Class: Google::Cloud::SecurityCenter::V1::Cvssv3

Inherits:
Object
  • Object
show all
Extended by:
Protobuf::MessageExts::ClassMethods
Includes:
Protobuf::MessageExts
Defined in:
proto_docs/google/cloud/securitycenter/v1/vulnerability.rb

Overview

Common Vulnerability Scoring System version 3.

Defined Under Namespace

Modules: AttackComplexity, AttackVector, Impact, PrivilegesRequired, Scope, UserInteraction

Instance Attribute Summary collapse

Instance Attribute Details

#attack_complexity::Google::Cloud::SecurityCenter::V1::Cvssv3::AttackComplexity

Returns This metric describes the conditions beyond the attacker's control that must exist in order to exploit the vulnerability.

Returns:



182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
# File 'proto_docs/google/cloud/securitycenter/v1/vulnerability.rb', line 182

class Cvssv3
  include ::Google::Protobuf::MessageExts
  extend ::Google::Protobuf::MessageExts::ClassMethods

  # This metric reflects the context by which vulnerability exploitation is
  # possible.
  module AttackVector
    # Invalid value.
    ATTACK_VECTOR_UNSPECIFIED = 0

    # The vulnerable component is bound to the network stack and the set of
    # possible attackers extends beyond the other options listed below, up to
    # and including the entire Internet.
    ATTACK_VECTOR_NETWORK = 1

    # The vulnerable component is bound to the network stack, but the attack is
    # limited at the protocol level to a logically adjacent topology.
    ATTACK_VECTOR_ADJACENT = 2

    # The vulnerable component is not bound to the network stack and the
    # attacker's path is via read/write/execute capabilities.
    ATTACK_VECTOR_LOCAL = 3

    # The attack requires the attacker to physically touch or manipulate the
    # vulnerable component.
    ATTACK_VECTOR_PHYSICAL = 4
  end

  # This metric describes the conditions beyond the attacker's control that
  # must exist in order to exploit the vulnerability.
  module AttackComplexity
    # Invalid value.
    ATTACK_COMPLEXITY_UNSPECIFIED = 0

    # Specialized access conditions or extenuating circumstances do not exist.
    # An attacker can expect repeatable success when attacking the vulnerable
    # component.
    ATTACK_COMPLEXITY_LOW = 1

    # A successful attack depends on conditions beyond the attacker's control.
    # That is, a successful attack cannot be accomplished at will, but requires
    # the attacker to invest in some measurable amount of effort in preparation
    # or execution against the vulnerable component before a successful attack
    # can be expected.
    ATTACK_COMPLEXITY_HIGH = 2
  end

  # This metric describes the level of privileges an attacker must possess
  # before successfully exploiting the vulnerability.
  module PrivilegesRequired
    # Invalid value.
    PRIVILEGES_REQUIRED_UNSPECIFIED = 0

    # The attacker is unauthorized prior to attack, and therefore does not
    # require any access to settings or files of the vulnerable system to
    # carry out an attack.
    PRIVILEGES_REQUIRED_NONE = 1

    # The attacker requires privileges that provide basic user capabilities
    # that could normally affect only settings and files owned by a user.
    # Alternatively, an attacker with Low privileges has the ability to access
    # only non-sensitive resources.
    PRIVILEGES_REQUIRED_LOW = 2

    # The attacker requires privileges that provide significant (e.g.,
    # administrative) control over the vulnerable component allowing access to
    # component-wide settings and files.
    PRIVILEGES_REQUIRED_HIGH = 3
  end

  # This metric captures the requirement for a human user, other than the
  # attacker, to participate in the successful compromise of the vulnerable
  # component.
  module UserInteraction
    # Invalid value.
    USER_INTERACTION_UNSPECIFIED = 0

    # The vulnerable system can be exploited without interaction from any user.
    USER_INTERACTION_NONE = 1

    # Successful exploitation of this vulnerability requires a user to take
    # some action before the vulnerability can be exploited.
    USER_INTERACTION_REQUIRED = 2
  end

  # The Scope metric captures whether a vulnerability in one vulnerable
  # component impacts resources in components beyond its security scope.
  module Scope
    # Invalid value.
    SCOPE_UNSPECIFIED = 0

    # An exploited vulnerability can only affect resources managed by the same
    # security authority.
    SCOPE_UNCHANGED = 1

    # An exploited vulnerability can affect resources beyond the security scope
    # managed by the security authority of the vulnerable component.
    SCOPE_CHANGED = 2
  end

  # The Impact metrics capture the effects of a successfully exploited
  # vulnerability on the component that suffers the worst outcome that is most
  # directly and predictably associated with the attack.
  module Impact
    # Invalid value.
    IMPACT_UNSPECIFIED = 0

    # High impact.
    IMPACT_HIGH = 1

    # Low impact.
    IMPACT_LOW = 2

    # No impact.
    IMPACT_NONE = 3
  end
end

#attack_vector::Google::Cloud::SecurityCenter::V1::Cvssv3::AttackVector

Returns Base Metrics Represents the intrinsic characteristics of a vulnerability that are constant over time and across user environments. This metric reflects the context by which vulnerability exploitation is possible.

