Reference documentation and code samples for the Cloud Security Command Center V1 API module Google::Cloud::SecurityCenter::V1::Cve::ExploitationActivity.
The possible values of exploitation activity of the vulnerability in the
wild.
Constants
EXPLOITATION_ACTIVITY_UNSPECIFIED
value: 0 Invalid or empty value.
WIDE
value: 1 Exploitation has been reported or confirmed to widely occur.
CONFIRMED
value: 2 Limited reported or confirmed exploitation activities.
AVAILABLE
value: 3 Exploit is publicly available.
ANTICIPATED
value: 4 No known exploitation activity, but has a high potential for
exploitation.
[[["Easy to understand","easyToUnderstand","thumb-up"],["Solved my problem","solvedMyProblem","thumb-up"],["Other","otherUp","thumb-up"]],[["Hard to understand","hardToUnderstand","thumb-down"],["Incorrect information or sample code","incorrectInformationOrSampleCode","thumb-down"],["Missing the information/samples I need","missingTheInformationSamplesINeed","thumb-down"],["Other","otherDown","thumb-down"]],["Last updated 2025-09-09 UTC."],[],[],null,["# Cloud Security Command Center V1 API - Module Google::Cloud::SecurityCenter::V1::Cve::ExploitationActivity (v1.5.0)\n\nVersion latestkeyboard_arrow_down\n\n- [1.5.0 (latest)](/ruby/docs/reference/google-cloud-security_center-v1/latest/Google-Cloud-SecurityCenter-V1-Cve-ExploitationActivity)\n- [1.4.1](/ruby/docs/reference/google-cloud-security_center-v1/1.4.1/Google-Cloud-SecurityCenter-V1-Cve-ExploitationActivity)\n- [1.3.0](/ruby/docs/reference/google-cloud-security_center-v1/1.3.0/Google-Cloud-SecurityCenter-V1-Cve-ExploitationActivity)\n- [1.2.0](/ruby/docs/reference/google-cloud-security_center-v1/1.2.0/Google-Cloud-SecurityCenter-V1-Cve-ExploitationActivity)\n- [1.1.0](/ruby/docs/reference/google-cloud-security_center-v1/1.1.0/Google-Cloud-SecurityCenter-V1-Cve-ExploitationActivity)\n- [1.0.0](/ruby/docs/reference/google-cloud-security_center-v1/1.0.0/Google-Cloud-SecurityCenter-V1-Cve-ExploitationActivity)\n- [0.41.0](/ruby/docs/reference/google-cloud-security_center-v1/0.41.0/Google-Cloud-SecurityCenter-V1-Cve-ExploitationActivity)\n- [0.40.0](/ruby/docs/reference/google-cloud-security_center-v1/0.40.0/Google-Cloud-SecurityCenter-V1-Cve-ExploitationActivity)\n- [0.39.0](/ruby/docs/reference/google-cloud-security_center-v1/0.39.0/Google-Cloud-SecurityCenter-V1-Cve-ExploitationActivity)\n- [0.38.0](/ruby/docs/reference/google-cloud-security_center-v1/0.38.0/Google-Cloud-SecurityCenter-V1-Cve-ExploitationActivity)\n- [0.37.0](/ruby/docs/reference/google-cloud-security_center-v1/0.37.0/Google-Cloud-SecurityCenter-V1-Cve-ExploitationActivity)\n- [0.36.0](/ruby/docs/reference/google-cloud-security_center-v1/0.36.0/Google-Cloud-SecurityCenter-V1-Cve-ExploitationActivity)\n- [0.35.0](/ruby/docs/reference/google-cloud-security_center-v1/0.35.0/Google-Cloud-SecurityCenter-V1-Cve-ExploitationActivity)\n- [0.34.2](/ruby/docs/reference/google-cloud-security_center-v1/0.34.2/Google-Cloud-SecurityCenter-V1-Cve-ExploitationActivity)\n- [0.33.0](/ruby/docs/reference/google-cloud-security_center-v1/0.33.0/Google-Cloud-SecurityCenter-V1-Cve-ExploitationActivity)\n- [0.32.0](/ruby/docs/reference/google-cloud-security_center-v1/0.32.0/Google-Cloud-SecurityCenter-V1-Cve-ExploitationActivity)\n- [0.31.1](/ruby/docs/reference/google-cloud-security_center-v1/0.31.1/Google-Cloud-SecurityCenter-V