/
Vulnerability.php
124 lines (99 loc) · 3.38 KB
/
Vulnerability.php
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
<?php
# Generated by the protocol buffer compiler. DO NOT EDIT!
# source: grafeas/v1/vulnerability.proto
namespace GPBMetadata\Grafeas\V1;
class Vulnerability
{
public static $is_initialized = false;
public static function initOnce() {
$pool = \Google\Protobuf\Internal\DescriptorPool::getGeneratedPool();
if (static::$is_initialized == true) {
return;
}
\GPBMetadata\Google\Api\FieldBehavior::initOnce();
\GPBMetadata\Google\Protobuf\Timestamp::initOnce();
\GPBMetadata\Grafeas\V1\Common::initOnce();
\GPBMetadata\Grafeas\V1\Cvss::initOnce();
\GPBMetadata\Grafeas\V1\Package::initOnce();
\GPBMetadata\Grafeas\V1\Severity::initOnce();
\GPBMetadata\Grafeas\V1\Vex::initOnce();
$pool->internalAddGeneratedFile(
'
ø
grafeas/v1/vulnerability.proto
grafeas.v1google/protobuf/timestamp.protografeas/v1/common.protografeas/v1/cvss.protografeas/v1/package.protografeas/v1/severity.protografeas/v1/vex.proto"ì
VulnerabilityNote
cvss_score (&
severity (2.grafeas.v1.Severity5
details (2$.grafeas.v1.VulnerabilityNote.Detail#
cvss_v3 (2.grafeas.v1.CVSSv3D
windows_details (2+.grafeas.v1.VulnerabilityNote.WindowsDetail6
source_update_time (2.google.protobuf.Timestamp-
cvss_version (2.grafeas.v1.CVSSVersion!
cvss_v2 (2.grafeas.v1.CVSS
Detail
severity_name (
description (
package_type (
affected_cpe_uri (
affected_package ( 3
affected_version_start (2.grafeas.v1.Version1
affected_version_end (2.grafeas.v1.Version
fixed_cpe_uri (
fixed_package ( *
fixed_version
(2.grafeas.v1.Version
is_obsolete (6
source_update_time (2.google.protobuf.Timestamp
source (
vendor ( ¾
WindowsDetail
cpe_uri (
name (
description ( M
fixing_kbs (29.grafeas.v1.VulnerabilityNote.WindowsDetail.KnowledgeBase*
KnowledgeBase
name (
url ( "ã
VulnerabilityOccurrence
type ( &
severity (2.grafeas.v1.Severity
cvss_score (
cvssv3
(2.grafeas.v1.CVSSG
package_issue (20.grafeas.v1.VulnerabilityOccurrence.PackageIssue
short_description (
long_description ( ,
related_urls (2.grafeas.v1.RelatedUrl0
effective_severity (2.grafeas.v1.Severity
fix_available (-
cvss_version (2.grafeas.v1.CVSSVersion!
cvss_v2 (2.grafeas.v1.CVSSI
vex_assessment (21.grafeas.v1.VulnerabilityOccurrence.VexAssessmentà
PackageIssue
affected_cpe_uri (
affected_package ( -
affected_version (2.grafeas.v1.Version
fixed_cpe_uri (
fixed_package ( *
fixed_version (2.grafeas.v1.Version
fix_available (
package_type ( 5
effective_severity (2.grafeas.v1.SeverityBàA/
file_location
(2.grafeas.v1.FileLocationæ
VexAssessment
cve ( ,
related_uris (2.grafeas.v1.RelatedUrl
note_name ( G
state (28.grafeas.v1.VulnerabilityAssessmentNote.Assessment.State
impacts ( T
remediations (2>.grafeas.v1.VulnerabilityAssessmentNote.Assessment.RemediationW
justification (2@.grafeas.v1.VulnerabilityAssessmentNote.Assessment.JustificationBQ
io.grafeas.v1PZ8google.golang.org/genproto/googleapis/grafeas/v1;grafeas¢GRAbproto3'
, true);
static::$is_initialized = true;
}
}