public CVSSv3.Types.Impact ConfidentialityImpact { get; set; }
This metric measures the impact to the confidentiality of the information
resources managed by a software component due to a successfully exploited
vulnerability.
public CVSSv3.Types.UserInteraction UserInteraction { get; set; }
This metric captures the requirement for a human user, other than the
attacker, to participate in the successful compromise of the vulnerable
component.
[[["Easy to understand","easyToUnderstand","thumb-up"],["Solved my problem","solvedMyProblem","thumb-up"],["Other","otherUp","thumb-up"]],[["Missing the information I need","missingTheInformationINeed","thumb-down"],["Too complicated / too many steps","tooComplicatedTooManySteps","thumb-down"],["Out of date","outOfDate","thumb-down"],["Samples / code issue","samplesCodeIssue","thumb-down"],["Other","otherDown","thumb-down"]],["Last updated 2025-08-12 UTC."],[[["\u003cp\u003eThe \u003ccode\u003eCVSSv3\u003c/code\u003e class in the Google Cloud OS Config v1 API is used to represent the Common Vulnerability Scoring System version 3, which is detailed further at \u003ccode\u003ehttps://www.first.org/cvss/specification-document\u003c/code\u003e.\u003c/p\u003e\n"],["\u003cp\u003eThis class, available in the \u003ccode\u003eGoogle.Cloud.OsConfig.V1\u003c/code\u003e namespace, provides properties such as \u003ccode\u003eAttackComplexity\u003c/code\u003e, \u003ccode\u003eAttackVector\u003c/code\u003e, \u003ccode\u003eAvailabilityImpact\u003c/code\u003e, and \u003ccode\u003eBaseScore\u003c/code\u003e to define various aspects of vulnerability scoring.\u003c/p\u003e\n"],["\u003cp\u003eThe latest version of \u003ccode\u003eCVSSv3\u003c/code\u003e is 2.4.0, with the documentation showing versions ranging back to 1.3.0, each providing reference to the same class but in their respective versions.\u003c/p\u003e\n"],["\u003cp\u003eThe \u003ccode\u003eCVSSv3\u003c/code\u003e class inherits from \u003ccode\u003eobject\u003c/code\u003e and implements interfaces like \u003ccode\u003eIMessage\u003c/code\u003e, \u003ccode\u003eIEquatable<CVSSv3>\u003c/code\u003e, \u003ccode\u003eIDeepCloneable<CVSSv3>\u003c/code\u003e, and \u003ccode\u003eIBufferMessage\u003c/code\u003e.\u003c/p\u003e\n"],["\u003cp\u003e\u003ccode\u003eCVSSv3\u003c/code\u003e's properties provide information on the metrics related to vulnerability impact, such as \u003ccode\u003eConfidentialityImpact\u003c/code\u003e, \u003ccode\u003eIntegrityImpact\u003c/code\u003e, \u003ccode\u003eExploitabilityScore\u003c/code\u003e, \u003ccode\u003eImpactScore\u003c/code\u003e, and if any privileges or user interactions are required.\u003c/p\u003e\n"]]],[],null,["# Google Cloud OS Config v1 API - Class CVSSv3 (2.5.0)\n\nVersion latestkeyboard_arrow_down\n\n- [2.5.0 (latest)](/dotnet/docs/reference/Google.Cloud.OsConfig.V1/latest/Google.Cloud.OsConfig.V1.CVSSv3)\n- [2.4.0](/dotnet/docs/reference/Google.Cloud.OsConfig.V1/2.4.0/Google.Cloud.OsConfig.V1.CVSSv3)\n- [2.3.0](/dotnet/docs/reference/Google.Cloud.OsConfig.V1/2.3.0/Google.Cloud.OsConfig.V1.CVSSv3)\n- [2.2.0](/dotnet/docs/reference/Google.Cloud.OsConfig.V1/2.2.0/Google.Cloud.OsConfig.V1.CVSSv3)\n- [2.1.0](/dotnet/docs/reference/Google.Cloud.OsConfig.V1/2.1.0/Google.Cloud.OsConfig.V1.CVSSv3)\n- [2.0.0](/dotnet/docs/reference/Google.Cloud.OsConfig.V1/2.0.0/Google.Cloud.OsConfig.V1.CVSSv3)\n- [1.8.0](/dotnet/docs/reference/Google.Cloud.OsConfig.V1/1.8.0/Google.Cloud.OsConfig.V1.CVSSv3)\n- [1.7.0](/dotnet/docs/reference/Google.Cloud.OsConfig.V1/1.7.0/Google.Cloud.OsConfig.V1.CVSSv3)\n- [1.6.0](/dotnet/docs/reference/Google.Cloud.OsConfig.V1/1.6.0/Google.Cloud.OsConfig.V1.CVSSv3)\n- [1.5.0](/dotnet/docs/reference/Google.Cloud.OsConfig.V1/1.5.0/Google.Cloud.OsConfig.V1.CVSSv3)\n- [1.4.0](/dotnet/docs/reference/Google.Cloud.OsConfig.V1/1.4.0/Google.Cloud.OsConfig.V1.CVSSv3)\n- [1.3.0](/dotnet/docs/reference/Google.Cloud.OsConfig.V1/1.3.0/Google.Cloud.OsConfig.V1.CVSSv3) \n\n public sealed class CVSSv3 : IMessage\u003cCVSSv3\u003e, IEquatable\u003cCVSSv3\u003e, IDeepCloneable\u003cCVSSv3\u003e, IBufferMessage, IMessage\n\nReference documentation and code samples for the Google Cloud OS Config v1 API class CVSSv3.