public static enum Vulnerability.Analysis.Justification extends Enum<Vulnerability.Analysis.Justification>
Enum Constant and Description |
---|
CODE_NOT_PRESENT |
CODE_NOT_REACHABLE |
PROTECTED_AT_PERIMETER |
PROTECTED_AT_RUNTIME |
PROTECTED_BY_COMPILER |
PROTECTED_BY_MITIGATING_CONTROL |
REQUIRES_CONFIGURATION |
REQUIRES_DEPENDENCY |
REQUIRES_ENVIRONMENT |
Modifier and Type | Method and Description |
---|---|
static Vulnerability.Analysis.Justification |
fromString(String text) |
String |
getJustificationName() |
static Vulnerability.Analysis.Justification |
valueOf(String name)
Returns the enum constant of this type with the specified name.
|
static Vulnerability.Analysis.Justification[] |
values()
Returns an array containing the constants of this enum type, in
the order they are declared.
|
public static final Vulnerability.Analysis.Justification CODE_NOT_PRESENT
public static final Vulnerability.Analysis.Justification CODE_NOT_REACHABLE
public static final Vulnerability.Analysis.Justification REQUIRES_CONFIGURATION
public static final Vulnerability.Analysis.Justification REQUIRES_DEPENDENCY
public static final Vulnerability.Analysis.Justification REQUIRES_ENVIRONMENT
public static final Vulnerability.Analysis.Justification PROTECTED_BY_COMPILER
public static final Vulnerability.Analysis.Justification PROTECTED_AT_RUNTIME
public static final Vulnerability.Analysis.Justification PROTECTED_AT_PERIMETER
public static final Vulnerability.Analysis.Justification PROTECTED_BY_MITIGATING_CONTROL
public static Vulnerability.Analysis.Justification[] values()
for (Vulnerability.Analysis.Justification c : Vulnerability.Analysis.Justification.values()) System.out.println(c);
public static Vulnerability.Analysis.Justification valueOf(String name)
name
- the name of the enum constant to be returned.IllegalArgumentException
- if this enum type has no constant with the specified nameNullPointerException
- if the argument is nullpublic String getJustificationName()
public static Vulnerability.Analysis.Justification fromString(String text)
Copyright © 2017–2025 OWASP Foundation. All rights reserved.