[[["Easy to understand","easyToUnderstand","thumb-up"],["Solved my problem","solvedMyProblem","thumb-up"],["Other","otherUp","thumb-up"]],[["Hard to understand","hardToUnderstand","thumb-down"],["Incorrect information or sample code","incorrectInformationOrSampleCode","thumb-down"],["Missing the information/samples I need","missingTheInformationSamplesINeed","thumb-down"],["Other","otherDown","thumb-down"]],["Last updated 2025-09-04 UTC."],[],[],null,["# Google Cloud Security Command Center V1 Client - Class Cve (2.2.1)\n\nVersion latestkeyboard_arrow_down\n\n- [2.2.1 (latest)](/php/docs/reference/cloud-security-center/latest/V1.Cve)\n- [2.2.0](/php/docs/reference/cloud-security-center/2.2.0/V1.Cve)\n- [2.1.1](/php/docs/reference/cloud-security-center/2.1.1/V1.Cve)\n- [2.0.4](/php/docs/reference/cloud-security-center/2.0.4/V1.Cve)\n- [1.32.0](/php/docs/reference/cloud-security-center/1.32.0/V1.Cve)\n- [1.31.0](/php/docs/reference/cloud-security-center/1.31.0/V1.Cve)\n- [1.30.0](/php/docs/reference/cloud-security-center/1.30.0/V1.Cve)\n- [1.29.0](/php/docs/reference/cloud-security-center/1.29.0/V1.Cve)\n- [1.28.2](/php/docs/reference/cloud-security-center/1.28.2/V1.Cve)\n- [1.21.0](/php/docs/reference/cloud-security-center/1.21.0/V1.Cve)\n- [1.20.2](/php/docs/reference/cloud-security-center/1.20.2/V1.Cve)\n- [1.19.1](/php/docs/reference/cloud-security-center/1.19.1/V1.Cve)\n- [1.18.0](/php/docs/reference/cloud-security-center/1.18.0/V1.Cve)\n- [1.17.0](/php/docs/reference/cloud-security-center/1.17.0/V1.Cve)\n- [1.16.0](/php/docs/reference/cloud-security-center/1.16.0/V1.Cve)\n- [1.15.1](/php/docs/reference/cloud-security-center/1.15.1/V1.Cve)\n- [1.14.2](/php/docs/reference/cloud-security-center/1.14.2/V1.Cve)\n- [1.13.1](/php/docs/reference/cloud-security-center/1.13.1/V1.Cve) \nReference documentation and code samples for the Google Cloud Security Command Center V1 Client class Cve.\n\nCVE stands for Common Vulnerabilities and Exposures.\n\nInformation from the [CVE\nrecord](https://www.cve.org/ResourcesSupport/Glossary) that describes this\nvulnerability.\n\nGenerated from protobuf message `google.cloud.securitycenter.v1.Cve`\n\nNamespace\n---------\n\nGoogle \\\\ Cloud \\\\ SecurityCenter \\\\ V1\n\nMethods\n-------\n\n### __construct\n\nConstructor.\n\n### getId\n\nThe unique identifier for the vulnerability. e.g. CVE-2021-34527\n\n### setId\n\nThe unique identifier for the vulnerability. e.g. CVE-2021-34527\n\n### getReferences\n\nAdditional information about the CVE.\n\ne.g. \u003chttps://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-34527\u003e\n\n### setReferences\n\nAdditional information about the CVE.\n\ne.g. \u003chttps://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-34527\u003e\n\n### getCvssv3\n\nDescribe Common Vulnerability Scoring System specified at\n\u003chttps://www.first.org/cvss/v3.1/specification-document\u003e\n\n### hasCvssv3\n\n### clearCvssv3\n\n### setCvssv3\n\nDescribe Common Vulnerability Scoring System specified at\n\u003chttps://www.first.org/cvss/v3.1/specification-document\u003e\n\n### getUpstreamFixAvailable\n\nWhether upstream fix is available for the CVE.\n\n### setUpstreamFixAvailable\n\nWhether upstream fix is available for the CVE.\n\n### getImpact\n\nThe potential impact of the vulnerability if it was to be exploited.\n\n### setImpact\n\nThe potential impact of the vulnerability if it was to be exploited.\n\n### getExploitationActivity\n\nThe exploitation activity of the vulnerability in the wild.\n\n### setExploitationActivity\n\nThe exploitation activity of the vulnerability in the wild.\n\n### getObservedInTheWild\n\nWhether or not the vulnerability has been observed in the wild.\n\n### setObservedInTheWild\n\nWhether or not the vulnerability has been observed in the wild.\n\n### getZeroDay\n\nWhether or not the vulnerability was zero day when the finding was\npublished.\n\n### setZeroDay\n\nWhether or not the vulnerability was zero day when the finding was\npublished.\n\n### getExploitReleaseDate\n\nDate the first publicly available exploit or PoC was released.\n\n### hasExploitReleaseDate\n\n### clearExploitReleaseDate\n\n### setExploitReleaseDate\n\nDate the first publicly available exploit or PoC was released."]]