📂 File Browser

AgentAI/vendor/google/apiclient-services/src/ThreatIntelligenceService
🌙 Dark Mode
🎯 Quick Launch:

📁 Directories

📁 Resource/ 🔓 Open

📄 Files

🐘 AffectedSoftware.php
▶ Open 📄 View Source
🐘 Alert.php
▶ Open 📄 View Source
🐘 AlertDetail.php
▶ Open 📄 View Source
🐘 AlertDocument.php
▶ Open 📄 View Source
🐘 AlertDocumentTranslation.php
▶ Open 📄 View Source
🐘 AssetDiscoveryConfig.php
▶ Open 📄 View Source
🐘 AssetDiscoverySeed.php
▶ Open 📄 View Source
🐘 Association.php
▶ Open 📄 View Source
🐘 Audit.php
▶ Open 📄 View Source
🐘 CompromisedCredentialsFindingDetail.php
▶ Open 📄 View Source
🐘 Configuration.php
▶ Open 📄 View Source
🐘 ConfigurationDetail.php
▶ Open 📄 View Source
🐘 ConfigurationRevision.php
▶ Open 📄 View Source
🐘 CustomerProfileCitation.php
▶ Open 📄 View Source
🐘 CustomerProfileCitedString.php
▶ Open 📄 View Source
🐘 CustomerProfileCompany.php
▶ Open 📄 View Source
🐘 CustomerProfileConfig.php
▶ Open 📄 View Source
🐘 CustomerProfileContactInfo.php
▶ Open 📄 View Source
🐘 CustomerProfileIndustry.php
▶ Open 📄 View Source
🐘 CustomerProfileLocation.php
▶ Open 📄 View Source
🐘 CustomerProfilePerson.php
▶ Open 📄 View Source
🐘 CustomerProfileProduct.php
▶ Open 📄 View Source
🐘 CustomerProfileSecurityConsiderations.php
▶ Open 📄 View Source
🐘 CustomerProfileSummary.php
▶ Open 📄 View Source
🐘 CustomerProfileWebPresence.php
▶ Open 📄 View Source
🐘 DataLeakAlertDetail.php
▶ Open 📄 View Source
🐘 DataLeakFindingDetail.php
▶ Open 📄 View Source
🐘 DomainMonitoringConfig.php
▶ Open 📄 View Source
🐘 DomainMonitoringDomain.php
▶ Open 📄 View Source
🐘 EntityProfile.php
▶ Open 📄 View Source
🐘 EnumerateAlertFacetsResponse.php
▶ Open 📄 View Source
🐘 Evidence.php
▶ Open 📄 View Source
🐘 Facet.php
▶ Open 📄 View Source
🐘 FacetCount.php
▶ Open 📄 View Source
🐘 Finding.php
▶ Open 📄 View Source
🐘 FindingDetail.php
▶ Open 📄 View Source
🐘 GenerateOrgProfileConfigurationRequest.php
▶ Open 📄 View Source
🐘 InbandVulnerability.php
▶ Open 📄 View Source
🐘 InbandVulnerabilityFindingDetail.php
▶ Open 📄 View Source
🐘 InitialAccessBrokerAlertDetail.php
▶ Open 📄 View Source
🐘 InitialAccessBrokerConfig.php
▶ Open 📄 View Source
🐘 InitialAccessBrokerFindingDetail.php
▶ Open 📄 View Source
🐘 InsiderThreatAlertDetail.php
▶ Open 📄 View Source
🐘 InsiderThreatFindingDetail.php
▶ Open 📄 View Source
🐘 ListAlertsResponse.php
▶ Open 📄 View Source
🐘 ListConfigurationRevisionsResponse.php
▶ Open 📄 View Source
🐘 ListConfigurationsResponse.php
▶ Open 📄 View Source
🐘 ListFindingsResponse.php
▶ Open 📄 View Source
🐘 MarkAlertAsBenignRequest.php
▶ Open 📄 View Source
🐘 MarkAlertAsDuplicateRequest.php
▶ Open 📄 View Source
🐘 MarkAlertAsEscalatedRequest.php
▶ Open 📄 View Source
🐘 MarkAlertAsFalsePositiveRequest.php
▶ Open 📄 View Source
🐘 MarkAlertAsNotActionableRequest.php
▶ Open 📄 View Source
🐘 MarkAlertAsReadRequest.php
▶ Open 📄 View Source
🐘 MarkAlertAsResolvedRequest.php
▶ Open 📄 View Source
🐘 MarkAlertAsTrackedExternallyRequest.php
▶ Open 📄 View Source
🐘 MarkAlertAsTriagedRequest.php
▶ Open 📄 View Source
🐘 MisconfigurationFindingDetail.php
▶ Open 📄 View Source
🐘 MisconfigurationMetadata.php
▶ Open 📄 View Source
🐘 MisconfigurationReference.php
▶ Open 📄 View Source
🐘 Operation.php
▶ Open 📄 View Source
🐘 PriorityAnalysis.php
▶ Open 📄 View Source
🐘 RefreshAlertUriStatusRequest.php
▶ Open 📄 View Source
🐘 RefreshAlertUriStatusResponse.php
▶ Open 📄 View Source
🐘 RelevanceAnalysis.php
▶ Open 📄 View Source
🐘 ReportAlertUriRequest.php
▶ Open 📄 View Source
🐘 ReportAlertUriResponse.php
▶ Open 📄 View Source
🐘 SearchFindingsResponse.php
▶ Open 📄 View Source
🐘 SeverityAnalysis.php
▶ Open 📄 View Source
🐘 Status.php
▶ Open 📄 View Source
🐘 SuspiciousDomainAlertDetail.php
▶ Open 📄 View Source
🐘 SuspiciousDomainDnsDetails.php
▶ Open 📄 View Source
🐘 SuspiciousDomainDnsRecord.php
▶ Open 📄 View Source
🐘 SuspiciousDomainFindingDetail.php
▶ Open 📄 View Source
🐘 SuspiciousDomainGtiDetails.php
▶ Open 📄 View Source
🐘 SuspiciousDomainWhoIsDetails.php
▶ Open 📄 View Source
🐘 TargetTechnologyAlertDetail.php
▶ Open 📄 View Source
🐘 TargetTechnologyFindingDetail.php
▶ Open 📄 View Source
🐘 TechnologyWatchListAlertThreshold.php
▶ Open 📄 View Source
🐘 TechnologyWatchListConfig.php
▶ Open 📄 View Source
🐘 UpsertConfigurationResponse.php
▶ Open 📄 View Source
🐘 VulnerabilityMatch.php
▶ Open 📄 View Source

