[[["Easy to understand","easyToUnderstand","thumb-up"],["Solved my problem","solvedMyProblem","thumb-up"],["Other","otherUp","thumb-up"]],[["Missing the information I need","missingTheInformationINeed","thumb-down"],["Too complicated / too many steps","tooComplicatedTooManySteps","thumb-down"],["Out of date","outOfDate","thumb-down"],["Samples / code issue","samplesCodeIssue","thumb-down"],["Other","otherDown","thumb-down"]],["Last updated 2025-08-07 UTC."],[[["\u003cp\u003eThis page provides reference documentation for the \u003ccode\u003eCve\u003c/code\u003e class within the Google Cloud Security Center v2 API, which represents information about Common Vulnerabilities and Exposures.\u003c/p\u003e\n"],["\u003cp\u003eThe \u003ccode\u003eCve\u003c/code\u003e class, part of the \u003ccode\u003eGoogle.Cloud.SecurityCenter.V2\u003c/code\u003e namespace, contains properties such as \u003ccode\u003eId\u003c/code\u003e, \u003ccode\u003eCvssv3\u003c/code\u003e, \u003ccode\u003eExploitReleaseDate\u003c/code\u003e, \u003ccode\u003eImpact\u003c/code\u003e, \u003ccode\u003eObservedInTheWild\u003c/code\u003e, and \u003ccode\u003eReferences\u003c/code\u003e to describe vulnerability details.\u003c/p\u003e\n"],["\u003cp\u003eThe class implements various interfaces, including \u003ccode\u003eIMessage\u003c/code\u003e, \u003ccode\u003eIEquatable\u003c/code\u003e, \u003ccode\u003eIDeepCloneable\u003c/code\u003e, and \u003ccode\u003eIBufferMessage\u003c/code\u003e, and inherits members from the base \u003ccode\u003eobject\u003c/code\u003e class.\u003c/p\u003e\n"],["\u003cp\u003eKey properties within the \u003ccode\u003eCve\u003c/code\u003e class offer insights into the vulnerability's severity, such as the CVSS v3 score (\u003ccode\u003eCvssv3\u003c/code\u003e), the potential impact (\u003ccode\u003eImpact\u003c/code\u003e), and whether it has been observed in the wild (\u003ccode\u003eObservedInTheWild\u003c/code\u003e).\u003c/p\u003e\n"],["\u003cp\u003eThe \u003ccode\u003eCve\u003c/code\u003e class includes properties related to exploitation, such as \u003ccode\u003eExploitReleaseDate\u003c/code\u003e, \u003ccode\u003eExploitationActivity\u003c/code\u003e, and \u003ccode\u003eFirstExploitationDate\u003c/code\u003e, indicating when an exploit or proof-of-concept was first available, and when it was first observed in use, and also if an upstream fix is available or not.\u003c/p\u003e\n"]]],[],null,["# Security Command Center v2 API - Class Cve (1.2.0)\n\nVersion latestkeyboard_arrow_down\n\n- [1.2.0 (latest)](/dotnet/docs/reference/Google.Cloud.SecurityCenter.V2/latest/Google.Cloud.SecurityCenter.V2.Cve)\n- [1.1.0](/dotnet/docs/reference/Google.Cloud.SecurityCenter.V2/1.1.0/Google.Cloud.SecurityCenter.V2.Cve)\n- [1.0.0](/dotnet/docs/reference/Google.Cloud.SecurityCenter.V2/1.0.0/Google.Cloud.SecurityCenter.V2.Cve) \n\n public sealed class Cve : IMessage\u003cCve\u003e, IEquatable\u003cCve\u003e, IDeepCloneable\u003cCve\u003e, IBufferMessage, IMessage\n\nReference documentation and code samples for the Security Command Center v2 API class Cve.\n\nCVE stands for Common Vulnerabilities and Exposures.