Class Cvssv3

Common Vulnerability Scoring System version 3.

Attributes
NameDescription
floatbase_score
The base score is a function of the base metric scores.
google.cloud.securitycenter_v1.types.Cvssv3.AttackVectorattack_vector
Base Metrics Represents the intrinsic characteristics of a vulnerability that are constant over time and across user environments. This metric reflects the context by which vulnerability exploitation is possible.
google.cloud.securitycenter_v1.types.Cvssv3.AttackComplexityattack_complexity
This metric describes the conditions beyond the attacker's control that must exist in order to exploit the vulnerability.
google.cloud.securitycenter_v1.types.Cvssv3.PrivilegesRequiredprivileges_required
This metric describes the level of privileges an attacker must possess before successfully exploiting the vulnerability.
google.cloud.securitycenter_v1.types.Cvssv3.UserInteractionuser_interaction
This metric captures the requirement for a human user, other than the attacker, to participate in the successful compromise of the vulnerable component.
google.cloud.securitycenter_v1.types.Cvssv3.Scopescope
The Scope metric captures whether a vulnerability in one vulnerable component impacts resources in components beyond its security scope.
google.cloud.securitycenter_v1.types.Cvssv3.Impactconfidentiality_impact
This metric measures the impact to the confidentiality of the information resources managed by a software component due to a successfully exploited vulnerability.
google.cloud.securitycenter_v1.types.Cvssv3.Impactintegrity_impact
This metric measures the impact to integrity of a successfully exploited vulnerability.
google.cloud.securitycenter_v1.types.Cvssv3.Impactavailability_impact
This metric measures the impact to the availability of the impacted component resulting from a successfully exploited vulnerability.

Inheritance

builtins.object > proto.message.Message > Cvssv3

Classes

AttackComplexity

AttackComplexity(value)

This metric describes the conditions beyond the attacker's control that must exist in order to exploit the vulnerability.

AttackVector

AttackVector(value)

This metric reflects the context by which vulnerability exploitation is possible.

Impact

Impact(value)

The Impact metrics capture the effects of a successfully exploited vulnerability on the component that suffers the worst outcome that is most directly and predictably associated with the attack.

PrivilegesRequired

PrivilegesRequired(value)

This metric describes the level of privileges an attacker must possess before successfully exploiting the vulnerability.

Scope

Scope(value)

The Scope metric captures whether a vulnerability in one vulnerable component impacts resources in components beyond its security scope.

UserInteraction

UserInteraction(value)

This metric captures the requirement for a human user, other than the attacker, to participate in the successful compromise of the vulnerable component.