• Register

Retrieve vulnerabilities and misconfiguration

This API allows to query the scanners to retrieve detected vulnerabilities and misconfiguration #### Request URI
Path Parameter Type Mandatory Description Technical details
system String Y Parameter Indicating which system must be queried. Possible values: Pentera or RangerAD
Query Parameter Type Mandatory Description Technical details
fromDate String Y From which date the data should be retrieved Format: YYYY-MM-DD
toDate String N Up to which date the data should be retrieved. If missing, current date will be used as default Format: YYYY-MM-DD
top Integer N Parameter for pagination result. Indicates how many record should be retrieved at the time. Currently active only for RangerAD. For Pentera, all the data retrieved will be always returned in response
nextPage String N Parameter for pagination result. Indicates the identifier to resume from the last page read. Currently active only for RangerAD. For Pentera, all the data retrieved will be always returned in response
# Response structure
Field Type Description Technical Details
vulnerabilities (0..∞)
target_namestringName of the scanned target
target_idstringUnique identifier of the target
target_typestringType of the target (Host, Network, etc.)
idstringInternal vulnerability identifier
namestringVulnerability name
summarystringShort explanation of the vulnerability
portnumberPort where service is detected
protocolstringProtocol associated with the vulnerability
severitynumberSeverity score (CVSS-like)
insightstringDetailed explanation of the risk
remediationstringRecommended fix
prioritynumberPriority for remediation
misconfigurations (0..∞)
edges (0..∞)
node (0..∞)
id string Unique identifier for this misconfiguration item
name string Title describing the misconfiguration
detectedAt string (timestamp) Timestamp when the misconfiguration was first detected
lastSeenAt string (timestamp) The most recent time this misconfiguration was observed
product string Security product that identified the issue
organization string Organization or tenant associated with this misconfiguration
environment string The system environment where the misconfiguration exists
severity string Risk severity classification
status string Current lifecycle state of the finding
exploitId string Identifier referencing an associated exploit (if any)
misconfigurationType string Category/type of misconfiguration
misconfigurationDetail (0..∞)
impact string Description of the security or operational impact
mitigationSteps string Steps recommended to mitigate or resolve the misconfiguration
mitigationReferences string Reference links or documentation supporting mitigation
mitreAttacks (0..∞)
techniqueId string MITRE ATTACK technique identifier
techniqueName string Name and description of the attack technique
techniqueUrl string External URL to the MITRE ATTACK technique reference
#### Response Example

Docs Navigation