Third Party Vulnerability
Get Third Party Vulnerability Information for a customer in PDF/JSON/CSV format
Get Third Party Vulnerability Information
Path Parameters
Name
Type
Description
Query Parameters
Name
Type
Description
Headers
Name
Type
Description
{
"draw": null,
"recordsFiltered": 1,
"recordsTotal": 1,
"data": [
{
"severity": "HIGH",
"cve": "CVE-2017-5637",
"componentSha256": "d47d35b9a10af53b7967ff4851bff832778539eed1e43fae6bfcb1f13576bdf5",
"packageId": "",
"description": "Two four letter word commands \"wchp/wchc\" are CPU intensive and could cause spike of CPU utilization on Apache ZooKeeper server if abused, which leads to the server unable to serve legitimate client requests. Apache ZooKeeper thru version 3.4.9 and 3.5.2 suffer from this issue, fixed in 3.4.10, 3.5.3, and later.",
"timestamp": 1618843675319,
"applicationSHA": "f0e4dfc6049ec500647b0f8de067e568136652bcc9509cb377048f26c89023c3",
"applicationUUID": "2bf85fc2-cd1f-458e-87ac-0d756b99f4f2",
"component": "zookeeper-3.4.8.jar"
}
]
}{
"errors": [
"Incorrect username/password",
"Incorrect K2_API_ACCESSOR_TOKEN",
"User deleted/inactive"
],
"errorType": "K2-Authentication",
"status": "FAILURE"
}Query Param Possible Values
severityType
cve
cURL Example
Responses
JSON
CSV

PDF

Accessing Third Party Vulnerability Scan API Data On K2 Portal
Last updated
Was this helpful?