Returns:



182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
# File 'proto_docs/google/cloud/securitycenter/v1/vulnerability.rb', line 182

class Cvssv3
  include ::Google::Protobuf::MessageExts
  extend ::Google::Protobuf::MessageExts::ClassMethods

  # This metric reflects the context by which vulnerability exploitation is
  # possible.
  module AttackVector
    # Invalid value.
    ATTACK_VECTOR_UNSPECIFIED = 0

    # The vulnerable component is bound to the network stack and the set of
    # possible attackers extends beyond the other options listed below, up to
    # and including the entire Internet.
    ATTACK_VECTOR_NETWORK = 1

    # The vulnerable component is bound to the network stack, but the attack is
    # limited at the protocol level to a logically adjacent topology.
    ATTACK_VECTOR_ADJACENT = 2

    # The vulnerable component is not bound to the network stack and the
    # attacker's path is via read/write/execute capabilities.
    ATTACK_VECTOR_LOCAL = 3

    # The attack requires the attacker to physically touch or manipulate the
    # vulnerable component.
    ATTACK_VECTOR_PHYSICAL = 4
  end

  # This metric describes the conditions beyond the attacker's control that
  # must exist in order to exploit the vulnerability.
  module AttackComplexity
    # Invalid value.
    ATTACK_COMPLEXITY_UNSPECIFIED = 0

    # Specialized access conditions or extenuating circumstances do not exist.
    # An attacker can expect repeatable success when attacking the vulnerable
    # component.
    ATTACK_COMPLEXITY_LOW = 1

    # A successful attack depends on conditions beyond the attacker's control.
    # That is, a successful attack cannot be accomplished at will, but requires
    # the attacker to invest in some measurable amount of effort in preparation
    # or execution against the vulnerable component before a successful attack
    # can be expected.
    ATTACK_COMPLEXITY_HIGH = 2
  end

  # This metric describes the level of privileges an attacker must possess
  # before successfully exploiting the vulnerability.
  module PrivilegesRequired
    # Invalid value.
    PRIVILEGES_REQUIRED_UNSPECIFIED = 0

    # The attacker is unauthorized prior to attack, and therefore does not
    # require any access to settings or files of the vulnerable system to
    # carry out an attack.
    PRIVILEGES_REQUIRED_NONE = 1

    # The attacker requires privileges that provide basic user capabilities
    # that could normally affect only settings and files owned by a user.
    # Alternatively, an attacker with Low privileges has the ability to access
    # only non-sensitive resources.
    PRIVILEGES_REQUIRED_LOW = 2

    # The attacker requires privileges that provide significant (e.g.,
    # administrative) control over the vulnerable component allowing access to
    # component-wide settings and files.
    PRIVILEGES_REQUIRED_HIGH = 3
  end

  # This metric captures the requirement for a human user, other than the
  # attacker, to participate in the successful compromise of the vulnerable
  # component.
  module UserInteraction
    # Invalid value.
    USER_INTERACTION_UNSPECIFIED = 0

    # The vulnerable system can be exploited without interaction from any user.
    USER_INTERACTION_NONE = 1

    # Successful exploitation of this vulnerability requires a user to take
    # some action before the vulnerability can be exploited.
    USER_INTERACTION_REQUIRED = 2
  end

  # The Scope metric captures whether a vulnerability in one vulnerable
  # component impacts resources in components beyond its security scope.
  module Scope
    # Invalid value.
    SCOPE_UNSPECIFIED = 0

    # An exploited vulnerability can only affect resources managed by the same
    # security authority.
    SCOPE_UNCHANGED = 1

    # An exploited vulnerability can affect resources beyond the security scope
    # managed by the security authority of the vulnerable component.
    SCOPE_CHANGED = 2
  end

  # The Impact metrics capture the effects of a successfully exploited
  # vulnerability on the component that suffers the worst outcome that is most
  # directly and predictably associated with the attack.
  module Impact
    # Invalid value.
    IMPACT_UNSPECIFIED = 0

    # High impact.
    IMPACT_HIGH = 1

    # Low impact.
    IMPACT_LOW = 2

    # No impact.
    IMPACT_NONE = 3
  end
end

#availability_impact::Google::Cloud::SecurityCenter::V1::Cvssv3::Impact

Returns This metric measures the impact to the availability of the impacted component resulting from a successfully exploited vulnerability.

