Send feedback
Class AttackVector (1.39.0)
Stay organized with collections
Save and categorize content based on your preferences.
Version latestkeyboard_arrow_down
This metric reflects the context by which vulnerability
exploitation is possible.
Enums
Name
Description
ATTACK_VECTOR_UNSPECIFIED
Invalid value.
ATTACK_VECTOR_NETWORK
The vulnerable component is bound to the network stack and the set of possible attackers extends beyond the other options listed below, up to and including the entire Internet.
ATTACK_VECTOR_ADJACENT
The vulnerable component is bound to the network stack, but the attack is limited at the protocol level to a logically adjacent topology.
ATTACK_VECTOR_LOCAL
The vulnerable component is not bound to the network stack and the attacker's path is via read/write/execute capabilities.
ATTACK_VECTOR_PHYSICAL
The attack requires the attacker to physically touch or manipulate the vulnerable component.
Send feedback
Except as otherwise noted, the content of this page is licensed under the Creative Commons Attribution 4.0 License , and code samples are licensed under the Apache 2.0 License . For details, see the Google Developers Site Policies . Java is a registered trademark of Oracle and/or its affiliates.
Last updated 2025-09-09 UTC.
Need to tell us more?
[[["Easy to understand","easyToUnderstand","thumb-up"],["Solved my problem","solvedMyProblem","thumb-up"],["Other","otherUp","thumb-up"]],[["Hard to understand","hardToUnderstand","thumb-down"],["Incorrect information or sample code","incorrectInformationOrSampleCode","thumb-down"],["Missing the information/samples I need","missingTheInformationSamplesINeed","thumb-down"],["Other","otherDown","thumb-down"]],["Last updated 2025-09-09 UTC."],[],[],null,["# Class AttackVector (1.39.0)\n\nVersion latestkeyboard_arrow_down\n\n- [1.39.0 (latest)](/python/docs/reference/securitycenter/latest/google.cloud.securitycenter_v2.types.Cvssv3.AttackVector)\n- [1.38.0](/python/docs/reference/securitycenter/1.38.0/google.cloud.securitycenter_v2.types.Cvssv3.AttackVector)\n- [1.37.0](/python/docs/reference/securitycenter/1.37.0/google.cloud.securitycenter_v2.types.Cvssv3.AttackVector)\n- [1.36.0](/python/docs/reference/securitycenter/1.36.0/google.cloud.securitycenter_v2.types.Cvssv3.AttackVector)\n- [1.35.1](/python/docs/reference/securitycenter/1.35.1/google.cloud.securitycenter_v2.types.Cvssv3.AttackVector)\n- [1.33.1](/python/docs/reference/securitycenter/1.33.1/google.cloud.securitycenter_v2.types.Cvssv3.AttackVector)\n- [1.32.1](/python/docs/reference/securitycenter/1.32.1/google.cloud.securitycenter_v2.types.Cvssv3.AttackVector)\n- [1.31.0](/python/docs/reference/securitycenter/1.31.0/google.cloud.securitycenter_v2.types.Cvssv3.AttackVector)\n- [1.30.1](/python/docs/reference/securitycenter/1.30.1/google.cloud.securitycenter_v2.types.Cvssv3.AttackVector)\n- [1.29.0](/python/docs/reference/securitycenter/1.29.0/google.cloud.securitycenter_v2.types.Cvssv3.AttackVector)\n- [1.28.0](/python/docs/reference/securitycenter/1.28.0/google.cloud.securitycenter_v2.types.Cvssv3.AttackVector)\n- [1.27.0](/python/docs/reference/securitycenter/1.27.0/google.cloud.securitycenter_v2.types.Cvssv3.AttackVector)\n- [1.26.1](/python/docs/reference/securitycenter/1.26.1/google.cloud.securitycenter_v2.types.Cvssv3.AttackVector)\n- [1.25.0](/python/docs/reference/securitycenter/1.25.0/google.cloud.securitycenter_v2.types.Cvssv3.AttackVector)\n- [1.24.1](/python/docs/reference/securitycenter