Use the list vulnerabilities API to filter vulnerabilities across the tenant with many options from Organization, Tenant, Integration, Asset, Severity, etc. By default all vulnerabilities are returned.
Date range filtering is supported using the firstObservedAtStart
and firstObservedAtEnd
parameters:
firstObservedAtStart
alone: Includes vulnerabilities observed from the specified date to the present.firstObservedAtEnd
alone: Includes vulnerabilities observed up to the specified date.Date strings must follow ISO 8601 format (e.g., 2023-02-01T18:09:07Z
).
Bearer API Key. For example, "Bearer {Tenant API Key}"
Bearer API Key. For example, "Bearer {Tenant API Key}"
application/json
Filter vulnerabilities on vulnerability ids. Accepts a comma-separated list with a maximum length of 100
[
"CVE-2022-22965,CVE-2022-22966,CVE-2022-22967"
]
Filter vulnerabilities on asset ids. Accepts a comma-separated list with a maximum length of 10
["prn:assets:a,prn:assets:b"]
Filter vulnerabilities based on provider. Accepts a comma-separated list of providers.
AWS
, Azure
, GCP
, Kubernetes
"AWS,GCP"
Filter vulnerabilities on execution ids. Accepts a comma-separated list with a maximum length of 10
"1678607803935,1778607801234"
Filter vulnerabilities on integration ids. Accepts a comma-separated list with a maximum length of 10
"UUID1,UUID2"
Filter vulnerabilities on asset group ids. Accepts a comma-separated list of asset group ids.
"UUID1,UUID2"
Filter vulnerabilities on a package name.
"lodash"
Filter vulnerabilities on asset regions.
"us-east-1,us-west-2"
Filter vulnerabilities on a target name. For ECS Task Definitions this will be {TaskDefinition}:{revision} > {containerImage}
"EcsTaskDefinition:15 > nginx:1.19.1-alpine-perl"
Filter vulnerabilities on a target type.
"targetType"
Filter vulnerabilities on hasKev. Accepts true
or false
.
true
Filter vulnerabilities based on exemptions. Returns exempted vulnerabilities if set true. Accepts true
or false
.
true
Filter vulnerabilities based on exploitability under the Common Vulnerability Scoring System (CVSS). Accepts true
or false
.
true
Filter vulnerabilities on hasExploit. Accepts true
or false
.
true
Filter vulnerabilities where the affected packages have a fixed version. Is true if any affected package has a fixed version. Accepts true
or false
.
true
Filter vulnerabilities on severity. Accepts a comma-separated list.
CRITICAL
, HIGH
, MEDIUM
, LOW
, INFORMATIONAL
, UNKNOWN
"CRITICAL,HIGH"
Start of the date range for filtering vulnerabilities based on the first observed time.
Specify the start of the range using a valid ISO 8601 date-time string.
If firstObservedAtStart
is provided and firstObservedAtEnd
is omitted,
results will include vulnerabilities observed from this date to the present.
Supported formats include:
yyyy-MM-ddTHH:mm:ssZ
(e.g., 2020-12-18T08:00:00Z
)yyyy-MM-ddTHH:mm:ss.SSSZ
(e.g., 2020-12-18T08:00:00.000Z
)"2023-02-01T18:09:07Z"
End of the date range for filtering vulnerabilities based on the first observed time.
Specify the end of the range using a valid ISO 8601 date-time string.
If firstObservedAtEnd
is provided and firstObservedAtStart
is omitted,
results will include vulnerabilities observed up to this date.
Supported formats include:
yyyy-MM-ddTHH:mm:ssZ
(e.g., 2020-12-18T08:00:00Z
)yyyy-MM-ddTHH:mm:ss.SSSZ
(e.g., 2020-12-18T08:00:00.000Z
)"2023-02-01T18:09:07Z"
Sort results by the specified field.
hasKev
, hasExploit
, lastObservedAt
, firstObservedAt
, severityLevelValue
"hasExploit"
Sort order for the results.
ASC
, DESC
"ASC"
Page number for the results. Accepts a positive integer.
x >= 1
10
Number of results per page. Accepts a positive integer.
x <= 2000
50
Successful response with the list of vulnerabilities
The response is of type object
.