Returns:



182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
# File 'proto_docs/google/cloud/securitycenter/v1/vulnerability.rb', line 182

class Cvssv3
  include ::Google::Protobuf::MessageExts
  extend ::Google::Protobuf::MessageExts::ClassMethods

  # This metric reflects the context by which vulnerability exploitation is
  # possible.
  module AttackVector
    # Invalid value.
    ATTACK_VECTOR_UNSPECIFIED = 0

    # The vulnerable component is bound to the network stack and the set of
    # possible attackers extends beyond the other options listed below, up to
    # and including the entire Internet.
    ATTACK_VECTOR_NETWORK = 1

    # The vulnerable component is bound to the network stack, but the attack is
    # limited at the protocol level to a logically adjacent topology.
    ATTACK_VECTOR_ADJACENT = 2

    # The vulnerable component is not bound to the network stack and the
    # attacker's path is via read/write/execute capabilities.
    ATTACK_VECTOR_LOCAL = 3

    # The attack requires the attacker to physically touch or manipulate the
    # vulnerable component.
    ATTACK_VECTOR_PHYSICAL = 4
  end

  # This metric describes the conditions beyond the attacker's control that
  # must exist in order to exploit the vulnerability.
  module AttackComplexity
    # Invalid value.
    ATTACK_COMPLEXITY_UNSPECIFIED = 0

    # Specialized access conditions or extenuating circumstances do not exist.
    # An attacker can expect repeatable success when attacking the vulnerable
    # component.
    ATTACK_COMPLEXITY_LOW = 1

    # A successful attack depends on conditions beyond the attacker's control.
    # That is, a successful attack cannot be accomplished at will, but requires
    # the attacker to invest in some measurable amount of effort in preparation
    # or execution against the vulnerable component before a successful attack
    # can be expected.
    ATTACK_COMPLEXITY_HIGH = 2
  end

  # This metric describes the level of privileges an attacker must possess
  # before successfully exploiting the vulnerability.
  module PrivilegesRequired
    # Invalid value.
    PRIVILEGES_REQUIRED_UNSPECIFIED = 0

    # The attacker is unauthorized prior to attack, and therefore does not
    # require any access to settings or files of the vulnerable system to
    # carry out an attack.
    PRIVILEGES_REQUIRED_NONE = 1

    # The attacker requires privileges that provide basic user capabilities
    # that could normally affect only settings and files owned by a user.
    # Alternatively, an attacker with Low privileges has the ability to access
    # only non-sensitive resources.
    PRIVILEGES_REQUIRED_LOW = 2

    # The attacker requires privileges that provide significant (e.g.,
    # administrative) control over the vulnerable component allowing access to
    # component-wide settings and files.
    PRIVILEGES_REQUIRED_HIGH = 3
  end

  # This metric captures the requirement for a human user, other than the
  # attacker, to participate in the successful compromise of the vulnerable
  # component.
  module UserInteraction
    # Invalid value.
    USER_INTERACTION_UNSPECIFIED = 0

    # The vulnerable system can be exploited without interaction from any user.
    USER_INTERACTION_NONE = 1

    # Successful exploitation of this vulnerability requires a user to take
    # some action before the vulnerability can be exploited.
    USER_INTERACTION_REQUIRED = 2
  end

  # The Scope metric captures whether a vulnerability in one vulnerable
  # component impacts resources in components beyond its security scope.
  module Scope
    # Invalid value.
    SCOPE_UNSPECIFIED = 0

    # An exploited vulnerability can only affect resources managed by the same
    # security authority.
    SCOPE_UNCHANGED = 1

    # An exploited vulnerability can affect resources beyond the security scope
    # managed by the security authority of the vulnerable component.
    SCOPE_CHANGED = 2
  end

  # The Impact metrics capture the effects of a successfully exploited
  # vulnerability on the component that suffers the worst outcome that is most
  # directly and predictably associated with the attack.
  module Impact
    # Invalid value.
    IMPACT_UNSPECIFIED = 0

    # High impact.
    IMPACT_HIGH = 1

    # Low impact.
    IMPACT_LOW = 2

    # No impact.
    IMPACT_NONE = 3
  end
end

#base_score::Float

Returns The base score is a function of the base metric scores.

Returns:

  • (::Float)

    The base score is a function of the base metric scores.



182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
# File 'proto_docs/google/cloud/securitycenter/v1/vulnerability.rb', line 182

class Cvssv3
  include ::Google::Protobuf::MessageExts
  extend ::Google::Protobuf::MessageExts::ClassMethods

  # This metric reflects the context by which vulnerability exploitation is
  # possible.
  module AttackVector
    # Invalid value.
    ATTACK_VECTOR_UNSPECIFIED = 0

    # The vulnerable component is bound to the network stack and the set of
    # possible attackers extends beyond the other options listed below, up to
    # and including the entire Internet.
    ATTACK_VECTOR_NETWORK = 1

    # The vulnerable component is bound to the network stack, but the attack is
    # limited at the protocol level to a logically adjacent topology.
    ATTACK_VECTOR_ADJACENT = 2

    # The vulnerable component is not bound to the network stack and the
    # attacker's path is via read/write/execute capabilities.
    ATTACK_VECTOR_LOCAL = 3

    # The attack requires the attacker to physically touch or manipulate the
    # vulnerable component.
    ATTACK_VECTOR_PHYSICAL = 4
  end