/1.24.1/google.cloud.securitycenter_v2.types.Cvssv3.AttackVector)\n- [1.23.2](/python/docs/reference/securitycenter/1.23.2/google.cloud.securitycenter_v2.types.Cvssv3.AttackVector)\n- [1.22.0](/python/docs/reference/securitycenter/1.22.0/google.cloud.securitycenter_v2.types.Cvssv3.AttackVector)\n- [1.21.0](/python/docs/reference/securitycenter/1.21.0/google.cloud.securitycenter_v2.types.Cvssv3.AttackVector)\n- [1.20.0](/python/docs/reference/securitycenter/1.20.0/google.cloud.securitycenter_v2.types.Cvssv3.AttackVector)\n- [1.19.1](/python/docs/reference/securitycenter/1.19.1/google.cloud.securitycenter_v2.types.Cvssv3.AttackVector)\n- [1.18.2](/python/docs/reference/securitycenter/1.18.2/google.cloud.securitycenter_v2.types.Cvssv3.AttackVector)\n- [1.17.0](/python/docs/reference/securitycenter/1.17.0/google.cloud.securitycenter_v2.types.Cvssv3.AttackVector)\n- [1.16.2](/python/docs/reference/securitycenter/1.16.2/google.cloud.securitycenter_v2.types.Cvssv3.AttackVector)\n- [1.15.0](/python/docs/reference/securitycenter/1.15.0/google.cloud.securitycenter_v2.types.Cvssv3.AttackVector)\n- [1.14.0](/python/docs/reference/securitycenter/1.14.0/google.cloud.securitycenter_v2.types.Cvssv3.AttackVector)\n- [1.13.0](/python/docs/reference/securitycenter/1.13.0/google.cloud.securitycenter_v2.types.Cvssv3.AttackVector)\n- [1.12.0](/python/docs/reference/securitycenter/1.12.0/google.cloud.securitycenter_v2.types.Cvssv3.AttackVector)\n- [1.11.1](/python/docs/reference/securitycenter/1.11.1/google.cloud.securitycenter_v2.types.Cvssv3.AttackVector)\n- [1.10.0](/python/docs/reference/securitycenter/1.10.0/google.cloud.securitycenter_v2.types.Cvssv3.AttackVector)\n- [1.9.0](/python/docs/reference/securitycenter/1.9.0/google.cloud.securitycenter_v2.types.Cvssv3.AttackVector)\n- [1.8.0](/python/docs/reference/securitycenter/1.8.0/google.cloud.securitycenter_v2.types.Cvssv3.AttackVector)\n- [1.7.0](/python/docs/reference/securitycenter/1.7.0/google.cloud.securitycenter_v2.types.Cvssv3.AttackVector)\n- [1.6.0](/python/docs/reference/securitycenter/1.6.0/google.cloud.securitycenter_v2.types.Cvssv3.AttackVector)\n- [1.5.2](/python/docs/reference/securitycenter/1.5.2/google.cloud.securitycenter_v2.types.Cvssv3.AttackVector)\n- [1.4.0](/python/docs/reference/securitycenter/1.4.0/google.cloud.securitycenter_v2.types.Cvssv3.AttackVector)\n- [1.3.1](/python/docs/reference/securitycenter/1.3.1/google.cloud.securitycenter_v2.types.Cvssv3.AttackVector)\n- [1.2.0](/python/docs/reference/securitycenter/1.2.0/google.cloud.securitycenter_v2.types.Cvssv3.AttackVector)\n- [1.1.0](/python/docs/reference/securitycenter/1.1.0/google.cloud.securitycenter_v2.types.Cvssv3.AttackVector)\n- [1.0.0](/python/docs/reference/securitycenter/1.0.0/google.cloud.securitycenter_v2.types.Cvssv3.AttackVector)\n- [0.7.3](/python/docs/reference/securitycenter/0.7.3/google.cloud.securitycenter_v2.types.Cvssv3.AttackVector)\n- [0.6.0](/python/docs/reference/securitycenter/0.6.0/google.cloud.securitycenter_v2.types.Cvssv3.AttackVector)\n- [0.5.0](/python/docs/reference/securitycenter/0.5.0/google.cloud.securitycenter_v2.types.Cvssv3.AttackVector)\n- [0.4.0](/python/docs/reference/securitycenter/0.4.0/google.cloud.securitycenter_v2.types.Cvssv3.AttackVector)\n- [0.3.0](/python/docs/reference/securitycenter/0.3.0/google.cloud.securitycenter_v2.types.Cvssv3.AttackVector) \n\n AttackVector(value)\n\nThis metric reflects the context by which vulnerability\nexploitation is possible."]]