Reference documentation and code samples for the Google Cloud Security Command Center V2 Client class RiskRating.
The possible values of impact of the vulnerability if it was to be
exploited.
Protobuf type google.cloud.securitycenter.v2.Cve.RiskRating
Namespace
Google \ Cloud \ SecurityCenter \ V2 \ Cve
Methods
static::name
Parameter
Name
Description
value
mixed
static::value
Parameter
Name
Description
name
mixed
Constants
RISK_RATING_UNSPECIFIED
Value: 0
Invalid or empty value.
Generated from protobuf enum RISK_RATING_UNSPECIFIED = 0;
LOW
Value: 1
Exploitation would have little to no security impact.
Generated from protobuf enum LOW = 1;
MEDIUM
Value: 2
Exploitation would enable attackers to perform activities, or could allow
attackers to have a direct impact, but would require additional steps.
Generated from protobuf enum MEDIUM = 2;
HIGH
Value: 3
Exploitation would enable attackers to have a notable direct impact
without needing to overcome any major mitigating factors.
Generated from protobuf enum HIGH = 3;
CRITICAL
Value: 4
Exploitation would fundamentally undermine the security of affected
systems, enable actors to perform significant attacks with minimal
effort, with little to no mitigating factors to overcome.
[[["Easy to understand","easyToUnderstand","thumb-up"],["Solved my problem","solvedMyProblem","thumb-up"],["Other","otherUp","thumb-up"]],[["Hard to understand","hardToUnderstand","thumb-down"],["Incorrect information or sample code","incorrectInformationOrSampleCode","thumb-down"],["Missing the information/samples I need","missingTheInformationSamplesINeed","thumb-down"],["Other","otherDown","thumb-down"]],["Last updated 2025-09-04 UTC."],[],[],null,["# Google Cloud Security Command Center V2 Client - Class RiskRating (2.2.1)\n\nVersion latestkeyboard_arrow_down\n\n- [2.2.1 (latest)](/php/docs/reference/cloud-security-center/latest/V2.Cve.RiskRating)\n- [2.2.0](/php/docs/reference/cloud-security-center/2.2.0/V2.Cve.RiskRating)\n- [2.1.1](/php/docs/reference/cloud-security-center/2.1.1/V2.Cve.RiskRating)\n- [2.0.4](/php/docs/reference/cloud-security-center/2.0.4/V2.Cve.RiskRating)\n- [1.32.0](/php/docs/reference/cloud-security-center/1.32.0/V2.Cve.RiskRating)\n- [1.31.0](/php/docs/reference/cloud-security-center/1.31.0/V2.Cve.RiskRating)\n- [1.30.0](/php/docs/reference/cloud-security-center/1.30.0/V2.Cve.RiskRating)\n- [1.29.0](/php/docs/reference/cloud-security-center/1.29.0/V2.Cve.RiskRating)\n- [1.28.2](/php/docs/reference/cloud-security-center/1.28.2/V2.Cve.RiskRating)\n- [1.21.0](/php/docs/reference/cloud-security-center/1.21.0/V2.Cve.RiskRating)\n- [1.20.2](/php/docs/reference/cloud-security-center/1.20.2/V2.Cve.RiskRating)\n- [1.19.1](/php/docs/reference/cloud-security-center/1.19.1/V2.Cve.RiskRating)\n- [1.18.0](/php/docs/reference/cloud-security-center/1.18.0/V2.Cve.RiskRating)\n- [1.17.0](/php/docs/reference/cloud-security-center/1.17.0/V2.Cve.RiskRating)\n- [1.16.0](/php/docs/reference/cloud-security-center/1.16.0/V2.Cve.RiskRating)\n- [1.15.1](/php/docs/reference/cloud-security-center/1.15.1/V2.Cve.RiskRating)\n- [1.14.2](/php/docs/reference/cloud-security-center/1.14.2/V2.Cve.RiskRating)\n- [1.13.1](/php/docs/reference/cloud-security-center/1.13.1/V2.Cve.RiskRating) \nReference documentation and code samples for the Google Cloud Security Command Center V2 Client class RiskRating.\n\nThe possible values of impact of the vulnerability if it was to be\nexploited.\n\nProtobuf type `google.cloud.securitycenter.v2.Cve.RiskRating`\n\nNamespace\n---------\n\nGoogle \\\\ Cloud \\\\ SecurityCenter \\\\ V2 \\\\ Cve\n\nMethods\n-------\n\n### static::name\n\n### static::value\n\nConstants\n---------\n\n### RISK_RATING_UNSPECIFIED\n\n Value: 0\n\nInvalid or empty value.\n\nGenerated from protobuf enum `RISK_RATING_UNSPECIFIED = 0;`\n\n### LOW\n\n Value: 1\n\nExploitation would have little to no security impact.\n\nGenerated from protobuf enum `LOW = 1;`\n\n### MEDIUM\n\n Value: 2\n\nExploitation would enable attackers to perform activities, or could allow\nattackers to have a direct impact, but would require additional steps.\n\nGenerated from protobuf enum `MEDIUM = 2;`\n\n### HIGH\n\n Value: 3\n\nExploitation would enable attackers to have a notable direct impact\nwithout needing to overcome any major mitigating factors.\n\nGenerated from protobuf enum `HIGH = 3;`\n\n### CRITICAL\n\n Value: 4\n\nExploitation would fundamentally undermine the security of affected\nsystems, enable actors to perform significant attacks with minimal\neffort, with little to no mitigating factors to overcome.\n\nGenerated from protobuf enum `CRITICAL = 4;`"]]