Cloud OS Config V1alpha API - Module Google::Cloud::OsConfig::V1alpha::CVSSv3::AttackComplexity (v0.14.0)
Stay organized with collections
Save and categorize content based on your preferences.
Reference documentation and code samples for the Cloud OS Config V1alpha API module Google::Cloud::OsConfig::V1alpha::CVSSv3::AttackComplexity.
This metric describes the conditions beyond the attacker's control that
must exist in order to exploit the vulnerability.
Constants
ATTACK_COMPLEXITY_UNSPECIFIED
ATTACK_COMPLEXITY_LOW
value: 1
Specialized access conditions or extenuating circumstances do not exist.
An attacker can expect repeatable success when attacking the vulnerable
component.
ATTACK_COMPLEXITY_HIGH
value: 2
A successful attack depends on conditions beyond the attacker's control.
That is, a successful attack cannot be accomplished at will, but requires
the attacker to invest in some measurable amount of effort in preparation
or execution against the vulnerable component before a successful attack
can be expected.
Except as otherwise noted, the content of this page is licensed under the Creative Commons Attribution 4.0 License, and code samples are licensed under the Apache 2.0 License. For details, see the Google Developers Site Policies. Java is a registered trademark of Oracle and/or its affiliates.
Last updated 2025-10-10 UTC.
[[["Easy to understand","easyToUnderstand","thumb-up"],["Solved my problem","solvedMyProblem","thumb-up"],["Other","otherUp","thumb-up"]],[["Hard to understand","hardToUnderstand","thumb-down"],["Incorrect information or sample code","incorrectInformationOrSampleCode","thumb-down"],["Missing the information/samples I need","missingTheInformationSamplesINeed","thumb-down"],["Other","otherDown","thumb-down"]],["Last updated 2025-10-10 UTC."],[],[]]