Cvssv3(mapping=None, *, ignore_unknown_fields=False, **kwargs)
Common Vulnerability Scoring System version 3.
Attributes |
|
---|---|
Name | Description |
base_score |
float
The base score is a function of the base metric scores. |
attack_vector |
google.cloud.securitycenter_v1.types.Cvssv3.AttackVector
Base Metrics Represents the intrinsic characteristics of a vulnerability that are constant over time and across user environments. This metric reflects the context by which vulnerability exploitation is possible. |
attack_complexity |
google.cloud.securitycenter_v1.types.Cvssv3.AttackComplexity
This metric describes the conditions beyond the attacker's control that must exist in order to exploit the vulnerability. |
privileges_required |
google.cloud.securitycenter_v1.types.Cvssv3.PrivilegesRequired
This metric describes the level of privileges an attacker must possess before successfully exploiting the vulnerability. |
user_interaction |
google.cloud.securitycenter_v1.types.Cvssv3.UserInteraction
This metric captures the requirement for a human user, other than the attacker, to participate in the successful compromise of the vulnerable component. |
scope |
google.cloud.securitycenter_v1.types.Cvssv3.Scope
The Scope metric captures whether a vulnerability in one vulnerable component impacts resources in components beyond its security scope. |
confidentiality_impact |
google.cloud.securitycenter_v1.types.Cvssv3.Impact
This metric measures the impact to the confidentiality of the information resources managed by a software component due to a successfully exploited vulnerability. |
integrity_impact |
google.cloud.securitycenter_v1.types.Cvssv3.Impact
This metric measures the impact to integrity of a successfully exploited vulnerability. |
availability_impact |
google.cloud.securitycenter_v1.types.Cvssv3.Impact
This metric measures the impact to the availability of the impacted component resulting from a successfully exploited vulnerability. |
Classes
AttackComplexity
AttackComplexity(value)
This metric describes the conditions beyond the attacker's control that must exist in order to exploit the vulnerability.
AttackVector
AttackVector(value)
This metric reflects the context by which vulnerability exploitation is possible.
Impact
Impact(value)
The Impact metrics capture the effects of a successfully exploited vulnerability on the component that suffers the worst outcome that is most directly and predictably associated with the attack.
PrivilegesRequired
PrivilegesRequired(value)
This metric describes the level of privileges an attacker must possess before successfully exploiting the vulnerability.
Scope
Scope(value)
The Scope metric captures whether a vulnerability in one vulnerable component impacts resources in components beyond its security scope.
UserInteraction
UserInteraction(value)
This metric captures the requirement for a human user, other than the attacker, to participate in the successful compromise of the vulnerable component.