The vulnerable component is bound to the network stack, but the attack is
limited at the protocol level to a logically adjacent topology.
Local
The vulnerable component is not bound to the network stack and the
attacker's path is via read/write/execute capabilities.
Network
The vulnerable component is bound to the network stack and the set of
possible attackers extends beyond the other options listed below, up to
and including the entire Internet.
Physical
The attack requires the attacker to physically touch or manipulate the
vulnerable component.
[[["Easy to understand","easyToUnderstand","thumb-up"],["Solved my problem","solvedMyProblem","thumb-up"],["Other","otherUp","thumb-up"]],[["Hard to understand","hardToUnderstand","thumb-down"],["Incorrect information or sample code","incorrectInformationOrSampleCode","thumb-down"],["Missing the information/samples I need","missingTheInformationSamplesINeed","thumb-down"],["Other","otherDown","thumb-down"]],["Last updated 2025-03-21 UTC."],[[["The page provides documentation for the `Cvssv3.Types.AttackVector` enum within the Google Cloud Security Command Center v1 API, specifically for the .NET environment."],["This enum, `Cvssv3.Types.AttackVector`, defines the different contexts through which a vulnerability can be exploited."],["There are five distinct values defined within the enum: `Adjacent`, `Local`, `Network`, `Physical`, and `Unspecified`, each representing a different type of attack vector."],["The page lists versioned documentation, and provides a link to each version going all the way back to version 2.2.0, with the latest being 3.24.0."],["Each `AttackVector` field has a description to help specify the meaning of the term, and what it means in the context of the API."]]],[]]