Use the list vulnerabilities API to filter vulnerabilities across the tenant with many options from Organization, Tenant, Integration, Asset, Severity, etc. By default all vulnerabilities are returned.
Date range filtering is supported using the firstObservedAtStart and firstObservedAtEnd parameters:
firstObservedAtStart alone: Includes vulnerabilities observed from the specified date to the present.firstObservedAtEnd alone: Includes vulnerabilities observed up to the specified date.Date strings must follow ISO 8601 format (e.g., 2023-02-01T18:09:07Z).
Bearer API Key. For example, "Bearer {Tenant API Key}"
Bearer API Key. For example, "Bearer {Tenant API Key}"
application/json
Filter vulnerabilities on vulnerability ids. Accepts a comma-separated list with a maximum length of 100
[
"CVE-2022-22965,CVE-2022-22966,CVE-2022-22967"
]Filter vulnerabilities on asset ids. Accepts a comma-separated list with a maximum length of 10
["prn:assets:a,prn:assets:b"]Filter vulnerabilities based on provider. Accepts a comma-separated list of providers.
AWS, Azure, GCP, Kubernetes "AWS,GCP"
Filter vulnerabilities on execution ids. Accepts a comma-separated list with a maximum length of 10
"1678607803935,1778607801234"
Filter vulnerabilities on integration ids. Accepts a comma-separated list with a maximum length of 10
"UUID1,UUID2"
Filter vulnerabilities on asset group ids. Accepts a comma-separated list of asset group ids.
"UUID1,UUID2"
Filter vulnerabilities based on environments. This parameter accepts both environment IDs (UUIDs) and environment names.
Supported environment names:
You can provide environment IDs, names, or a combination of both. Names are resolved to IDs internally before filtering.
"production,550e8400-e29b-41d4-a716-446655440000"
Filter vulnerabilities on a package name.
"lodash"
Filter vulnerabilities on asset regions.
"us-east-1,us-west-2"
Filter vulnerabilities on a target name. For ECS Task Definitions this will be {TaskDefinition}:{revision} > {containerImage}
"EcsTaskDefinition:15 > nginx:1.19.1-alpine-perl"
Filter vulnerabilities on a target type.
"targetType"
Filter vulnerabilities on a target class.
"lang-pkgs,os-pkgs"
Filter vulnerabilities on hasKev. Accepts true or false.
true
Filter vulnerabilities based on exemptions. Returns exempted vulnerabilities if set true. Accepts true or false.
true
Filter vulnerabilities based on exploitability under the Common Vulnerability Scoring System (CVSS). Accepts true or false.
true
Filter vulnerabilities on hasExploit. Accepts true or false.
true
Filter vulnerabilities where the affected packages have a fixed version. Is true if any affected package has a fixed version. Accepts true or false.
true
Filter vulnerabilities on severity. Accepts a comma-separated list.
CRITICAL, HIGH, MEDIUM, LOW, INFORMATIONAL, UNKNOWN "CRITICAL,HIGH"
Start of the date range for filtering vulnerabilities based on the first observed time.
Specify the start of the range using a valid ISO 8601 date-time string.
If firstObservedAtStart is provided and firstObservedAtEnd is omitted,
results will include vulnerabilities observed from this date to the present.
Supported formats include:
yyyy-MM-ddTHH:mm:ssZ (e.g., 2020-12-18T08:00:00Z)yyyy-MM-ddTHH:mm:ss.SSSZ (e.g., 2020-12-18T08:00:00.000Z)"2023-02-01T18:09:07Z"
End of the date range for filtering vulnerabilities based on the first observed time.
Specify the end of the range using a valid ISO 8601 date-time string.
If firstObservedAtEnd is provided and firstObservedAtStart is omitted,
results will include vulnerabilities observed up to this date.
Supported formats include:
yyyy-MM-ddTHH:mm:ssZ (e.g., 2020-12-18T08:00:00Z)yyyy-MM-ddTHH:mm:ss.SSSZ (e.g., 2020-12-18T08:00:00.000Z)"2023-02-01T18:09:07Z"
Sort results by the specified field.
hasKev, hasExploit, lastObservedAt, firstObservedAt, severityLevelValue "hasExploit"
Sort order for the results.
ASC, DESC "ASC"
Page number for the results. Accepts a positive integer.
x >= 110
Number of results per page. Accepts a positive integer.
x <= 200050