[[["Easy to understand","easyToUnderstand","thumb-up"],["Solved my problem","solvedMyProblem","thumb-up"],["Other","otherUp","thumb-up"]],[["Hard to understand","hardToUnderstand","thumb-down"],["Incorrect information or sample code","incorrectInformationOrSampleCode","thumb-down"],["Missing the information/samples I need","missingTheInformationSamplesINeed","thumb-down"],["Other","otherDown","thumb-down"]],["Last updated 2025-09-04 UTC."],[],[],null,["# Google Cloud Security Command Center V2 Client - Class Vulnerability (2.2.1)\n\nVersion latestkeyboard_arrow_down\n\n- [2.2.1 (latest)](/php/docs/reference/cloud-security-center/latest/V2.Vulnerability)\n- [2.2.0](/php/docs/reference/cloud-security-center/2.2.0/V2.Vulnerability)\n- [2.1.1](/php/docs/reference/cloud-security-center/2.1.1/V2.Vulnerability)\n- [2.0.4](/php/docs/reference/cloud-security-center/2.0.4/V2.Vulnerability)\n- [1.32.0](/php/docs/reference/cloud-security-center/1.32.0/V2.Vulnerability)\n- [1.31.0](/php/docs/reference/cloud-security-center/1.31.0/V2.Vulnerability)\n- [1.30.0](/php/docs/reference/cloud-security-center/1.30.0/V2.Vulnerability)\n- [1.29.0](/php/docs/reference/cloud-security-center/1.29.0/V2.Vulnerability)\n- [1.28.2](/php/docs/reference/cloud-security-center/1.28.2/V2.Vulnerability)\n- [1.21.0](/php/docs/reference/cloud-security-center/1.21.0/V2.Vulnerability)\n- [1.20.2](/php/docs/reference/cloud-security-center/1.20.2/V2.Vulnerability)\n- [1.19.1](/php/docs/reference/cloud-security-center/1.19.1/V2.Vulnerability)\n- [1.18.0](/php/docs/reference/cloud-security-center/1.18.0/V2.Vulnerability)\n- [1.17.0](/php/docs/reference/cloud-security-center/1.17.0/V2.Vulnerability)\n- [1.16.0](/php/docs/reference/cloud-security-center/1.16.0/V2.Vulnerability)\n- [1.15.1](/php/docs/reference/cloud-security-center/1.15.1/V2.Vulnerability)\n- [1.14.2](/php/docs/reference/cloud-security-center/1.14.2/V2.Vulnerability)\n- [1.13.1](/php/docs/reference/cloud-security-center/1.13.1/V2.Vulnerability) \nReference documentation and code samples for the Google Cloud Security Command Center V2 Client class Vulnerability.\n\nRefers to common vulnerability fields e.g. cve, cvss, cwe etc.\n\nGenerated from protobuf message `google.cloud.securitycenter.v2.Vulnerability`\n\nNamespace\n---------\n\nGoogle \\\\ Cloud \\\\ SecurityCenter \\\\ V2\n\nMethods\n-------\n\n### __construct\n\nConstructor.\n\n### getCve\n\nCVE stands for Common Vulnerabilities and Exposures\n(\u003chttps://cve.mitre.org/about/\u003e)\n\n### hasCve\n\n### clearCve\n\n### setCve\n\nCVE stands for Common Vulnerabilities and Exposures\n(\u003chttps://cve.mitre.org/about/\u003e)\n\n### getOffendingPackage\n\nThe offending package is relevant to the finding.\n\n### hasOffendingPackage\n\n### clearOffendingPackage\n\n### setOffendingPackage\n\nThe offending package is relevant to the finding.\n\n### getFixedPackage\n\nThe fixed package is relevant to the finding.\n\n### hasFixedPackage\n\n### clearFixedPackage\n\n### setFixedPackage\n\nThe fixed package is relevant to the finding.\n\n### getSecurityBulletin\n\nThe security bulletin is relevant to this finding.\n\n### hasSecurityBulletin\n\n### clearSecurityBulletin\n\n### setSecurityBulletin\n\nThe security bulletin is relevant to this finding.\n\n### getProviderRiskScore\n\nProvider provided risk_score based on multiple factors. The higher the risk\nscore, the more risky the vulnerability is.\n\n### setProviderRiskScore\n\nProvider provided risk_score based on multiple factors. The higher the risk\nscore, the more risky the vulnerability is.\n\n### getReachable\n\nRepresents whether the vulnerability is reachable (detected via static\nanalysis)\n\n### setReachable\n\nRepresents whether the vulnerability is reachable (detected via static\nanalysis)\n\n### getCwes\n\nRepresents one or more Common Weakness Enumeration (CWE) information on\nthis vulnerability.\n\n### setCwes\n\nRepresents one or more Common Weakness Enumeration (CWE) information on\nthis vulnerability."]]