public Cvssv3.Types.AttackVector AttackVector { get; set; }
Base Metrics
Represents the intrinsic characteristics of a vulnerability that are
constant over time and across user environments.
This metric reflects the context by which vulnerability exploitation is
possible.
public Cvssv3.Types.Impact ConfidentialityImpact { get; set; }
This metric measures the impact to the confidentiality of the information
resources managed by a software component due to a successfully exploited
vulnerability.
public Cvssv3.Types.UserInteraction UserInteraction { get; set; }
This metric captures the requirement for a human user, other than the
attacker, to participate in the successful compromise of the vulnerable
component.
[[["Easy to understand","easyToUnderstand","thumb-up"],["Solved my problem","solvedMyProblem","thumb-up"],["Other","otherUp","thumb-up"]],[["Missing the information I need","missingTheInformationINeed","thumb-down"],["Too complicated / too many steps","tooComplicatedTooManySteps","thumb-down"],["Out of date","outOfDate","thumb-down"],["Samples / code issue","samplesCodeIssue","thumb-down"],["Other","otherDown","thumb-down"]],["Last updated 2025-08-07 UTC."],[[["\u003cp\u003eThe latest version of the Google Cloud Security Center v1 API class Cvssv3 is 3.24.0, with a full list of previous versions also being available to browse.\u003c/p\u003e\n"],["\u003cp\u003eCvssv3 is a class representing the Common Vulnerability Scoring System version 3, which is used to quantify the severity of vulnerabilities.\u003c/p\u003e\n"],["\u003cp\u003eThe Cvssv3 class provides various properties related to vulnerability scoring, including AttackComplexity, AttackVector, AvailabilityImpact, BaseScore, ConfidentialityImpact, IntegrityImpact, PrivilegesRequired, Scope, and UserInteraction.\u003c/p\u003e\n"],["\u003cp\u003eThe class implements several interfaces, including IMessage, IEquatable, IDeepCloneable, and IBufferMessage, allowing for various functionalities like deep cloning and equality checking.\u003c/p\u003e\n"],["\u003cp\u003eThe Cvssv3 class contains two constructors, one being empty and another that takes in another Cvssv3 object.\u003c/p\u003e\n"]]],[],null,["# Google Cloud Security Command Center v1 API - Class Cvssv3 (3.24.0)\n\nVersion latestkeyboard_arrow_down\n\n- [3.24.0 (latest)](/dotnet/docs/reference/Google.Cloud.SecurityCenter.V1/latest/Google.Cloud.SecurityCenter.V1.Cvssv3)\n- [3.23.0](/dotnet/docs/reference/Google.Cloud.SecurityCenter.V1/3.23.0/Google.Cloud.SecurityCenter.V1.Cvssv3)\n- [3.22.0](/dotnet/docs/reference/Google.Cloud.SecurityCenter.V1/3.22.0/Google.Cloud.SecurityCenter.V1.Cvssv3)\n- [3.21.0](/dotnet/docs/reference/Google.Cloud.SecurityCenter.V1/3.21.0/Google.Cloud.SecurityCenter.V1.Cvssv3)\n- [3.20.0](/dotnet/docs/reference/Google.Cloud.SecurityCenter.V1/3.20.0/Google.Cloud.SecurityCenter.V1.Cvssv3)\n- [3.19.0](/dotnet/docs/reference/Google.Cloud.SecurityCenter.V1/3.19.0/Google.Cloud.SecurityCenter.V1.Cvssv3)\n- [3.18.0](/dotnet/docs/reference/Google.Cloud.SecurityCenter.V1/3.18.0/Google.Cloud.SecurityCenter.V1.Cvssv3)\n- [3.17.0](/dotnet/docs/reference/Google.Cloud.SecurityCenter.V1/3.17.0/Google.Cloud.SecurityCenter.V1.Cvssv3)\n- [3.16.0](/dotnet/docs/reference/Google.Cloud.SecurityCenter.V1/3.16.0/Google.Cloud.SecurityCenter.V1.Cvssv3)\n- [3.15.0](/dotnet/docs/reference/Google.Cloud.SecurityCenter.V1/3.15.0/Google.Cloud.SecurityCenter.V1.Cvssv3)\n- [3.14.0](/dotnet/docs/reference/Google