Exploitation would fundamentally undermine the security of affected
systems, enable actors to perform significant attacks with minimal
effort, with little to no mitigating factors to overcome.
High
Exploitation would enable attackers to have a notable direct impact
without needing to overcome any major mitigating factors.
Low
Exploitation would have little to no security impact.
Medium
Exploitation would enable attackers to perform activities, or could allow
attackers to have a direct impact, but would require additional steps.
[[["Easy to understand","easyToUnderstand","thumb-up"],["Solved my problem","solvedMyProblem","thumb-up"],["Other","otherUp","thumb-up"]],[["Missing the information I need","missingTheInformationINeed","thumb-down"],["Too complicated / too many steps","tooComplicatedTooManySteps","thumb-down"],["Out of date","outOfDate","thumb-down"],["Samples / code issue","samplesCodeIssue","thumb-down"],["Other","otherDown","thumb-down"]],["Last updated 2025-08-07 UTC."],[[["\u003cp\u003eThis page provides documentation for the \u003ccode\u003eCve.Types.RiskRating\u003c/code\u003e enum within the Google Cloud Security Center v1 API.\u003c/p\u003e\n"],["\u003cp\u003eThe \u003ccode\u003eCve.Types.RiskRating\u003c/code\u003e enum defines the potential impact of a vulnerability if exploited, with values including \u003ccode\u003eCritical\u003c/code\u003e, \u003ccode\u003eHigh\u003c/code\u003e, \u003ccode\u003eMedium\u003c/code\u003e, \u003ccode\u003eLow\u003c/code\u003e, and \u003ccode\u003eUnspecified\u003c/code\u003e.\u003c/p\u003e\n"],["\u003cp\u003eThe latest version available is 3.24.0, and the page also provides links to documentation for previous versions, down to 2.2.0.\u003c/p\u003e\n"],["\u003cp\u003eThe documentation covers the fields associated with the \u003ccode\u003eRiskRating\u003c/code\u003e enum, outlining the implications of each rating from minimal impact to undermining the security of the system.\u003c/p\u003e\n"]]],[],null,[]]