Retrieving a List of Vulnerabilities

This endpoint retrieves a list of vulnerabilities identified in the most recent scan, filtered according to specified criteria.
Each vulnerability entry includes the number of affected images/workloads,
along with detailed information such as the Common Vulnerability Scoring System (CVSS) score,
the Cybersecurity and Infrastructure Security Agency's Known Exploited Vulnerabilities (CISA KEV) listing,
the Exploit Prediction Scoring System (EPSS) score,
and detailed component information outlining the full paths impacted by the vulnerability.

Examples of Request Objects

To obtain results for clusters that include 'cluster-001' in their names, use the following filters

{
"innerFilters": [
{
"cluster": "cluster 001|like"
}
]
}

To fetch results specifically for a cluster named 'cluster-test-1', use the following filters

{
"innerFilters": [
{
"cluster": "cluster-test-1"
}
]
}

It is advisable to narrow down the scope of the request by using the 'since' field to specify a date,
ideally set to 48 hours prior to the current date.
This approach optimizes the search and ensures the relevance of the data retrieved.

{
"since": "2024-04-01T09:37:45.633230367-05:00"
}
Language
Credentials
URL
Click Try It! to start a request and see the response here!