post
/public_api/v1/assets/get_vulnerability_tests/
Get a complete or filtered list of vulnerability tests. Response include details about each test, including the number of services confirmed vulnerable.
To view vulnerability test results, use the Get All Services or Get Service Details endpoints.
CURL
curl -X POST \
-H "Accept: application/json" \
-H "Content-Type: application/json" -H "authorization: {{api_key}}" -H "x-xdr-auth-id: {{api_key_id}}" \
"https://api-}/public_api/v1/assets/get_vulnerability_tests/" \
-d '{
"request_data" : {
"search_from" : 0,
"filters" : [ {
"field" : "name",
"value" : "VulnerabilityTestFilter_value",
"operator" : "in"
}, {
"field" : "name",
"value" : "VulnerabilityTestFilter_value",
"operator" : "in"
} ],
"sort" : {
"field" : "severity_score",
"keyword" : "desc"
},
"search_to" : 0
}
}'
Request headers
authorization
required
String
api-key
Example:
{{api_key}}
x-xdr-auth-id
required
String
api-key-id
Example:
{{api_key_id}}
Request
Body
required
request_data
required
Object
filters
optional
Array
of objects
field
optional
String
(Enum)
Allowed values:
name
test_names
vulnerability_ids
description
vendor_names
status
affected_software
severity_score
cwe_ids
epss_score
count_vulnerable_services
operator
optional
String
(Enum)
Identifies the comparison operator to use for this filter. The following list shows which operator can be used for each filter field:
name
: contains, eq, neqstatus
: eqvulnerability_ids
: contains, not_containsdescription
: containsaffected_software
: contains, not_containscwe_ids
: contains, not_containsvendor_names
: contains, not_containsseverity_score
: eq, neq, gte, lteepss_score
: eq, neq, gte, ltecount_vulnerable_services
: eq, neq, gte, lte
Allowed values:
in
contains
neq
eq
lte
gte
not_contains
value
optional
Value depends on the filter field used.
name
: string e.g. apachestatus
: Enabled, Disabledvulnerability_ids
: strings in the form of CVE IDs, such as CVE-1, CVE-2description
: string e.g. apacheaffected_software
: stringscwe_ids
: strings in the form of CWE IDs such as CWE-20vendor_names
: strings such as Cisco, Siemensseverity_score
: numbers, such as 2, 3.5epss_score
: numbers, such as 2, 3.5count_vulnerable_services
: integers, such as 1,2,5
search_from
optional
Integer
search_to
optional
Integer
sort
optional
Object
field
optional
String
(Enum)
Allowed values:
severity_score
created
first_published
status
keyword
optional
String
(Enum)
Allowed values:
ASC
asc
DESC
desc
Responses