\n\nCommon Vulnerability Scoring System version 3.\nFor details, see \u003chttps://www.first.org/cvss/specification-document\u003e \n\nInheritance\n-----------\n\n[object](https://learn.microsoft.com/dotnet/api/system.object) \\\u003e CVSSv3 \n\nImplements\n----------\n\n[IMessage](https://cloud.google.com/dotnet/docs/reference/Google.Protobuf/latest/Google.Protobuf.IMessage-1.html)[CVSSv3](/dotnet/docs/reference/Google.Cloud.OsConfig.V1/latest/Google.Cloud.OsConfig.V1.CVSSv3), [IEquatable](https://learn.microsoft.com/dotnet/api/system.iequatable-1)[CVSSv3](/dotnet/docs/reference/Google.Cloud.OsConfig.V1/latest/Google.Cloud.OsConfig.V1.CVSSv3), [IDeepCloneable](https://cloud.google.com/dotnet/docs/reference/Google.Protobuf/latest/Google.Protobuf.IDeepCloneable-1.html)[CVSSv3](/dotnet/docs/reference/Google.Cloud.OsConfig.V1/latest/Google.Cloud.OsConfig.V1.CVSSv3), [IBufferMessage](https://cloud.google.com/dotnet/docs/reference/Google.Protobuf/latest/Google.Protobuf.IBufferMessage.html), [IMessage](https://cloud.google.com/dotnet/docs/reference/Google.Protobuf/latest/Google.Protobuf.IMessage.html) \n\nInherited Members\n-----------------\n\n[object.GetHashCode()](https://learn.microsoft.com/dotnet/api/system.object.gethashcode) \n[object.GetType()](https://learn.microsoft.com/dotnet/api/system.object.gettype) \n[object.ToString()](https://learn.microsoft.com/dotnet/api/system.object.tostring)\n\nNamespace\n---------\n\n[Google.Cloud.OsConfig.V1](/dotnet/docs/reference/Google.Cloud.OsConfig.V1/latest/Google.Cloud.OsConfig.V1)\n\nAssembly\n--------\n\nGoogle.Cloud.OsConfig.V1.dll\n\nConstructors\n------------\n\n### CVSSv3()\n\n public CVSSv3()\n\n### CVSSv3(CVSSv3)\n\n public CVSSv3(CVSSv3 other)\n\nProperties\n----------\n\n### AttackComplexity\n\n public CVSSv3.Types.AttackComplexity AttackComplexity { get; set; }\n\nThis metric describes the conditions beyond the attacker's control that\nmust exist in order to exploit the vulnerability.\n\n### AttackVector\n\n public CVSSv3.Types.AttackVector AttackVector { get; set; }\n\nThis metric reflects the context by which vulnerability exploitation is\npossible.\n\n### AvailabilityImpact\n\n public CVSSv3.Types.Impact AvailabilityImpact { get; set; }\n\nThis metric measures the impact to the availability of the impacted\ncomponent resulting from a successfully exploited vulnerability.\n\n### BaseScore\n\n public float BaseScore { get; set; }\n\nThe base score is a function of the base metric scores.\n\u003chttps://www.first.org/cvss/specification-document#Base-Metrics\u003e\n\n### ConfidentialityImpact\n\n public CVSSv3.Types.Impact ConfidentialityImpact { get; set; }\n\nThis metric measures the impact to the confidentiality of the information\nresources managed by a software component due to a successfully exploited\nvulnerability.\n\n### ExploitabilityScore\n\n public float ExploitabilityScore { get; set; }\n\nThe Exploitability sub-score equation is derived from the Base\nExploitability metrics.\n\u003chttps://www.first.org/cvss/specification-document#2-1-Exploitability-Metrics\u003e\n\n### ImpactScore\n\n public float ImpactScore { get; set; }\n\nThe Impact sub-score equation is derived from the Base Impact metrics.\n\n### IntegrityImpact\n\n public CVSSv3.Types.Impact IntegrityImpact { get; set; }\n\nThis metric measures the impact to integrity of a successfully exploited\nvulnerability.\n\n### PrivilegesRequired\n\n public CVSSv3.Types.PrivilegesRequired PrivilegesRequired { get; set; }\n\nThis metric describes the level of privileges an attacker must possess\nbefore successfully exploiting the vulnerability.\n\n### Scope\n\n public CVSSv3.Types.Scope Scope { get; set; }\n\nThe Scope metric captures whether a vulnerability in one vulnerable\ncomponent impacts resources in components beyond its security scope.\n\n### UserInteraction\n\n public CVSSv3.Types.UserInteraction UserInteraction { get; set; }\n\nThis metric captures the requirement for a human user, other than the\nattacker, to participate in the successful compromise of the vulnerable\ncomponent."]]