📄 Source: InbandVulnerability.php

<?php
/*
 * Copyright 2014 Google Inc.
 *
 * Licensed under the Apache License, Version 2.0 (the "License"); you may not
 * use this file except in compliance with the License. You may obtain a copy of
 * the License at
 *
 * http://www.apache.org/licenses/LICENSE-2.0
 *
 * Unless required by applicable law or agreed to in writing, software
 * distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
 * WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the
 * License for the specific language governing permissions and limitations under
 * the License.
 */

namespace Google\Service\ThreatIntelligenceService;

class InbandVulnerability extends \Google\Collection
{
  protected $collection_key = 'referenceUrls';
  protected $affectedSoftwareType = AffectedSoftware::class;
  protected $affectedSoftwareDataType = 'array';
  /**
   * Optional. The authors of the vulnerability detection.
   *
   * @var string[]
   */
  public $authors;
  /**
   * Required. The CVE ID of the vulnerability.
   *
   * @var string
   */
  public $cveId;
  /**
   * Required. The CVSS V3.1 score (Base score)for the vulnerability. ( )
   *
   * @var float
   */
  public $cvssV31Score;
  /**
   * Optional. Temporal CVSS V3.1 score for the vulnerability.
   *
   * @var float
   */
  public $cvssV31ScoreTemporal;
  /**
   * Optional. The human readable description. This can be basic HTML formatted
   * text.
   *
   * @var string
   */
  public $description;
  /**
   * Optional. The date the vulnerability was first disclosed.
   *
   * @var string
   */
  public $disclosureTime;
  /**
   * Optional. Exploitation state of the vulnerability, for example "Available".
   *
   * @var string
   */
  public $exploitationState;
  /**
   * Required. The external ID of the vulnerability.
   *
   * @var string
   */
  public $externalVulnerabilityId;
  /**
   * Optional. Whether this is exploited in the wild.
   *
   * @var bool
   */
  public $isExploitedWild;
  /**
   * Optional. Reference URLs to the vulnerability.
   *
   * @var string[]
   */
  public $referenceUrls;
  /**
   * Optional. The human readable remediation recommendation. This can be basic
   * HTML formatted text.
   *
   * @var string
   */
  public $remediation;
  /**
   * Optional. Risk rating for the vulnerability, for example "High".
   *
   * @var string
   */
  public $riskRating;
  /**
   * Optional. Human readable name for the vulnerability.
   *
   * @var string
   */
  public $title;

