Reference documentation and code samples for the Grafeas V1 API class Grafeas::V1::VulnerabilityNote.
A security vulnerability that can be found in resources.
Inherits
- Object
Extended By
- Google::Protobuf::MessageExts::ClassMethods
Includes
- Google::Protobuf::MessageExts
Methods
#cvss_score
def cvss_score() -> ::Float
Returns
- (::Float) — The CVSS score of this vulnerability. CVSS score is on a scale of 0 - 10 where 0 indicates low severity and 10 indicates high severity.
#cvss_score=
def cvss_score=(value) -> ::Float
Parameter
- value (::Float) — The CVSS score of this vulnerability. CVSS score is on a scale of 0 - 10 where 0 indicates low severity and 10 indicates high severity.
Returns
- (::Float) — The CVSS score of this vulnerability. CVSS score is on a scale of 0 - 10 where 0 indicates low severity and 10 indicates high severity.
#cvss_v3
def cvss_v3() -> ::Grafeas::V1::CVSSv3
Returns
- (::Grafeas::V1::CVSSv3) — The full description of the CVSSv3 for this vulnerability.
#cvss_v3=
def cvss_v3=(value) -> ::Grafeas::V1::CVSSv3
Parameter
- value (::Grafeas::V1::CVSSv3) — The full description of the CVSSv3 for this vulnerability.
Returns
- (::Grafeas::V1::CVSSv3) — The full description of the CVSSv3 for this vulnerability.
#details
def details() -> ::Array<::Grafeas::V1::VulnerabilityNote::Detail>
Returns
- (::Array<::Grafeas::V1::VulnerabilityNote::Detail>) — Details of all known distros and packages affected by this vulnerability.
#details=
def details=(value) -> ::Array<::Grafeas::V1::VulnerabilityNote::Detail>
Parameter
- value (::Array<::Grafeas::V1::VulnerabilityNote::Detail>) — Details of all known distros and packages affected by this vulnerability.
Returns
- (::Array<::Grafeas::V1::VulnerabilityNote::Detail>) — Details of all known distros and packages affected by this vulnerability.
#severity
def severity() -> ::Grafeas::V1::Severity
Returns
- (::Grafeas::V1::Severity) — The note provider assigned severity of this vulnerability.
#severity=
def severity=(value) -> ::Grafeas::V1::Severity
Parameter
- value (::Grafeas::V1::Severity) — The note provider assigned severity of this vulnerability.
Returns
- (::Grafeas::V1::Severity) — The note provider assigned severity of this vulnerability.
#source_update_time
def source_update_time() -> ::Google::Protobuf::Timestamp
Returns
- (::Google::Protobuf::Timestamp) — The time this information was last changed at the source. This is an upstream timestamp from the underlying information source - e.g. Ubuntu security tracker.
#source_update_time=
def source_update_time=(value) -> ::Google::Protobuf::Timestamp
Parameter
- value (::Google::Protobuf::Timestamp) — The time this information was last changed at the source. This is an upstream timestamp from the underlying information source - e.g. Ubuntu security tracker.
Returns
- (::Google::Protobuf::Timestamp) — The time this information was last changed at the source. This is an upstream timestamp from the underlying information source - e.g. Ubuntu security tracker.
#windows_details
def windows_details() -> ::Array<::Grafeas::V1::VulnerabilityNote::WindowsDetail>
Returns
- (::Array<::Grafeas::V1::VulnerabilityNote::WindowsDetail>) — Windows details get their own format because the information format and model don't match a normal detail. Specifically Windows updates are done as patches, thus Windows vulnerabilities really are a missing package, rather than a package being at an incorrect version.
#windows_details=
def windows_details=(value) -> ::Array<::Grafeas::V1::VulnerabilityNote::WindowsDetail>
Parameter
- value (::Array<::Grafeas::V1::VulnerabilityNote::WindowsDetail>) — Windows details get their own format because the information format and model don't match a normal detail. Specifically Windows updates are done as patches, thus Windows vulnerabilities really are a missing package, rather than a package being at an incorrect version.
Returns
- (::Array<::Grafeas::V1::VulnerabilityNote::WindowsDetail>) — Windows details get their own format because the information format and model don't match a normal detail. Specifically Windows updates are done as patches, thus Windows vulnerabilities really are a missing package, rather than a package being at an incorrect version.