  # This metric describes the conditions beyond the attacker's control that
  # must exist in order to exploit the vulnerability.
  module AttackComplexity
    # Invalid value.
    ATTACK_COMPLEXITY_UNSPECIFIED = 0

    # Specialized access conditions or extenuating circumstances do not exist.
    # An attacker can expect repeatable success when attacking the vulnerable
    # component.
    ATTACK_COMPLEXITY_LOW = 1

    # A successful attack depends on conditions beyond the attacker's control.
    # That is, a successful attack cannot be accomplished at will, but requires
    # the attacker to invest in some measurable amount of effort in preparation
    # or execution against the vulnerable component before a successful attack
    # can be expected.
    ATTACK_COMPLEXITY_HIGH = 2
  end

  # This metric describes the level of privileges an attacker must possess
  # before successfully exploiting the vulnerability.
  module PrivilegesRequired
    # Invalid value.
    PRIVILEGES_REQUIRED_UNSPECIFIED = 0

    # The attacker is unauthorized prior to attack, and therefore does not
    # require any access to settings or files of the vulnerable system to
    # carry out an attack.
    PRIVILEGES_REQUIRED_NONE = 1

    # The attacker requires privileges that provide basic user capabilities
    # that could normally affect only settings and files owned by a user.
    # Alternatively, an attacker with Low privileges has the ability to access
    # only non-sensitive resources.
    PRIVILEGES_REQUIRED_LOW = 2

    # The attacker requires privileges that provide significant (e.g.,
    # administrative) control over the vulnerable component allowing access to
    # component-wide settings and files.
    PRIVILEGES_REQUIRED_HIGH = 3
  end

  # This metric captures the requirement for a human user, other than the
  # attacker, to participate in the successful compromise of the vulnerable
  # component.
  module UserInteraction
    # Invalid value.
    USER_INTERACTION_UNSPECIFIED = 0

    # The vulnerable system can be exploited without interaction from any user.
    USER_INTERACTION_NONE = 1

    # Successful exploitation of this vulnerability requires a user to take
    # some action before the vulnerability can be exploited.
    USER_INTERACTION_REQUIRED = 2
  end

  # The Scope metric captures whether a vulnerability in one vulnerable
  # component impacts resources in components beyond its security scope.
  module Scope
    # Invalid value.
    SCOPE_UNSPECIFIED = 0

    # An exploited vulnerability can only affect resources managed by the same
    # security authority.
    SCOPE_UNCHANGED = 1

    # An exploited vulnerability can affect resources beyond the security scope
    # managed by the security authority of the vulnerable component.
    SCOPE_CHANGED = 2
  end

  # The Impact metrics capture the effects of a successfully exploited
  # vulnerability on the component that suffers the worst outcome that is most
  # directly and predictably associated with the attack.
  module Impact
    # Invalid value.
    IMPACT_UNSPECIFIED = 0

    # High impact.
    IMPACT_HIGH = 1

    # Low impact.
    IMPACT_LOW = 2

    # No impact.
    IMPACT_NONE = 3
  end
end

#confidentiality_impact::Google::Cloud::SecurityCenter::V1::Cvssv3::Impact

Returns This metric measures the impact to the confidentiality of the information resources managed by a software component due to a successfully exploited vulnerability.

Returns:



182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
# File 'proto_docs/google/cloud/securitycenter/v1/vulnerability.rb', line 182

class Cvssv3
  include ::Google::Protobuf::MessageExts
  extend ::Google::Protobuf::MessageExts::ClassMethods

  # This metric reflects the context by which vulnerability exploitation is
  # possible.
  module AttackVector
    # Invalid value.
    ATTACK_VECTOR_UNSPECIFIED = 0

    # The vulnerable component is bound to the network stack and the set of
    # possible attackers extends beyond the other options listed below, up to
    # and including the entire Internet.
    ATTACK_VECTOR_NETWORK = 1

    # The vulnerable component is bound to the network stack, but the attack is
    # limited at the protocol level to a logically adjacent topology.
    ATTACK_VECTOR_ADJACENT = 2

    # The vulnerable component is not bound to the network stack and the
    # attacker's path is via read/write/execute capabilities.
    ATTACK_VECTOR_LOCAL = 3

    # The attack requires the attacker to physically touch or manipulate the
    # vulnerable component.
    ATTACK_VECTOR_PHYSICAL = 4
  end

  # This metric describes the conditions beyond the attacker's control that
  # must exist in order to exploit the vulnerability.
  module AttackComplexity
    # Invalid value.
    ATTACK_COMPLEXITY_UNSPECIFIED = 0

    # Specialized access conditions or extenuating circumstances do not exist.
    # An attacker can expect repeatable success when attacking the vulnerable
    # component.
    ATTACK_COMPLEXITY_LOW = 1

