The vulnerable component is bound to the network stack, but the attack is
limited at the protocol level to a logically adjacent topology.
Local
The vulnerable component is not bound to the network stack and the
attacker's path is via read/write/execute capabilities.
Network
The vulnerable component is bound to the network stack and the set of
possible attackers extends beyond the other options listed below, up to
and including the entire Internet.
Physical
The attack requires the attacker to physically touch or manipulate the
vulnerable component.
[[["Easy to understand","easyToUnderstand","thumb-up"],["Solved my problem","solvedMyProblem","thumb-up"],["Other","otherUp","thumb-up"]],[["Missing the information I need","missingTheInformationINeed","thumb-down"],["Too complicated / too many steps","tooComplicatedTooManySteps","thumb-down"],["Out of date","outOfDate","thumb-down"],["Samples / code issue","samplesCodeIssue","thumb-down"],["Other","otherDown","thumb-down"]],["Last updated 2025-08-07 UTC."],[[["\u003cp\u003eThe documentation covers various versions of the Google Cloud SecurityCenter v1 API, ranging from version 2.2.0 to the latest 3.24.0.\u003c/p\u003e\n"],["\u003cp\u003eThe content focuses on the \u003ccode\u003eCvssv3.Types.AttackVector\u003c/code\u003e enum within the API, detailing its use in assessing vulnerability exploitation.\u003c/p\u003e\n"],["\u003cp\u003eThe \u003ccode\u003eAttackVector\u003c/code\u003e enum has five fields: \u003ccode\u003eAdjacent\u003c/code\u003e, \u003ccode\u003eLocal\u003c/code\u003e, \u003ccode\u003eNetwork\u003c/code\u003e, \u003ccode\u003ePhysical\u003c/code\u003e, and \u003ccode\u003eUnspecified\u003c/code\u003e, each describing a different context for potential vulnerability exploitation.\u003c/p\u003e\n"],["\u003cp\u003eThe different versions represent historical changes and updates to this api documentation, with the full list of versions available for review.\u003c/p\u003e\n"]]],[],null,[]]