class Google::Apis::OsconfigV1alpha::CvsSv3
Common Vulnerability Scoring System version 3. For details, see www. first.org/cvss/specification-document
Attributes
This metric describes the conditions beyond the attacker's control that must exist in order to exploit the vulnerability. Corresponds to the JSON property `attackComplexity` @return [String]
This metric reflects the context by which vulnerability exploitation is possible. Corresponds to the JSON property `attackVector` @return [String]
This metric measures the impact to the availability of the impacted component resulting from a successfully exploited vulnerability. Corresponds to the JSON property `availabilityImpact` @return [String]
The base score is a function of the base metric scores. www.first.org/ cvss/specification-document#Base-Metrics Corresponds to the JSON property `baseScore` @return [Float]
This metric measures the impact to the confidentiality of the information resources managed by a software component due to a successfully exploited vulnerability. Corresponds to the JSON property `confidentialityImpact` @return [String]
The Exploitability sub-score equation is derived from the Base Exploitability metrics. www.first.org/cvss/specification-document#2-1-Exploitability- Metrics Corresponds to the JSON property `exploitabilityScore` @return [Float]
The Impact sub-score equation is derived from the Base Impact metrics. Corresponds to the JSON property `impactScore` @return [Float]
This metric measures the impact to integrity of a successfully exploited vulnerability. Corresponds to the JSON property `integrityImpact` @return [String]
This metric describes the level of privileges an attacker must possess before successfully exploiting the vulnerability. Corresponds to the JSON property `privilegesRequired` @return [String]
The Scope metric captures whether a vulnerability in one vulnerable component impacts resources in components beyond its security scope. Corresponds to the JSON property `scope` @return [String]
This metric captures the requirement for a human user, other than the attacker, to participate in the successful compromise of the vulnerable component. Corresponds to the JSON property `userInteraction` @return [String]
Public Class Methods
# File lib/google/apis/osconfig_v1alpha/classes.rb, line 97 def initialize(**args) update!(**args) end
Public Instance Methods
Update properties of this object
# File lib/google/apis/osconfig_v1alpha/classes.rb, line 102 def update!(**args) @attack_complexity = args[:attack_complexity] if args.key?(:attack_complexity) @attack_vector = args[:attack_vector] if args.key?(:attack_vector) @availability_impact = args[:availability_impact] if args.key?(:availability_impact) @base_score = args[:base_score] if args.key?(:base_score) @confidentiality_impact = args[:confidentiality_impact] if args.key?(:confidentiality_impact) @exploitability_score = args[:exploitability_score] if args.key?(:exploitability_score) @impact_score = args[:impact_score] if args.key?(:impact_score) @integrity_impact = args[:integrity_impact] if args.key?(:integrity_impact) @privileges_required = args[:privileges_required] if args.key?(:privileges_required) @scope = args[:scope] if args.key?(:scope) @user_interaction = args[:user_interaction] if args.key?(:user_interaction) end