\nInformation from the [CVE\nrecord](https://www.cve.org/ResourcesSupport/Glossary) that describes this\nvulnerability. \n\nInheritance\n-----------\n\n[object](https://learn.microsoft.com/dotnet/api/system.object) \\\u003e Cve \n\nImplements\n----------\n\n[IMessage](https://cloud.google.com/dotnet/docs/reference/Google.Protobuf/latest/Google.Protobuf.IMessage-1.html)[Cve](/dotnet/docs/reference/Google.Cloud.SecurityCenter.V2/latest/Google.Cloud.SecurityCenter.V2.Cve), [IEquatable](https://learn.microsoft.com/dotnet/api/system.iequatable-1)[Cve](/dotnet/docs/reference/Google.Cloud.SecurityCenter.V2/latest/Google.Cloud.SecurityCenter.V2.Cve), [IDeepCloneable](https://cloud.google.com/dotnet/docs/reference/Google.Protobuf/latest/Google.Protobuf.IDeepCloneable-1.html)[Cve](/dotnet/docs/reference/Google.Cloud.SecurityCenter.V2/latest/Google.Cloud.SecurityCenter.V2.Cve), [IBufferMessage](https://cloud.google.com/dotnet/docs/reference/Google.Protobuf/latest/Google.Protobuf.IBufferMessage.html), [IMessage](https://cloud.google.com/dotnet/docs/reference/Google.Protobuf/latest/Google.Protobuf.IMessage.html) \n\nInherited Members\n-----------------\n\n[object.GetHashCode()](https://learn.microsoft.com/dotnet/api/system.object.gethashcode) \n[object.GetType()](https://learn.microsoft.com/dotnet/api/system.object.gettype) \n[object.ToString()](https://learn.microsoft.com/dotnet/api/system.object.tostring)\n\nNamespace\n---------\n\n[Google.Cloud.SecurityCenter.V2](/dotnet/docs/reference/Google.Cloud.SecurityCenter.V2/latest/Google.Cloud.SecurityCenter.V2)\n\nAssembly\n--------\n\nGoogle.Cloud.SecurityCenter.V2.dll\n\nConstructors\n------------\n\n### Cve()\n\n public Cve()\n\n### Cve(Cve)\n\n public Cve(Cve other)\n\nProperties\n----------\n\n### Cvssv3\n\n public Cvssv3 Cvssv3 { get; set; }\n\nDescribe Common Vulnerability Scoring System specified at\n\u003chttps://www.first.org/cvss/v3.1/specification-document\u003e\n\n### ExploitReleaseDate\n\n public Timestamp ExploitReleaseDate { get; set; }\n\nDate the first publicly available exploit or PoC was released.\n\n### ExploitationActivity\n\n public Cve.Types.ExploitationActivity ExploitationActivity { get; set; }\n\nThe exploitation activity of the vulnerability in the wild.\n\n### FirstExploitationDate\n\n public Timestamp FirstExploitationDate { get; set; }\n\nDate of the earliest known exploitation.\n\n### Id\n\n public string Id { get; set; }\n\nThe unique identifier for the vulnerability. e.g. CVE-2021-34527\n\n### Impact\n\n public Cve.Types.RiskRating Impact { get; set; }\n\nThe potential impact of the vulnerability if it was to be exploited.\n\n### ObservedInTheWild\n\n public bool ObservedInTheWild { get; set; }\n\nWhether or not the vulnerability has been observed in the wild.\n\n### References\n\n public RepeatedField\u003cReference\u003e References { get; }\n\nAdditional information about the CVE.\ne.g. \u003chttps://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-34527\u003e\n\n### UpstreamFixAvailable\n\n public bool UpstreamFixAvailable { get; set; }\n\nWhether upstream fix is available for the CVE.\n\n### ZeroDay\n\n public bool ZeroDay { get; set; }\n\nWhether or not the vulnerability was zero day when the finding was\npublished."]]