.Cloud.SecurityCenter.V1/3.14.0/Google.Cloud.SecurityCenter.V1.Cvssv3)\n- [3.13.0](/dotnet/docs/reference/Google.Cloud.SecurityCenter.V1/3.13.0/Google.Cloud.SecurityCenter.V1.Cvssv3)\n- [3.12.0](/dotnet/docs/reference/Google.Cloud.SecurityCenter.V1/3.12.0/Google.Cloud.SecurityCenter.V1.Cvssv3)\n- [3.11.0](/dotnet/docs/reference/Google.Cloud.SecurityCenter.V1/3.11.0/Google.Cloud.SecurityCenter.V1.Cvssv3)\n- [3.10.0](/dotnet/docs/reference/Google.Cloud.SecurityCenter.V1/3.10.0/Google.Cloud.SecurityCenter.V1.Cvssv3)\n- [3.9.0](/dotnet/docs/reference/Google.Cloud.SecurityCenter.V1/3.9.0/Google.Cloud.SecurityCenter.V1.Cvssv3)\n- [3.8.0](/dotnet/docs/reference/Google.Cloud.SecurityCenter.V1/3.8.0/Google.Cloud.SecurityCenter.V1.Cvssv3)\n- [3.7.0](/dotnet/docs/reference/Google.Cloud.SecurityCenter.V1/3.7.0/Google.Cloud.SecurityCenter.V1.Cvssv3)\n- [3.6.0](/dotnet/docs/reference/Google.Cloud.SecurityCenter.V1/3.6.0/Google.Cloud.SecurityCenter.V1.Cvssv3)\n- [3.5.0](/dotnet/docs/reference/Google.Cloud.SecurityCenter.V1/3.5.0/Google.Cloud.SecurityCenter.V1.Cvssv3)\n- [3.4.0](/dotnet/docs/reference/Google.Cloud.SecurityCenter.V1/3.4.0/Google.Cloud.SecurityCenter.V1.Cvssv3)\n- [3.3.0](/dotnet/docs/reference/Google.Cloud.SecurityCenter.V1/3.3.0/Google.Cloud.SecurityCenter.V1.Cvssv3)\n- [3.2.0](/dotnet/docs/reference/Google.Cloud.SecurityCenter.V1/3.2.0/Google.Cloud.SecurityCenter.V1.Cvssv3)\n- [3.1.0](/dotnet/docs/reference/Google.Cloud.SecurityCenter.V1/3.1.0/Google.Cloud.SecurityCenter.V1.Cvssv3)\n- [3.0.0](/dotnet/docs/reference/Google.Cloud.SecurityCenter.V1/3.0.0/Google.Cloud.SecurityCenter.V1.Cvssv3)\n- [2.13.0](/dotnet/docs/reference/Google.Cloud.SecurityCenter.V1/2.13.0/Google.Cloud.SecurityCenter.V1.Cvssv3)\n- [2.12.0](/dotnet/docs/reference/Google.Cloud.SecurityCenter.V1/2.12.0/Google.Cloud.SecurityCenter.V1.Cvssv3)\n- [2.11.0](/dotnet/docs/reference/Google.Cloud.SecurityCenter.V1/2.11.0/Google.Cloud.SecurityCenter.V1.Cvssv3)\n- [2.10.0](/dotnet/docs/reference/Google.Cloud.SecurityCenter.V1/2.10.0/Google.Cloud.SecurityCenter.V1.Cvssv3)\n- [2.9.0](/dotnet/docs/reference/Google.Cloud.SecurityCenter.V1/2.9.0/Google.Cloud.SecurityCenter.V1.Cvssv3)\n- [2.8.0](/dotnet/docs/reference/Google.Cloud.SecurityCenter.V1/2.8.0/Google.Cloud.SecurityCenter.V1.Cvssv3)\n- [2.7.0](/dotnet/docs/reference/Google.Cloud.SecurityCenter.V1/2.7.0/Google.Cloud.SecurityCenter.V1.Cvssv3)\n- [2.6.0](/dotnet/docs/reference/Google.Cloud.SecurityCenter.V1/2.6.0/Google.Cloud.SecurityCenter.V1.Cvssv3)\n- [2.5.0](/dotnet/docs/reference/Google.Cloud.SecurityCenter.V1/2.5.0/Google.Cloud.SecurityCenter.V1.Cvssv3)\n- [2.4.0](/dotnet/docs/reference/Google.Cloud.SecurityCenter.V1/2.4.0/Google.Cloud.SecurityCenter.V1.Cvssv3)\n- [2.3.0](/dotnet/docs/reference/Google.Cloud.SecurityCenter.V1/2.3.0/Google.Cloud.SecurityCenter.V1.Cvssv3)\n- [2.2.0](/dotnet/docs/reference/Google.Cloud.SecurityCenter.V1/2.2.0/Google.Cloud.SecurityCenter.V1.Cvssv3) \n\n public sealed class Cvssv3 : IMessage\u003cCvssv3\u003e, IEquatable\u003cCvssv3\u003e, IDeepCloneable\u003cCvssv3\u003e, IBufferMessage, IMessage\n\nReference documentation and code samples for the Google Cloud Security Command Center v1 API class Cvssv3.