    # A successful attack depends on conditions beyond the attacker's control.
    # That is, a successful attack cannot be accomplished at will, but requires
    # the attacker to invest in some measurable amount of effort in preparation
    # or execution against the vulnerable component before a successful attack
    # can be expected.
    ATTACK_COMPLEXITY_HIGH = 2
  end

  # This metric describes the level of privileges an attacker must possess
  # before successfully exploiting the vulnerability.
  module PrivilegesRequired
    # Invalid value.
    PRIVILEGES_REQUIRED_UNSPECIFIED = 0

    # The attacker is unauthorized prior to attack, and therefore does not
    # require any access to settings or files of the vulnerable system to
    # carry out an attack.
    PRIVILEGES_REQUIRED_NONE = 1

    # The attacker requires privileges that provide basic user capabilities
    # that could normally affect only settings and files owned by a user.
    # Alternatively, an attacker with Low privileges has the ability to access
    # only non-sensitive resources.
    PRIVILEGES_REQUIRED_LOW = 2

    # The attacker requires privileges that provide significant (e.g.,
    # administrative) control over the vulnerable component allowing access to
    # component-wide settings and files.
    PRIVILEGES_REQUIRED_HIGH = 3
  end

  # This metric captures the requirement for a human user, other than the
  # attacker, to participate in the successful compromise of the vulnerable
  # component.
  module UserInteraction
    # Invalid value.
    USER_INTERACTION_UNSPECIFIED = 0

    # The vulnerable system can be exploited without interaction from any user.
    USER_INTERACTION_NONE = 1

    # Successful exploitation of this vulnerability requires a user to take
    # some action before the vulnerability can be exploited.
    USER_INTERACTION_REQUIRED = 2
  end

  # The Scope metric captures whether a vulnerability in one vulnerable
  # component impacts resources in components beyond its security scope.
  module Scope
    # Invalid value.
    SCOPE_UNSPECIFIED = 0

    # An exploited vulnerability can only affect resources managed by the same
    # security authority.
    SCOPE_UNCHANGED = 1

    # An exploited vulnerability can affect resources beyond the security scope
    # managed by the security authority of the vulnerable component.
    SCOPE_CHANGED = 2
  end

  # The Impact metrics capture the effects of a successfully exploited
  # vulnerability on the component that suffers the worst outcome that is most
  # directly and predictably associated with the attack.
  module Impact
    # Invalid value.
    IMPACT_UNSPECIFIED = 0

    # High impact.
    IMPACT_HIGH = 1

    # Low impact.
    IMPACT_LOW = 2

    # No impact.
    IMPACT_NONE = 3
  end
end

#integrity_impact::Google::Cloud::SecurityCenter::V1::Cvssv3::Impact

Returns This metric measures the impact to integrity of a successfully exploited vulnerability.

Returns:



182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
# File 'proto_docs/google/cloud/securitycenter/v1/vulnerability.rb', line 182

class Cvssv3
  include ::Google::Protobuf::MessageExts
  extend ::Google::Protobuf::MessageExts::ClassMethods

  # This metric reflects the context by which vulnerability exploitation is
  # possible.
  module AttackVector
    # Invalid value.
    ATTACK_VECTOR_UNSPECIFIED = 0

    # The vulnerable component is bound to the network stack and the set of
    # possible attackers extends beyond the other options listed below, up to
    # and including the entire Internet.
    ATTACK_VECTOR_NETWORK = 1

    # The vulnerable component is bound to the network stack, but the attack is
    # limited at the protocol level to a logically adjacent topology.
    ATTACK_VECTOR_ADJACENT = 2

    # The vulnerable component is not bound to the network stack and the
    # attacker's path is via read/write/execute capabilities.
    ATTACK_VECTOR_LOCAL = 3

    # The attack requires the attacker to physically touch or manipulate the
    # vulnerable component.
    ATTACK_VECTOR_PHYSICAL = 4
  end

  # This metric describes the conditions beyond the attacker's control that
  # must exist in order to exploit the vulnerability.
  module AttackComplexity
    # Invalid value.
    ATTACK_COMPLEXITY_UNSPECIFIED = 0

    # Specialized access conditions or extenuating circumstances do not exist.
    # An attacker can expect repeatable success when attacking the vulnerable
    # component.
    ATTACK_COMPLEXITY_LOW = 1

    # A successful attack depends on conditions beyond the attacker's control.
    # That is, a successful attack cannot be accomplished at will, but requires
    # the attacker to invest in some measurable amount of effort in preparation
    # or execution against the vulnerable component before a successful attack
    # can be expected.
    ATTACK_COMPLEXITY_HIGH = 2
  end

  # This metric describes the level of privileges an attacker must possess
  # before successfully exploiting the vulnerability.
  module PrivilegesRequired
    # Invalid value.
    PRIVILEGES_REQUIRED_UNSPECIFIED = 0

    # The attacker is unauthorized prior to attack, and therefore does not
    # require any access to settings or files of the vulnerable system to
    # carry out an attack.
    PRIVILEGES_REQUIRED_NONE = 1

