The vulnerable component is bound to the network stack, but the attack is
limited at the protocol level to a logically adjacent topology.
Local
The vulnerable component is not bound to the network stack and the
attacker's path is via read/write/execute capabilities.
Network
The vulnerable component is bound to the network stack and the set of
possible attackers extends beyond the other options listed below, up to
and including the entire Internet.
Physical
The attack requires the attacker to physically touch or manipulate the
vulnerable component.
[[["Easy to understand","easyToUnderstand","thumb-up"],["Solved my problem","solvedMyProblem","thumb-up"],["Other","otherUp","thumb-up"]],[["Hard to understand","hardToUnderstand","thumb-down"],["Incorrect information or sample code","incorrectInformationOrSampleCode","thumb-down"],["Missing the information/samples I need","missingTheInformationSamplesINeed","thumb-down"],["Other","otherDown","thumb-down"]],["Last updated 2025-03-21 UTC."],[[["The latest version of the Google Cloud SecurityCenter V1 API reference documentation for `Cvssv3.Types.AttackVector` is version 3.24.0."],["This page provides a list of versions for the `Cvssv3.Types.AttackVector` enum, ranging from version 2.2.0 up to the latest 3.24.0, which is used in the Google Cloud SecurityCenter V1 API."],["The `Cvssv3.Types.AttackVector` enum defines different contexts by which vulnerability exploitation can occur, including `Adjacent`, `Local`, `Network`, `Physical`, and `Unspecified`."],["Each version of the enum links to its corresponding documentation page within the Google Cloud SecurityCenter V1 API reference, allowing users to see changes between versions."],["The namespace of the `Cvssv3.Types.AttackVector` is Google.Cloud.SecurityCenter.V1 and the assembly it is under is Google.Cloud.SecurityCenter.V1.dll."]]],[]]