\n\nCommon Vulnerability Scoring System version 3. \n\nInheritance\n-----------\n\n[object](https://learn.microsoft.com/dotnet/api/system.object) \\\u003e Cvssv3 \n\nImplements\n----------\n\n[IMessage](https://cloud.google.com/dotnet/docs/reference/Google.Protobuf/latest/Google.Protobuf.IMessage-1.html)[Cvssv3](/dotnet/docs/reference/Google.Cloud.SecurityCenter.V1/latest/Google.Cloud.SecurityCenter.V1.Cvssv3), [IEquatable](https://learn.microsoft.com/dotnet/api/system.iequatable-1)[Cvssv3](/dotnet/docs/reference/Google.Cloud.SecurityCenter.V1/latest/Google.Cloud.SecurityCenter.V1.Cvssv3), [IDeepCloneable](https://cloud.google.com/dotnet/docs/reference/Google.Protobuf/latest/Google.Protobuf.IDeepCloneable-1.html)[Cvssv3](/dotnet/docs/reference/Google.Cloud.SecurityCenter.V1/latest/Google.Cloud.SecurityCenter.V1.Cvssv3), [IBufferMessage](https://cloud.google.com/dotnet/docs/reference/Google.Protobuf/latest/Google.Protobuf.IBufferMessage.html), [IMessage](https://cloud.google.com/dotnet/docs/reference/Google.Protobuf/latest/Google.Protobuf.IMessage.html) \n\nInherited Members\n-----------------\n\n[object.GetHashCode()](https://learn.microsoft.com/dotnet/api/system.object.gethashcode) \n[object.GetType()](https://learn.microsoft.com/dotnet/api/system.object.gettype) \n[object.ToString()](https://learn.microsoft.com/dotnet/api/system.object.tostring)\n\nNamespace\n---------\n\n[Google.Cloud.SecurityCenter.V1](/dotnet/docs/reference/Google.Cloud.SecurityCenter.V1/latest/Google.Cloud.SecurityCenter.V1)\n\nAssembly\n--------\n\nGoogle.Cloud.SecurityCenter.V1.dll\n\nConstructors\n------------\n\n### Cvssv3()\n\n public Cvssv3()\n\n### Cvssv3(Cvssv3)\n\n public Cvssv3(Cvssv3 other)\n\nProperties\n----------\n\n### AttackComplexity\n\n public Cvssv3.Types.AttackComplexity AttackComplexity { get; set; }\n\nThis metric describes the conditions beyond the attacker's control that\nmust exist in order to exploit the vulnerability.\n\n### AttackVector\n\n public Cvssv3.Types.AttackVector AttackVector { get; set; }\n\nBase Metrics\nRepresents the intrinsic characteristics of a vulnerability that are\nconstant over time and across user environments.\nThis metric reflects the context by which vulnerability exploitation is\npossible.\n\n### AvailabilityImpact\n\n public Cvssv3.Types.Impact AvailabilityImpact { get; set; }\n\nThis metric measures the impact to the availability of the impacted\ncomponent resulting from a successfully exploited vulnerability.\n\n### BaseScore\n\n public double BaseScore { get; set; }\n\nThe base score is a function of the base metric scores.\n\n### ConfidentialityImpact\n\n public Cvssv3.Types.Impact ConfidentialityImpact { get; set; }\n\nThis metric measures the impact to the confidentiality of the information\nresources managed by a software component due to a successfully exploited\nvulnerability.\n\n### IntegrityImpact\n\n public Cvssv3.Types.Impact IntegrityImpact { get; set; }\n\nThis metric measures the impact to integrity of a successfully exploited\nvulnerability.\n\n### PrivilegesRequired\n\n public Cvssv3.Types.PrivilegesRequired PrivilegesRequired { get; set; }\n\nThis metric describes the level of privileges an attacker must possess\nbefore successfully exploiting the vulnerability.\n\n### Scope\n\n public Cvssv3.Types.Scope Scope { get; set; }\n\nThe Scope metric captures whether a vulnerability in one vulnerable\ncomponent impacts resources in components beyond its security scope.\n\n### UserInteraction\n\n public Cvssv3.Types.UserInteraction UserInteraction { get; set; }\n\nThis metric captures the requirement for a human user, other than the\nattacker, to participate in the successful compromise of the vulnerable\ncomponent."]]