Container Vulnerability
Get Container Vulnerability Information for a customer in PDF/JSON/CSV format
Get Container Vulnerability Information
Path Parameters
Name
Type
Description
Query Parameters
Name
Type
Description
Headers
Name
Type
Description
{
"data": [
{
"cve": "CVE-2021-20193 on Ubuntu 16.04 LTS (xenial) - low.",
"description": "[Memory leak in read_header() in list.c]",
"severity": "LOW",
"links": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20193 http://people.canonical.com/~ubuntu-security/cve/2021/CVE-2021-20193.html https://savannah.gnu.org/bugs/?59897 https://git.savannah.gnu.org/cgit/tar.git/commit/?id=d9d4435692150fa8ff68e1b1a473d187cc3fd777 http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=980525",
"application": "tar1.28-2.1ubuntu0.2",
"imageId": "f6f49faac5cf9e9589f3c34821ba2d36fd093e7eb52d5b6cd000ea3dae3698df",
"customerId": 533,
"toolId": "clair-2021-03-31 00:00:00+00",
"lastrunTimestamp": 1617259742697,
"imageName": "ubuntu:16.04",
"containerName": "ubuntu",
"registry": "ubuntu"
}
]
}{
"errors": [
"Incorrect username/password",
"Incorrect K2_API_ACCESSOR_TOKEN",
"User deleted/inactive"
],
"errorType": "K2-Authentication",
"status": "FAILURE"
}Query Param Possible Values
cveType
severityType
cURL Example :
Sample Responses
JSON
CSV

PDF

Accessing Container Vulnerability API Data On K2 Portal
Last updated
Was this helpful?