Querying the Vulnerability List
Function
This API is used to query the list of detected vulnerabilities.
URI
GET /v5/{project_id}/vulnerability/vulnerabilities
|
Parameter |
Mandatory |
Type |
Description |
|---|---|---|---|
|
project_id |
Yes |
String |
Project ID |
|
Parameter |
Mandatory |
Type |
Description |
|---|---|---|---|
|
enterprise_project_id |
No |
String |
Enterprise project ID. The value 0 indicates the default enterprise project. To query all enterprise projects, set this parameter to all_granted_eps. |
|
type |
No |
String |
Vulnerability type. Its value can be: -linux_vul -windows_vul -web_cms |
|
vul_id |
No |
String |
Vulnerability ID |
|
vul_name |
No |
String |
Vulnerability name |
|
limit |
No |
Integer |
Number of records displayed on each page |
|
offset |
No |
Integer |
Offset, which specifies the start position of the record to be returned. The value must be a number no less than 0. |
Request Parameters
|
Parameter |
Mandatory |
Type |
Description |
|---|---|---|---|
|
X-Auth-Token |
Yes |
String |
IAM token. It can be obtained by calling the IAM API used to obtain an IAM token. The value of X-Subject-Token in the response header is a token. |
Response Parameters
Status code: 200
|
Parameter |
Type |
Description |
|---|---|---|
|
total_num |
Long |
Total number of vulnerabilities |
|
data_list |
Array of VulInfo objects |
Software vulnerability list |
|
Parameter |
Type |
Description |
|---|---|---|
|
vul_name |
String |
Vulnerability name |
|
vul_id |
String |
Vulnerability ID |
|
label_list |
Array of strings |
Vulnerability tag |
|
repair_necessity |
String |
Repair necessity
|
|
severity_level |
String |
Severity
|
|
host_num |
Integer |
Number of affected servers |
|
unhandle_host_num |
Integer |
Number of unprocessed servers, excluding ignored and fixed servers. |
|
scan_time |
Long |
Last scanned, in ms. |
|
solution_detail |
String |
Vulnerability fixing guide |
|
url |
String |
Vulnerability URL |
|
description |
String |
Vulnerability description |
|
type |
String |
Vulnerability type. Its value can be: -linux_vul -windows_vul -web_cms |
|
host_id_list |
Array of strings |
List of servers that can handle the vulnerability |
|
hosts_num |
VulnerabilityHostNumberInfo object |
Affected server |
Example Requests
Query the first 10 records in the vulnerability list whose project_id is 2b31ed520xxxxxxebedb6e57xxxxxxxx.
GET https://{endpoint}/v5/2b31ed520xxxxxxebedb6e57xxxxxxxx/vulnerability/vulnerabilities?offset=0&limit=10
Example Responses
Status code: 200
vulnerability list
{
"total_num" : 1,
"data_list" : [ {
"description" : "It was discovered that FreeType did not correctly handle certain malformed font files. If a user were tricked into using a specially crafted font file, a remote attacker could cause FreeType to crash, or possibly execute arbitrary code.",
"host_id_list" : [ "caa958ad-a481-4d46-b51e-6861b8864515" ],
"host_num" : 1,
"scan_time" : 1661752185836,
"severity_level" : "Critical",
"repair_necessity" : "Critical",
"solution_detail" : "To upgrade the affected software",
"type" : "linux_vul",
"unhandle_host_num" : 0,
"url" : "https://ubuntu.com/security/CVE-2022-27405",
"vul_id" : "USN-5528-1",
"vul_name" : "USN-5528-1: FreeType vulnerabilities"
} ]
}
Status Codes
|
Status Code |
Description |
|---|---|
|
200 |
vulnerability list |
Error Codes
See Error Codes.
Feedback
Was this page helpful?
Provide feedbackThank you very much for your feedback. We will continue working to improve the documentation.