Reference documentation and code samples for the Cloud OS Config V1alpha API class Google::Cloud::OsConfig::V1alpha::CVSSv3.
Common Vulnerability Scoring System version 3. For details, see https://www.first.org/cvss/specification-document
Inherits
- Object
Extended By
- Google::Protobuf::MessageExts::ClassMethods
Includes
- Google::Protobuf::MessageExts
Methods
#attack_complexity
def attack_complexity() -> ::Google::Cloud::OsConfig::V1alpha::CVSSv3::AttackComplexity
Returns
- (::Google::Cloud::OsConfig::V1alpha::CVSSv3::AttackComplexity) — This metric describes the conditions beyond the attacker's control that must exist in order to exploit the vulnerability.
#attack_complexity=
def attack_complexity=(value) -> ::Google::Cloud::OsConfig::V1alpha::CVSSv3::AttackComplexity
Parameter
- value (::Google::Cloud::OsConfig::V1alpha::CVSSv3::AttackComplexity) — This metric describes the conditions beyond the attacker's control that must exist in order to exploit the vulnerability.
Returns
- (::Google::Cloud::OsConfig::V1alpha::CVSSv3::AttackComplexity) — This metric describes the conditions beyond the attacker's control that must exist in order to exploit the vulnerability.
#attack_vector
def attack_vector() -> ::Google::Cloud::OsConfig::V1alpha::CVSSv3::AttackVector
Returns
- (::Google::Cloud::OsConfig::V1alpha::CVSSv3::AttackVector) — This metric reflects the context by which vulnerability exploitation is possible.
#attack_vector=
def attack_vector=(value) -> ::Google::Cloud::OsConfig::V1alpha::CVSSv3::AttackVector
Parameter
- value (::Google::Cloud::OsConfig::V1alpha::CVSSv3::AttackVector) — This metric reflects the context by which vulnerability exploitation is possible.
Returns
- (::Google::Cloud::OsConfig::V1alpha::CVSSv3::AttackVector) — This metric reflects the context by which vulnerability exploitation is possible.
#availability_impact
def availability_impact() -> ::Google::Cloud::OsConfig::V1alpha::CVSSv3::Impact
Returns
- (::Google::Cloud::OsConfig::V1alpha::CVSSv3::Impact) — This metric measures the impact to the availability of the impacted component resulting from a successfully exploited vulnerability.
#availability_impact=
def availability_impact=(value) -> ::Google::Cloud::OsConfig::V1alpha::CVSSv3::Impact
Parameter
- value (::Google::Cloud::OsConfig::V1alpha::CVSSv3::Impact) — This metric measures the impact to the availability of the impacted component resulting from a successfully exploited vulnerability.
Returns
- (::Google::Cloud::OsConfig::V1alpha::CVSSv3::Impact) — This metric measures the impact to the availability of the impacted component resulting from a successfully exploited vulnerability.
#base_score
def base_score() -> ::Float
Returns
- (::Float) — The base score is a function of the base metric scores. https://www.first.org/cvss/specification-document#Base-Metrics
#base_score=
def base_score=(value) -> ::Float
Parameter
- value (::Float) — The base score is a function of the base metric scores. https://www.first.org/cvss/specification-document#Base-Metrics
Returns
- (::Float) — The base score is a function of the base metric scores. https://www.first.org/cvss/specification-document#Base-Metrics
#confidentiality_impact
def confidentiality_impact() -> ::Google::Cloud::OsConfig::V1alpha::CVSSv3::Impact
Returns
- (::Google::Cloud::OsConfig::V1alpha::CVSSv3::Impact) — This metric measures the impact to the confidentiality of the information resources managed by a software component due to a successfully exploited vulnerability.
#confidentiality_impact=
def confidentiality_impact=(value) -> ::Google::Cloud::OsConfig::V1alpha::CVSSv3::Impact
Parameter
- value (::Google::Cloud::OsConfig::V1alpha::CVSSv3::Impact) — This metric measures the impact to the confidentiality of the information resources managed by a software component due to a successfully exploited vulnerability.
Returns
- (::Google::Cloud::OsConfig::V1alpha::CVSSv3::Impact) — This metric measures the impact to the confidentiality of the information resources managed by a software component due to a successfully exploited vulnerability.