    # The attacker requires privileges that provide basic user capabilities
    # that could normally affect only settings and files owned by a user.
    # Alternatively, an attacker with Low privileges has the ability to access
    # only non-sensitive resources.
    PRIVILEGES_REQUIRED_LOW = 2

    # The attacker requires privileges that provide significant (e.g.,
    # administrative) control over the vulnerable component allowing access to
    # component-wide settings and files.
    PRIVILEGES_REQUIRED_HIGH = 3
  end

  # This metric captures the requirement for a human user, other than the
  # attacker, to participate in the successful compromise of the vulnerable
  # component.
  module UserInteraction
    # Invalid value.
    USER_INTERACTION_UNSPECIFIED = 0

    # The vulnerable system can be exploited without interaction from any user.
    USER_INTERACTION_NONE = 1

    # Successful exploitation of this vulnerability requires a user to take
    # some action before the vulnerability can be exploited.
    USER_INTERACTION_REQUIRED = 2
  end

  # The Scope metric captures whether a vulnerability in one vulnerable
  # component impacts resources in components beyond its security scope.
  module Scope
    # Invalid value.
    SCOPE_UNSPECIFIED = 0

    # An exploited vulnerability can only affect resources managed by the same
    # security authority.
    SCOPE_UNCHANGED = 1

    # An exploited vulnerability can affect resources beyond the security scope
    # managed by the security authority of the vulnerable component.
    SCOPE_CHANGED = 2
  end

  # The Impact metrics capture the effects of a successfully exploited
  # vulnerability on the component that suffers the worst outcome that is most
  # directly and predictably associated with the attack.
  module Impact
    # Invalid value.
    IMPACT_UNSPECIFIED = 0

    # High impact.
    IMPACT_HIGH = 1

    # Low impact.
    IMPACT_LOW = 2

    # No impact.
    IMPACT_NONE = 3
  end
end

#privileges_required::Google::Cloud::SecurityCenter::V1::Cvssv3::PrivilegesRequired

Returns This metric describes the level of privileges an attacker must possess before successfully exploiting the vulnerability.

Returns:



182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
# File 'proto_docs/google/cloud/securitycenter/v1/vulnerability.rb', line 182

class Cvssv3
  include ::Google::Protobuf::MessageExts
  extend ::Google::Protobuf::MessageExts::ClassMethods

  # This metric reflects the context by which vulnerability exploitation is
  # possible.
  module AttackVector
    # Invalid value.
    ATTACK_VECTOR_UNSPECIFIED = 0

    # The vulnerable component is bound to the network stack and the set of
    # possible attackers extends beyond the other options listed below, up to
    # and including the entire Internet.
    ATTACK_VECTOR_NETWORK = 1

    # The vulnerable component is bound to the network stack, but the attack is
    # limited at the protocol level to a logically adjacent topology.
    ATTACK_VECTOR_ADJACENT = 2

    # The vulnerable component is not bound to the network stack and the
    # attacker's path is via read/write/execute capabilities.
    ATTACK_VECTOR_LOCAL = 3

    # The attack requires the attacker to physically touch or manipulate the
    # vulnerable component.
    ATTACK_VECTOR_PHYSICAL = 4
  end

  # This metric describes the conditions beyond the attacker's control that
  # must exist in order to exploit the vulnerability.
  module AttackComplexity
    # Invalid value.
    ATTACK_COMPLEXITY_UNSPECIFIED = 0

    # Specialized access conditions or extenuating circumstances do not exist.
    # An attacker can expect repeatable success when attacking the vulnerable
    # component.
    ATTACK_COMPLEXITY_LOW = 1

    # A successful attack depends on conditions beyond the attacker's control.
    # That is, a successful attack cannot be accomplished at will, but requires
    # the attacker to invest in some measurable amount of effort in preparation
    # or execution against the vulnerable component before a successful attack
    # can be expected.
    ATTACK_COMPLEXITY_HIGH = 2
  end

  # This metric describes the level of privileges an attacker must possess
  # before successfully exploiting the vulnerability.
  module PrivilegesRequired
    # Invalid value.
    PRIVILEGES_REQUIRED_UNSPECIFIED = 0

    # The attacker is unauthorized prior to attack, and therefore does not
    # require any access to settings or files of the vulnerable system to
    # carry out an attack.
    PRIVILEGES_REQUIRED_NONE = 1

    # The attacker requires privileges that provide basic user capabilities
    # that could normally affect only settings and files owned by a user.
    # Alternatively, an attacker with Low privileges has the ability to access
    # only non-sensitive resources.
    PRIVILEGES_REQUIRED_LOW = 2

    # The attacker requires privileges that provide significant (e.g.,
    # administrative) control over the vulnerable component allowing access to
    # component-wide settings and files.
    PRIVILEGES_REQUIRED_HIGH = 3
  end

  # This metric captures the requirement for a human user, other than the
  # attacker, to participate in the successful compromise of the vulnerable
  # component.
  module UserInteraction
    # Invalid value.
    USER_INTERACTION_UNSPECIFIED = 0