1-Cve-ExploitationActivity)\n- [0.30.0](/ruby/docs/reference/google-cloud-security_center-v1/0.30.0/Google-Cloud-SecurityCenter-V1-Cve-ExploitationActivity)\n- [0.29.1](/ruby/docs/reference/google-cloud-security_center-v1/0.29.1/Google-Cloud-SecurityCenter-V1-Cve-ExploitationActivity)\n- [0.28.0](/ruby/docs/reference/google-cloud-security_center-v1/0.28.0/Google-Cloud-SecurityCenter-V1-Cve-ExploitationActivity)\n- [0.27.0](/ruby/docs/reference/google-cloud-security_center-v1/0.27.0/Google-Cloud-SecurityCenter-V1-Cve-ExploitationActivity)\n- [0.26.0](/ruby/docs/reference/google-cloud-security_center-v1/0.26.0/Google-Cloud-SecurityCenter-V1-Cve-ExploitationActivity)\n- [0.25.1](/ruby/docs/reference/google-cloud-security_center-v1/0.25.1/Google-Cloud-SecurityCenter-V1-Cve-ExploitationActivity)\n- [0.24.0](/ruby/docs/reference/google-cloud-security_center-v1/0.24.0/Google-Cloud-SecurityCenter-V1-Cve-ExploitationActivity)\n- [0.23.0](/ruby/docs/reference/google-cloud-security_center-v1/0.23.0/Google-Cloud-SecurityCenter-V1-Cve-ExploitationActivity)\n- [0.22.0](/ruby/docs/reference/google-cloud-security_center-v1/0.22.0/Google-Cloud-SecurityCenter-V1-Cve-ExploitationActivity)\n- [0.21.0](/ruby/docs/reference/google-cloud-security_center-v1/0.21.0/Google-Cloud-SecurityCenter-V1-Cve-ExploitationActivity)\n- [0.20.0](/ruby/docs/reference/google-cloud-security_center-v1/0.20.0/Google-Cloud-SecurityCenter-V1-Cve-ExploitationActivity)\n- [0.19.0](/ruby/docs/reference/google-cloud-security_center-v1/0.19.0/Google-Cloud-SecurityCenter-V1-Cve-ExploitationActivity)\n- [0.18.0](/ruby/docs/reference/google-cloud-security_center-v1/0.18.0/Google-Cloud-SecurityCenter-V1-Cve-ExploitationActivity)\n- [0.17.0](/ruby/docs/reference/google-cloud-security_center-v1/0.17.0/Google-Cloud-SecurityCenter-V1-Cve-ExploitationActivity)\n- [0.16.0](/ruby/docs/reference/google-cloud-security_center-v1/0.16.0/Google-Cloud-SecurityCenter-V1-Cve-ExploitationActivity)\n- [0.15.0](/ruby/docs/reference/google-cloud-security_center-v1/0.15.0/Google-Cloud-SecurityCenter-V1-Cve-ExploitationActivity)\n- [0.14.0](/ruby/docs/reference/google-cloud-security_center-v1/0.14.0/Google-Cloud-SecurityCenter-V1-Cve-ExploitationActivity)\n- [0.13.0](/ruby/docs/reference/google-cloud-security_center-v1/0.13.0/Google-Cloud-SecurityCenter-V1-Cve-ExploitationActivity)\n- [0.12.1](/ruby/docs/reference/google-cloud-security_center-v1/0.12.1/Google-Cloud-SecurityCenter-V1-Cve-ExploitationActivity)\n- [0.11.1](/ruby/docs/reference/google-cloud-security_center-v1/0.11.1/Google-Cloud-SecurityCenter-V1-Cve-ExploitationActivity) \nReference documentation and code samples for the Cloud Security Command Center V1 API module Google::Cloud::SecurityCenter::V1::Cve::ExploitationActivity.\n\nThe possible values of exploitation activity of the vulnerability in the\nwild.\n\nConstants\n---------\n\n### EXPLOITATION_ACTIVITY_UNSPECIFIED\n\n**value:** 0 \nInvalid or empty value.\n\n### WIDE\n\n**value:** 1 \nExploitation has been reported or confirmed to widely occur.\n\n### CONFIRMED\n\n**value:** 2 \nLimited reported or confirmed exploitation activities.\n\n### AVAILABLE\n\n**value:** 3 \nExploit is publicly available.\n\n### ANTICIPATED\n\n**value:** 4 \nNo known exploitation activity, but has a high potential for\nexploitation.\n\n### NO_KNOWN\n\n**value:** 5 \nNo known exploitation activity."]]