feat: Add container.create_time, vulnerability.offending_package, vulnerability.fixed_package, vulnerability.security_bulletin, vulnerability.cve.impact, vulnerability.cve.exploitation_activity, vulnerability.cve.observed_in_the_wild, vulnerability.cve.zero_day to finding's list of attributes

PiperOrigin-RevId: 611114785
diff --git a/google/cloud/securitycenter/v1/container.proto b/google/cloud/securitycenter/v1/container.proto
index dab20ae..5642e95 100644
--- a/google/cloud/securitycenter/v1/container.proto
+++ b/google/cloud/securitycenter/v1/container.proto
@@ -17,6 +17,7 @@
 package google.cloud.securitycenter.v1;
 
 import "google/cloud/securitycenter/v1/label.proto";
+import "google/protobuf/timestamp.proto";
 
 option csharp_namespace = "Google.Cloud.SecurityCenter.V1";
 option go_package = "cloud.google.com/go/securitycenter/apiv1/securitycenterpb;securitycenterpb";
@@ -41,4 +42,7 @@
 
   // Container labels, as provided by the container runtime.
   repeated Label labels = 4;
+
+  // The time that the container was created.
+  google.protobuf.Timestamp create_time = 5;
 }
diff --git a/google/cloud/securitycenter/v1/vulnerability.proto b/google/cloud/securitycenter/v1/vulnerability.proto
index 457e88c..a4c2da3 100644
--- a/google/cloud/securitycenter/v1/vulnerability.proto
+++ b/google/cloud/securitycenter/v1/vulnerability.proto
@@ -16,6 +16,8 @@
 
 package google.cloud.securitycenter.v1;
 
+import "google/protobuf/timestamp.proto";
+
 option csharp_namespace = "Google.Cloud.SecurityCenter.V1";
 option go_package = "cloud.google.com/go/securitycenter/apiv1/securitycenterpb;securitycenterpb";
 option java_multiple_files = true;
@@ -29,11 +31,68 @@
   // CVE stands for Common Vulnerabilities and Exposures
   // (https://cve.mitre.org/about/)
   Cve cve = 1;
+
+  // The offending package is relevant to the finding.
+  Package offending_package = 2;
+
+  // The fixed package is relevant to the finding.
+  Package fixed_package = 3;
+
+  // The security bulletin is relevant to this finding.
+  SecurityBulletin security_bulletin = 4;
 }
 
 // CVE stands for Common Vulnerabilities and Exposures.
-// More information: https://cve.mitre.org
+// Information from the [CVE
+// record](https://www.cve.org/ResourcesSupport/Glossary) that describes this
+// vulnerability.
 message Cve {
+  // The possible values of impact of the vulnerability if it was to be
+  // exploited.
+  enum RiskRating {
+    // Invalid or empty value.
+    RISK_RATING_UNSPECIFIED = 0;
+
+    // Exploitation would have little to no security impact.
+    LOW = 1;
+
+    // Exploitation would enable attackers to perform activities, or could allow
+    // attackers to have a direct impact, but would require additional steps.
+    MEDIUM = 2;
+
+    // Exploitation would enable attackers to have a notable direct impact
+    // without needing to overcome any major mitigating factors.
+    HIGH = 3;
+
+    // Exploitation would fundamentally undermine the security of affected
+    // systems, enable actors to perform significant attacks with minimal
+    // effort, with little to no mitigating factors to overcome.
+    CRITICAL = 4;
+  }
+
+  // The possible values of exploitation activity of the vulnerability in the
+  // wild.
+  enum ExploitationActivity {
+    // Invalid or empty value.
+    EXPLOITATION_ACTIVITY_UNSPECIFIED = 0;
+
+    // Exploitation has been reported or confirmed to widely occur.
+    WIDE = 1;
+
+    // Limited reported or confirmed exploitation activities.
+    CONFIRMED = 2;
+
+    // Exploit is publicly available.
+    AVAILABLE = 3;
+
+    // No known exploitation activity, but has a high potential for
+    // exploitation.
+    ANTICIPATED = 4;
+
+    // No known exploitation activity.
+    NO_KNOWN = 5;
+  }
+
   // The unique identifier for the vulnerability. e.g. CVE-2021-34527
   string id = 1;
 
@@ -47,6 +106,19 @@
 
   // Whether upstream fix is available for the CVE.
   bool upstream_fix_available = 4;
+
+  // The potential impact of the vulnerability if it was to be exploited.
+  RiskRating impact = 5;
+
+  // The exploitation activity of the vulnerability in the wild.
+  ExploitationActivity exploitation_activity = 6;
+
+  // Whether or not the vulnerability has been observed in the wild.
+  bool observed_in_the_wild = 7;
+
+  // Whether or not the vulnerability was zero day when the finding was
+  // published.
+  bool zero_day = 8;
 }
 
 // Additional Links
@@ -214,3 +286,31 @@
   // component resulting from a successfully exploited vulnerability.
   Impact availability_impact = 12;
 }
+
+// Package is a generic definition of a package.
+message Package {
+  // The name of the package where the vulnerability was detected.
+  string package_name = 1;
+
+  // The CPE URI where the vulnerability was detected.
+  string cpe_uri = 2;
+
+  // Type of package, for example, os, maven, or go.
+  string package_type = 3;
+
+  // The version of the package.
+  string package_version = 4;
+}
+
+// SecurityBulletin are notifications of vulnerabilities of Google products.
+message SecurityBulletin {
+  // ID of the bulletin corresponding to the vulnerability.
+  string bulletin_id = 1;
+
+  // Submission time of this Security Bulletin.
+  google.protobuf.Timestamp submission_time = 2;
+
+  // This represents a version that the cluster receiving this notification
+  // should be upgraded to, based on its current version. For example, 1.15.0
+  string suggested_upgrade_version = 3;
+}