    # The vulnerable system can be exploited without interaction from any user.
    USER_INTERACTION_NONE = 1

    # Successful exploitation of this vulnerability requires a user to take
    # some action before the vulnerability can be exploited.
    USER_INTERACTION_REQUIRED = 2
  end

  # The Scope metric captures whether a vulnerability in one vulnerable
  # component impacts resources in components beyond its security scope.
  module Scope
    # Invalid value.
    SCOPE_UNSPECIFIED = 0

    # An exploited vulnerability can only affect resources managed by the same
    # security authority.
    SCOPE_UNCHANGED = 1

    # An exploited vulnerability can affect resources beyond the security scope
    # managed by the security authority of the vulnerable component.
    SCOPE_CHANGED = 2
  end

  # The Impact metrics capture the effects of a successfully exploited
  # vulnerability on the component that suffers the worst outcome that is most
  # directly and predictably associated with the attack.
  module Impact
    # Invalid value.
    IMPACT_UNSPECIFIED = 0

    # High impact.
    IMPACT_HIGH = 1

    # Low impact.
    IMPACT_LOW = 2

    # No impact.
    IMPACT_NONE = 3
  end
end

#scope::Google::Cloud::SecurityCenter::V1::Cvssv3::Scope

Returns The Scope metric captures whether a vulnerability in one vulnerable component impacts resources in components beyond its security scope.

Returns:



182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
# File 'proto_docs/google/cloud/securitycenter/v1/vulnerability.rb', line 182

class Cvssv3
  include ::Google::Protobuf::MessageExts
  extend ::Google::Protobuf::MessageExts::ClassMethods

  # This metric reflects the context by which vulnerability exploitation is
  # possible.
  module AttackVector
    # Invalid value.
    ATTACK_VECTOR_UNSPECIFIED = 0

    # The vulnerable component is bound to the network stack and the set of
    # possible attackers extends beyond the other options listed below, up to
    # and including the entire Internet.
    ATTACK_VECTOR_NETWORK = 1

    # The vulnerable component is bound to the network stack, but the attack is
    # limited at the protocol level to a logically adjacent topology.
    ATTACK_VECTOR_ADJACENT = 2

    # The vulnerable component is not bound to the network stack and the
    # attacker's path is via read/write/execute capabilities.
    ATTACK_VECTOR_LOCAL = 3

    # The attack requires the attacker to physically touch or manipulate the
    # vulnerable component.
    ATTACK_VECTOR_PHYSICAL = 4
  end

  # This metric describes the conditions beyond the attacker's control that
  # must exist in order to exploit the vulnerability.
  module AttackComplexity
    # Invalid value.
    ATTACK_COMPLEXITY_UNSPECIFIED = 0

    # Specialized access conditions or extenuating circumstances do not exist.
    # An attacker can expect repeatable success when attacking the vulnerable
    # component.
    ATTACK_COMPLEXITY_LOW = 1

    # A successful attack depends on conditions beyond the attacker's control.
    # That is, a successful attack cannot be accomplished at will, but requires
    # the attacker to invest in some measurable amount of effort in preparation
    # or execution against the vulnerable component before a successful attack
    # can be expected.
    ATTACK_COMPLEXITY_HIGH = 2
  end

  # This metric describes the level of privileges an attacker must possess
  # before successfully exploiting the vulnerability.
  module PrivilegesRequired
    # Invalid value.
    PRIVILEGES_REQUIRED_UNSPECIFIED = 0

    # The attacker is unauthorized prior to attack, and therefore does not
    # require any access to settings or files of the vulnerable system to
    # carry out an attack.
    PRIVILEGES_REQUIRED_NONE = 1

    # The attacker requires privileges that provide basic user capabilities
    # that could normally affect only settings and files owned by a user.
    # Alternatively, an attacker with Low privileges has the ability to access
    # only non-sensitive resources.
    PRIVILEGES_REQUIRED_LOW = 2

    # The attacker requires privileges that provide significant (e.g.,
    # administrative) control over the vulnerable component allowing access to
    # component-wide settings and files.
    PRIVILEGES_REQUIRED_HIGH = 3
  end

  # This metric captures the requirement for a human user, other than the
  # attacker, to participate in the successful compromise of the vulnerable
  # component.
  module UserInteraction
    # Invalid value.
    USER_INTERACTION_UNSPECIFIED = 0

    # The vulnerable system can be exploited without interaction from any user.
    USER_INTERACTION_NONE = 1

    # Successful exploitation of this vulnerability requires a user to take
    # some action before the vulnerability can be exploited.
    USER_INTERACTION_REQUIRED = 2
  end

  # The Scope metric captures whether a vulnerability in one vulnerable
  # component impacts resources in components beyond its security scope.
  module Scope
    # Invalid value.
    SCOPE_UNSPECIFIED = 0

    # An exploited vulnerability can only affect resources managed by the same
    # security authority.
    SCOPE_UNCHANGED = 1