  /**
   * Optional. The software that is affected by the vulnerability.
   *
   * @param AffectedSoftware[] $affectedSoftware
   */
  public function setAffectedSoftware($affectedSoftware)
  {
    $this->affectedSoftware = $affectedSoftware;
  }
  /**
   * @return AffectedSoftware[]
   */
  public function getAffectedSoftware()
  {
    return $this->affectedSoftware;
  }
  /**
   * Optional. The authors of the vulnerability detection.
   *
   * @param string[] $authors
   */
  public function setAuthors($authors)
  {
    $this->authors = $authors;
  }
  /**
   * @return string[]
   */
  public function getAuthors()
  {
    return $this->authors;
  }
  /**
   * Required. The CVE ID of the vulnerability.
   *
   * @param string $cveId
   */
  public function setCveId($cveId)
  {
    $this->cveId = $cveId;
  }
  /**
   * @return string
   */
  public function getCveId()
  {
    return $this->cveId;
  }
  /**
   * Required. The CVSS V3.1 score (Base score)for the vulnerability. ( )
   *
   * @param float $cvssV31Score
   */
  public function setCvssV31Score($cvssV31Score)
  {
    $this->cvssV31Score = $cvssV31Score;
  }
  /**
   * @return float
   */
  public function getCvssV31Score()
  {
    return $this->cvssV31Score;
  }
  /**
   * Optional. Temporal CVSS V3.1 score for the vulnerability.
   *
   * @param float $cvssV31ScoreTemporal
   */
  public function setCvssV31ScoreTemporal($cvssV31ScoreTemporal)
  {
    $this->cvssV31ScoreTemporal = $cvssV31ScoreTemporal;
  }
  /**
   * @return float
   */
  public function getCvssV31ScoreTemporal()
  {
    return $this->cvssV31ScoreTemporal;
  }
  /**
   * Optional. The human readable description. This can be basic HTML formatted
   * text.
   *
   * @param string $description
   */
  public function setDescription($description)
  {
    $this->description = $description;
  }
  /**
   * @return string
   */
  public function getDescription()
  {
    return $this->description;
  }
  /**
   * Optional. The date the vulnerability was first disclosed.
   *
   * @param string $disclosureTime
   */
  public function setDisclosureTime($disclosureTime)
  {
    $this->disclosureTime = $disclosureTime;
  }
  /**
   * @return string
   */
  public function getDisclosureTime()
  {
    return $this->disclosureTime;
  }
  /**
   * Optional. Exploitation state of the vulnerability, for example "Available".
   *
   * @param string $exploitationState
   */
  public function setExploitationState($exploitationState)
  {
    $this->exploitationState = $exploitationState;
  }
  /**
   * @return string
   */
  public function getExploitationState()
  {
    return $this->exploitationState;
  }
  /**
   * Required. The external ID of the vulnerability.
   *
   * @param string $externalVulnerabilityId
   */
  public function setExternalVulnerabilityId($externalVulnerabilityId)
  {
    $this->externalVulnerabilityId = $externalVulnerabilityId;
  }
  /**
   * @return string
   */
  public function getExternalVulnerabilityId()
  {
    return $this->externalVulnerabilityId;
  }
  /**
   * Optional. Whether this is exploited in the wild.
   *
   * @param bool $isExploitedWild
   */
  public function setIsExploitedWild($isExploitedWild)
  {
    $this->isExploitedWild = $isExploitedWild;
  }
  /**
   * @return bool
   */
  public function getIsExploitedWild()
  {
    return $this->isExploitedWild;
  }
  /**
   * Optional. Reference URLs to the vulnerability.
   *
   * @param string[] $referenceUrls
   */
  public function setReferenceUrls($referenceUrls)
  {
    $this->referenceUrls = $referenceUrls;
  }
  /**
   * @return string[]
   */
  public function getReferenceUrls()
  {
    return $this->referenceUrls;
  }
  /**
   * Optional. The human readable remediation recommendation. This can be basic
   * HTML formatted text.
   *
   * @param string $remediation
   */
  public function setRemediation($remediation)
  {
    $this->remediation = $remediation;
  }
  /**
   * @return string
   */
  public function getRemediation()
  {
    return $this->remediation;
  }
  /**
   * Optional. Risk rating for the vulnerability, for example "High".
   *
   * @param string $riskRating
   */
  public function setRiskRating($riskRating)
  {
    $this->riskRating = $riskRating;
  }
  /**
   * @return string
   */
  public function getRiskRating()
  {
    return $this->riskRating;
  }
  /**
   * Optional. Human readable name for the vulnerability.
   *
   * @param string $title
   */
  public function setTitle($title)
  {
    $this->title = $title;
  }
  /**
   * @return string
   */
  public function getTitle()
  {
    return $this->title;
  }
}

// Adding a class alias for backwards compatibility with the previous class name.
class_alias(InbandVulnerability::class, 'Google_Service_ThreatIntelligenceService_InbandVulnerability');
← Back