CVSS_VERSION_CVSS_VERSION_2 = 'CVSS_VERSION_2';
  public const CVSS_VERSION_CVSS_VERSION_3 = 'CVSS_VERSION_3';
  /**
   * Unknown.
   */
  public const EFFECTIVE_SEVERITY_SEVERITY_UNSPECIFIED = 'SEVERITY_UNSPECIFIED';
  /**
   * Minimal severity.
   */
  public const EFFECTIVE_SEVERITY_MINIMAL = 'MINIMAL';
  /**
   * Low severity.
   */
  public const EFFECTIVE_SEVERITY_LOW = 'LOW';
  /**
   * Medium severity.
   */
  public const EFFECTIVE_SEVERITY_MEDIUM = 'MEDIUM';
  /**
   * High severity.
   */
  public const EFFECTIVE_SEVERITY_HIGH = 'HIGH';
  /**
   * Critical severity.
   */
  public const EFFECTIVE_SEVERITY_CRITICAL = 'CRITICAL';
  /**
   * Unknown.
   */
  public const SEVERITY_SEVERITY_UNSPECIFIED = 'SEVERITY_UNSPECIFIED';
  /**
   * Minimal severity.
   */
  public const SEVERITY_MINIMAL = 'MINIMAL';
  /**
   * Low severity.
   */
  public const SEVERITY_LOW = 'LOW';
  /**
   * Medium severity.
   */
  public const SEVERITY_MEDIUM = 'MEDIUM';
  /**
   * High severity.
   */
  public const SEVERITY_HIGH = 'HIGH';
  /**
   * Critical severity.
   */
  public const SEVERITY_CRITICAL = 'CRITICAL';
  protected $collection_key = 'relatedUrls';
  /**
   * Output only. The CVSS score of this vulnerability. CVSS score is on a scale
   * of 0 - 10 where 0 indicates low severity and 10 indicates high severity.
   *
   * @var float
   */
  public $cvssScore;
  protected $cvssV2Type = CVSS::class;
  protected $cvssV2DataType = '';
  /**
   * Output only. CVSS version used to populate cvss_score and severity.
   *
   * @var string
   */
  public $cvssVersion;
  protected $cvssv3Type = CVSS::class;
  protected $cvssv3DataType = '';
  /**
   * The distro assigned severity for this vulnerability when it is available,
   * otherwise this is the note provider assigned severity. When there are
   * multiple PackageIssues for this vulnerability, they can have different
   * effective severities because some might be provided by the distro while
   * others are provided by the language ecosystem for a language pack. For this
   * reason, it is advised to use the effective severity on the PackageIssue
   * level. In the case where multiple PackageIssues have differing effective
   * severities, this field should be the highest severity for any of the
   * PackageIssues.
   *
   * @var string
   */
  public $effectiveSeverity;
  /**
   * Occurrence-specific extra details about the vulnerability.
   *
   * @var string
   */
  public $extraDetails;
  /**
   * Output only. Whether at least one of the affected packages has a fix
   * available.
   *
   * @var bool
   */
  public $fixAvailable;
  /**
   * Output only. A detailed description of this vulnerability.
   *
   * @var string
   */
  public $longDescription;
  protected $packageIssueType = PackageIssue::class;
  protected $packageIssueDataType = 'array';
  protected $relatedUrlsType = RelatedUrl::class;
  protected $relatedUrlsDataType = 'array';
  protected $riskType = Risk::class;
  protected $riskDataType = '';
  /**
   * Output only. The note provider assigned severity of this vulnerability.
   *
   * @var string
   */
  public $severity;
  /**
   * Output only. A one sentence description of this vulnerability.
   *
   * @var string
   */
  public $shortDescription;
  /**
   * The type of package; whether native or non native (e.g., ruby gems, node.js
   * packages, etc.).
   *
   * @var string
   */
  public $type;
  protected $vexAssessmentType = VexAssessment::class;
  protected $vexAssessmentDataType = '';

  /**
   * Output only. The CVSS score of this vulnerability. CVSS score is on a scale
   * of 0 - 10 where 0 indicates low severity and 10 indicates high severity.
   *
   * @param float $cvssScore
   */
  public function setCvssScore($cvssScore)
  {
    $this->cvssScore = $cvssScore;
  }
  /**
   * @return float
   */
  public function getCvssScore()
  {
    return $this->cvssScore;
  }
  /**
   * The cvss v2 score for the vulnerability.
   *
   * @param CVSS $cvssV2
   */
  public function setCvssV2(CVSS $cvssV2)
  {
    $this->cvssV2 = $cvssV2;
  }
  /**
   * @return CVSS
   */
  public function getCvssV2()
  {
    return $this->cvssV2;
  }
  /**
   * Output only. CVSS version used to populate cvss_score and severity.
   *
   * Accepted values: CVSS_VERSION_UNSPECIFIED, CVSS_VERSION_2, CVSS_VERSION_3
   *
   * @param self::CVSS_VERSION_* $cvssVersion
   */
  public function setCvssVersion($cvssVersion)
  {
    $this->cvssVersion = $cvssVersion;
  }
  /**
   * @return self::CVSS_VERSION_*
   */
  public function getCvssVersion()
  {
    return $this->cvssVersion;
  }
  /**
   * The cvss v3 score for the vulnerability.