    # An exploited vulnerability can affect resources beyond the security scope
    # managed by the security authority of the vulnerable component.
    SCOPE_CHANGED = 2
  end

  # The Impact metrics capture the effects of a successfully exploited
  # vulnerability on the component that suffers the worst outcome that is most
  # directly and predictably associated with the attack.
  module Impact
    # Invalid value.
    IMPACT_UNSPECIFIED = 0

    # High impact.
    IMPACT_HIGH = 1

    # Low impact.
    IMPACT_LOW = 2

    # No impact.
    IMPACT_NONE = 3
  end
end

#user_interaction::Google::Cloud::SecurityCenter::V1::Cvssv3::UserInteraction

Returns This metric captures the requirement for a human user, other than the attacker, to participate in the successful compromise of the vulnerable component.

Returns:



182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
# File 'proto_docs/google/cloud/securitycenter/v1/vulnerability.rb', line 182

class Cvssv3
  include ::Google::Protobuf::MessageExts
  extend ::Google::Protobuf::MessageExts::ClassMethods

  # This metric reflects the context by which vulnerability exploitation is
  # possible.
  module AttackVector
    # Invalid value.
    ATTACK_VECTOR_UNSPECIFIED = 0

    # The vulnerable component is bound to the network stack and the set of
    # possible attackers extends beyond the other options listed below, up to
    # and including the entire Internet.
    ATTACK_VECTOR_NETWORK = 1

    # The vulnerable component is bound to the network stack, but the attack is
    # limited at the protocol level to a logically adjacent topology.
    ATTACK_VECTOR_ADJACENT = 2

    # The vulnerable component is not bound to the network stack and the
    # attacker's path is via read/write/execute capabilities.
    ATTACK_VECTOR_LOCAL = 3

    # The attack requires the attacker to physically touch or manipulate the
    # vulnerable component.
    ATTACK_VECTOR_PHYSICAL = 4
  end

  # This metric describes the conditions beyond the attacker's control that
  # must exist in order to exploit the vulnerability.
  module AttackComplexity
    # Invalid value.
    ATTACK_COMPLEXITY_UNSPECIFIED = 0

    # Specialized access conditions or extenuating circumstances do not exist.
    # An attacker can expect repeatable success when attacking the vulnerable
    # component.
    ATTACK_COMPLEXITY_LOW = 1

    # A successful attack depends on conditions beyond the attacker's control.
    # That is, a successful attack cannot be accomplished at will, but requires
    # the attacker to invest in some measurable amount of effort in preparation
    # or execution against the vulnerable component before a successful attack
    # can be expected.
    ATTACK_COMPLEXITY_HIGH = 2
  end

  # This metric describes the level of privileges an attacker must possess
  # before successfully exploiting the vulnerability.
  module PrivilegesRequired
    # Invalid value.
    PRIVILEGES_REQUIRED_UNSPECIFIED = 0

    # The attacker is unauthorized prior to attack, and therefore does not
    # require any access to settings or files of the vulnerable system to
    # carry out an attack.
    PRIVILEGES_REQUIRED_NONE = 1

    # The attacker requires privileges that provide basic user capabilities
    # that could normally affect only settings and files owned by a user.
    # Alternatively, an attacker with Low privileges has the ability to access
    # only non-sensitive resources.
    PRIVILEGES_REQUIRED_LOW = 2

    # The attacker requires privileges that provide significant (e.g.,
    # administrative) control over the vulnerable component allowing access to
    # component-wide settings and files.
    PRIVILEGES_REQUIRED_HIGH = 3
  end

  # This metric captures the requirement for a human user, other than the
  # attacker, to participate in the successful compromise of the vulnerable
  # component.
  module UserInteraction
    # Invalid value.
    USER_INTERACTION_UNSPECIFIED = 0

    # The vulnerable system can be exploited without interaction from any user.
    USER_INTERACTION_NONE = 1

    # Successful exploitation of this vulnerability requires a user to take
    # some action before the vulnerability can be exploited.
    USER_INTERACTION_REQUIRED = 2
  end

  # The Scope metric captures whether a vulnerability in one vulnerable
  # component impacts resources in components beyond its security scope.
  module Scope
    # Invalid value.
    SCOPE_UNSPECIFIED = 0

    # An exploited vulnerability can only affect resources managed by the same
    # security authority.
    SCOPE_UNCHANGED = 1

    # An exploited vulnerability can affect resources beyond the security scope
    # managed by the security authority of the vulnerable component.
    SCOPE_CHANGED = 2
  end

  # The Impact metrics capture the effects of a successfully exploited
  # vulnerability on the component that suffers the worst outcome that is most
  # directly and predictably associated with the attack.
  module Impact
    # Invalid value.
    IMPACT_UNSPECIFIED = 0

    # High impact.
    IMPACT_HIGH = 1

    # Low impact.
    IMPACT_LOW = 2

    # No impact.
    IMPACT_NONE = 3
  end
end