[[["Easy to understand","easyToUnderstand","thumb-up"],["Solved my problem","solvedMyProblem","thumb-up"],["Other","otherUp","thumb-up"]],[["Hard to understand","hardToUnderstand","thumb-down"],["Incorrect information or sample code","incorrectInformationOrSampleCode","thumb-down"],["Missing the information/samples I need","missingTheInformationSamplesINeed","thumb-down"],["Other","otherDown","thumb-down"]],["Last updated 2025-09-09 UTC."],[],[],null,["# Security Command Center V2 API - Module Google::Cloud::SecurityCenter::V2::Cve::ExploitationActivity (v1.3.0)\n\nVersion latestkeyboard_arrow_down\n\n- [1.3.0 (latest)](/ruby/docs/reference/google-cloud-security_center-v2/latest/Google-Cloud-SecurityCenter-V2-Cve-ExploitationActivity)\n- [1.2.0](/ruby/docs/reference/google-cloud-security_center-v2/1.2.0/Google-Cloud-SecurityCenter-V2-Cve-ExploitationActivity)\n- [1.1.1](/ruby/docs/reference/google-cloud-security_center-v2/1.1.1/Google-Cloud-SecurityCenter-V2-Cve-ExploitationActivity)\n- [1.0.0](/ruby/docs/reference/google-cloud-security_center-v2/1.0.0/Google-Cloud-SecurityCenter-V2-Cve-ExploitationActivity)\n- [0.6.0](/ruby/docs/reference/google-cloud-security_center-v2/0.6.0/Google-Cloud-SecurityCenter-V2-Cve-ExploitationActivity)\n- [0.5.0](/ruby/docs/reference/google-cloud-security_center-v2/0.5.0/Google-Cloud-SecurityCenter-V2-Cve-ExploitationActivity)\n- [0.4.1](/ruby/docs/reference/google-cloud-security_center-v2/0.4.1/Google-Cloud-SecurityCenter-V2-Cve-ExploitationActivity)\n- [0.3.0](/ruby/docs/reference/google-cloud-security_center-v2/0.3.0/Google-Cloud-SecurityCenter-V2-Cve-ExploitationActivity)\n- [0.2.0](/ruby/docs/reference/google-cloud-security_center-v2/0.2.0/Google-Cloud-SecurityCenter-V2-Cve-ExploitationActivity)\n- [0.1.0](/ruby/docs/reference/google-cloud-security_center-v2/0.1.0/Google-Cloud-SecurityCenter-V2-Cve-ExploitationActivity) \nReference documentation and code samples for the Security Command Center V2 API module Google::Cloud::SecurityCenter::V2::Cve::ExploitationActivity.\n\nThe possible values of exploitation activity of the vulnerability in the\nwild.\n\nConstants\n---------\n\n### EXPLOITATION_ACTIVITY_UNSPECIFIED\n\n**value:** 0 \nInvalid or empty value.\n\n### WIDE\n\n**value:** 1 \nExploitation has been reported or confirmed to widely occur.\n\n### CONFIRMED\n\n**value:** 2 \nLimited reported or confirmed exploitation activities.\n\n### AVAILABLE\n\n**value:** 3 \nExploit is publicly available.\n\n### ANTICIPATED\n\n**value:** 4 \nNo known exploitation activity, but has a high potential for\nexploitation.\n\n### NO_KNOWN\n\n**value:** 5 \nNo known exploitation activity."]]