   *
   * @param CVSS $cvssv3
   */
  public function setCvssv3(CVSS $cvssv3)
  {
    $this->cvssv3 = $cvssv3;
  }
  /**
   * @return CVSS
   */
  public function getCvssv3()
  {
    return $this->cvssv3;
  }
  /**
   * The distro assigned severity for this vulnerability when it is available,
   * otherwise this is the note provider assigned severity. When there are
   * multiple PackageIssues for this vulnerability, they can have different
   * effective severities because some might be provided by the distro while
   * others are provided by the language ecosystem for a language pack. For this
   * reason, it is advised to use the effective severity on the PackageIssue
   * level. In the case where multiple PackageIssues have differing effective
   * severities, this field should be the highest severity for any of the
   * PackageIssues.
   *
   * Accepted values: SEVERITY_UNSPECIFIED, MINIMAL, LOW, MEDIUM, HIGH, CRITICAL
   *
   * @param self::EFFECTIVE_SEVERITY_* $effectiveSeverity
   */
  public function setEffectiveSeverity($effectiveSeverity)
  {
    $this->effectiveSeverity = $effectiveSeverity;
  }
  /**
   * @return self::EFFECTIVE_SEVERITY_*
   */
  public function getEffectiveSeverity()
  {
    return $this->effectiveSeverity;
  }
  /**
   * Occurrence-specific extra details about the vulnerability.
   *
   * @param string $extraDetails
   */
  public function setExtraDetails($extraDetails)
  {
    $this->extraDetails = $extraDetails;
  }
  /**
   * @return string
   */
  public function getExtraDetails()
  {
    return $this->extraDetails;
  }
  /**
   * Output only. Whether at least one of the affected packages has a fix
   * available.
   *
   * @param bool $fixAvailable
   */
  public function setFixAvailable($fixAvailable)
  {
    $this->fixAvailable = $fixAvailable;
  }
  /**
   * @return bool
   */
  public function getFixAvailable()
  {
    return $this->fixAvailable;
  }
  /**
   * Output only. A detailed description of this vulnerability.
   *
   * @param string $longDescription
   */
  public function setLongDescription($longDescription)
  {
    $this->longDescription = $longDescription;
  }
  /**
   * @return string
   */
  public function getLongDescription()
  {
    return $this->longDescription;
  }
  /**
   * Required. The set of affected locations and their fixes (if available)
   * within the associated resource.
   *
   * @param PackageIssue[] $packageIssue
   */
  public function setPackageIssue($packageIssue)
  {
    $this->packageIssue = $packageIssue;
  }
  /**
   * @return PackageIssue[]
   */
  public function getPackageIssue()
  {
    return $this->packageIssue;
  }
  /**
   * Output only. URLs related to this vulnerability.
   *
   * @param RelatedUrl[] $relatedUrls
   */
  public function setRelatedUrls($relatedUrls)
  {
    $this->relatedUrls = $relatedUrls;
  }
  /**
   * @return RelatedUrl[]
   */
  public function getRelatedUrls()
  {
    return $this->relatedUrls;
  }
  /**
   * Risk information about the vulnerability, such as CISA, EPSS, etc.
   *
   * @param Risk $risk
   */
  public function setRisk(Risk $risk)
  {
    $this->risk = $risk;
  }
  /**
   * @return Risk
   */
  public function getRisk()
  {
    return $this->risk;
  }
  /**
   * Output only. The note provider assigned severity of this vulnerability.
   *
   * Accepted values: SEVERITY_UNSPECIFIED, MINIMAL, LOW, MEDIUM, HIGH, CRITICAL
   *
   * @param self::SEVERITY_* $severity
   */
  public function setSeverity($severity)
  {
    $this->severity = $severity;
  }
  /**
   * @return self::SEVERITY_*
   */
  public function getSeverity()
  {
    return $this->severity;
  }
  /**
   * Output only. A one sentence description of this vulnerability.
   *
   * @param string $shortDescription
   */
  public function setShortDescription($shortDescription)
  {
    $this->shortDescription = $shortDescription;
  }
  /**
   * @return string
   */
  public function getShortDescription()
  {
    return $this->shortDescription;
  }
  /**
   * The type of package; whether native or non native (e.g., ruby gems, node.js
   * packages, etc.).
   *
   * @param string $type
   */
  public function setType($type)
  {
    $this->type = $type;
  }
  /**
   * @return string
   */
  public function getType()
  {
    return $this->type;
  }
  /**
   * @param VexAssessment $vexAssessment
   */
  public function setVexAssessment(VexAssessment $vexAssessment)
  {
    $this->vexAssessment = $vexAssessment;
  }
  /**
   * @return VexAssessment
   */
  public function getVexAssessment()
  {
    return $this->vexAssessment;
  }
}

// Adding a class alias for backwards compatibility with the previous class name.
class_alias(VulnerabilityOccurrence::class, 'Google_Service_OnDemandScanning_VulnerabilityOccurrence');