#exploitability_score
def exploitability_score() -> ::Float
Returns
- (::Float) — The Exploitability sub-score equation is derived from the Base Exploitability metrics. https://www.first.org/cvss/specification-document#2-1-Exploitability-Metrics
#exploitability_score=
def exploitability_score=(value) -> ::Float
Parameter
- value (::Float) — The Exploitability sub-score equation is derived from the Base Exploitability metrics. https://www.first.org/cvss/specification-document#2-1-Exploitability-Metrics
Returns
- (::Float) — The Exploitability sub-score equation is derived from the Base Exploitability metrics. https://www.first.org/cvss/specification-document#2-1-Exploitability-Metrics
#impact_score
def impact_score() -> ::Float
Returns
- (::Float) — The Impact sub-score equation is derived from the Base Impact metrics.
#impact_score=
def impact_score=(value) -> ::Float
Parameter
- value (::Float) — The Impact sub-score equation is derived from the Base Impact metrics.
Returns
- (::Float) — The Impact sub-score equation is derived from the Base Impact metrics.
#integrity_impact
def integrity_impact() -> ::Google::Cloud::OsConfig::V1alpha::CVSSv3::Impact
Returns
- (::Google::Cloud::OsConfig::V1alpha::CVSSv3::Impact) — This metric measures the impact to integrity of a successfully exploited vulnerability.
#integrity_impact=
def integrity_impact=(value) -> ::Google::Cloud::OsConfig::V1alpha::CVSSv3::Impact
Parameter
- value (::Google::Cloud::OsConfig::V1alpha::CVSSv3::Impact) — This metric measures the impact to integrity of a successfully exploited vulnerability.
Returns
- (::Google::Cloud::OsConfig::V1alpha::CVSSv3::Impact) — This metric measures the impact to integrity of a successfully exploited vulnerability.
#privileges_required
def privileges_required() -> ::Google::Cloud::OsConfig::V1alpha::CVSSv3::PrivilegesRequired
Returns
- (::Google::Cloud::OsConfig::V1alpha::CVSSv3::PrivilegesRequired) — This metric describes the level of privileges an attacker must possess before successfully exploiting the vulnerability.
#privileges_required=
def privileges_required=(value) -> ::Google::Cloud::OsConfig::V1alpha::CVSSv3::PrivilegesRequired
Parameter
- value (::Google::Cloud::OsConfig::V1alpha::CVSSv3::PrivilegesRequired) — This metric describes the level of privileges an attacker must possess before successfully exploiting the vulnerability.
Returns
- (::Google::Cloud::OsConfig::V1alpha::CVSSv3::PrivilegesRequired) — This metric describes the level of privileges an attacker must possess before successfully exploiting the vulnerability.
#scope
def scope() -> ::Google::Cloud::OsConfig::V1alpha::CVSSv3::Scope
Returns
- (::Google::Cloud::OsConfig::V1alpha::CVSSv3::Scope) — The Scope metric captures whether a vulnerability in one vulnerable component impacts resources in components beyond its security scope.
#scope=
def scope=(value) -> ::Google::Cloud::OsConfig::V1alpha::CVSSv3::Scope
Parameter
- value (::Google::Cloud::OsConfig::V1alpha::CVSSv3::Scope) — The Scope metric captures whether a vulnerability in one vulnerable component impacts resources in components beyond its security scope.
Returns
- (::Google::Cloud::OsConfig::V1alpha::CVSSv3::Scope) — The Scope metric captures whether a vulnerability in one vulnerable component impacts resources in components beyond its security scope.
#user_interaction
def user_interaction() -> ::Google::Cloud::OsConfig::V1alpha::CVSSv3::UserInteraction
Returns
- (::Google::Cloud::OsConfig::V1alpha::CVSSv3::UserInteraction) — This metric captures the requirement for a human user, other than the attacker, to participate in the successful compromise of the vulnerable component.
#user_interaction=
def user_interaction=(value) -> ::Google::Cloud::OsConfig::V1alpha::CVSSv3::UserInteraction
Parameter
- value (::Google::Cloud::OsConfig::V1alpha::CVSSv3::UserInteraction) — This metric captures the requirement for a human user, other than the attacker, to participate in the successful compromise of the vulnerable component.
Returns
- (::Google::Cloud::OsConfig::V1alpha::CVSSv3::UserInteraction) — This metric captures the requirement for a human user, other than the attacker, to participate in the successful compromise of the vulnerable component.