Skip to main content
GET
/
v1
/
namespaces
/
{tenant_meta.namespace}
/
vulnerabilities
/
{uuid}
GetVulnerability
curl --request GET \
  --url https://api.endorlabs.com/v1/namespaces/{tenant_meta.namespace}/vulnerabilities/{uuid}
{
  "meta": {
    "name": "<string>",
    "annotations": {},
    "create_time": "2023-11-07T05:31:56Z",
    "created_by": "<string>",
    "description": "<string>",
    "index_data": {
      "data": [
        "<string>"
      ],
      "search_score": 123,
      "tenant": "<string>",
      "will_be_deleted_at": "2023-11-07T05:31:56Z"
    },
    "kind": "<string>",
    "parent_kind": "<string>",
    "parent_uuid": "<string>",
    "references": {},
    "tags": [
      "<string>"
    ],
    "update_time": "2023-11-07T05:31:56Z",
    "updated_by": "<string>",
    "upsert_time": "2023-11-07T05:31:56Z",
    "version": "<string>"
  },
  "spec": {
    "additional_endor_notes": [
      "<string>"
    ],
    "additional_notes": [
      "<string>"
    ],
    "affected": [
      {
        "affected_callpath_uris": [
          "<string>"
        ],
        "affected_filepaths": [
          "<string>"
        ],
        "database_specific": {},
        "ecosystem_specific": {},
        "fix_commits": [
          "<string>"
        ],
        "has_been_fixed": true,
        "maintainer_cvss_level": "CVSS_SEVERITY_LEVEL_UNSPECIFIED",
        "maintainer_severity": "LEVEL_UNSPECIFIED",
        "package": {
          "ecosystem": "ECOSYSTEM_UNSPECIFIED",
          "name": "<string>",
          "cpe": "<string>",
          "cpes": [
            "<string>"
          ],
          "purl": "<string>"
        },
        "ranges": [
          {
            "fixed": "<string>",
            "introduced": "<string>",
            "repo": "<string>",
            "type": "RANGE_TYPE_UNSPECIFIED"
          }
        ],
        "source": "SOURCE_UNSPECIFIED",
        "versions": [
          "<string>"
        ]
      }
    ],
    "aliases": [
      "<string>"
    ],
    "credits": [
      {
        "contact": [
          "<string>"
        ],
        "name": "<string>"
      }
    ],
    "cvss_v3_severity": {
      "level": "LEVEL_UNSPECIFIED",
      "score": 123,
      "temporal_level": "LEVEL_UNSPECIFIED",
      "temporal_score": 123,
      "temporal_vector": "<string>",
      "vector": "<string>"
    },
    "cvss_v4_severity": {
      "base_level": "V4_LEVEL_UNSPECIFIED",
      "base_score": 123,
      "environmental_level": "V4_LEVEL_UNSPECIFIED",
      "environmental_score": 123,
      "threat_level": "V4_LEVEL_UNSPECIFIED",
      "threat_score": 123,
      "vector": "<string>"
    },
    "database_specific": {},
    "deepdive": true,
    "disputed": true,
    "epss_score": {
      "percentile_score": 123,
      "probability_score": 123
    },
    "malicious": true,
    "modified": "2023-11-07T05:31:56Z",
    "published": "2023-11-07T05:31:56Z",
    "raw": {
      "endor_vulnerability": {
        "cve_description": "<string>",
        "cve_id": "<string>",
        "ecosystem": "<string>",
        "package_name": "<string>",
        "schema_version": "<string>",
        "additional_notes": "<string>",
        "component": [
          {
            "artifact_id": "<string>",
            "group_id": "<string>",
            "endor_uri": [
              "<string>"
            ],
            "fixed_versions": [
              "<string>"
            ],
            "versions_range": [
              "<string>"
            ],
            "vulnerable_filepath": [
              "<string>"
            ],
            "vulnerable_versions": [
              "<string>"
            ]
          }
        ],
        "cve_references": [
          "<string>"
        ],
        "cvss_score": 123,
        "cvss_vector": "<string>",
        "cwe": "<string>",
        "deepdive": true,
        "disputed": true,
        "fix_commit": [
          "<string>"
        ],
        "last_updated": "2023-11-07T05:31:56Z",
        "malicious": true,
        "nofix": true,
        "withdrawn": "2023-11-07T05:31:56Z"
      },
      "epss_record": {
        "cve_id": "<string>",
        "ingestion_time": "2023-11-07T05:31:56Z",
        "percentile": 123,
        "probability": 123
      },
      "kev_record": {
        "cve_id": "<string>",
        "date_added": "2023-11-07T05:31:56Z",
        "due_date": "2023-11-07T05:31:56Z",
        "known_ransomware_campaign_use": "<string>",
        "notes": "<string>",
        "product": "<string>",
        "required_action": "<string>",
        "short_description": "<string>",
        "vendor_project": "<string>",
        "vulnerability_name": "<string>"
      },
      "nvd_vulnerability": {
        "cve": {
          "descriptions": [
            {
              "lang": "<string>",
              "value": "<string>"
            }
          ],
          "id": "<string>",
          "last_modified": "2023-11-07T05:31:56Z",
          "published": "2023-11-07T05:31:56Z",
          "references": [
            {
              "url": "<string>",
              "source": "<string>",
              "tags": [
                "<string>"
              ]
            }
          ],
          "cisa_action_due": "<string>",
          "cisa_exploit_add": "<string>",
          "cisa_required_action": "<string>",
          "cisa_vulnerability_name": "<string>",
          "configurations": [
            {
              "negate": true,
              "nodes": [
                {
                  "cpe_match": [
                    {
                      "criteria": "<string>",
                      "match_criteria_id": "<string>",
                      "vulnerable": true,
                      "version_end_excluding": "<string>",
                      "version_end_including": "<string>",
                      "version_start_excluding": "<string>",
                      "version_start_including": "<string>"
                    }
                  ],
                  "operator": "OPERATOR_UNSPECIFIED",
                  "negate": true
                }
              ],
              "operator": "OPERATOR_UNSPECIFIED"
            }
          ],
          "evaluator_comment": "<string>",
          "evaluator_impact": "<string>",
          "evaluator_solution": "<string>",
          "metrics": {
            "cvss_metric_v2": [
              {
                "cvss_data": {
                  "base_score": 123,
                  "vector_string": "<string>",
                  "version": "<string>",
                  "access_complexity": "ACCESS_COMPLEXITY_UNSPECIFIED",
                  "access_vector": "NVD_ATTACK_VECTOR_UNSPECIFIED",
                  "authentication": "AUTH_UNSPECIFIED",
                  "availability_impact": "V2_IMPACT_IMPACT_UNSPECIFIED",
                  "availability_requirement": "NVD_REQUIREMENT_UNSPECIFIED",
                  "collateral_damage_potential": "COLLATERAL_DAMAGE_POTENTIAL_UNSPECIFIED",
                  "confidentiality_impact": "V2_IMPACT_IMPACT_UNSPECIFIED",
                  "confidentiality_requirement": "NVD_REQUIREMENT_UNSPECIFIED",
                  "environmental_score": 123,
                  "exploitability": "EXPLOITABILITY_UNSPECIFIED",
                  "integrity_impact": "V2_IMPACT_IMPACT_UNSPECIFIED",
                  "integrity_requirement": "NVD_REQUIREMENT_UNSPECIFIED",
                  "remediation_level": "NVD_REMEDIATION_LEVEL_UNSPECIFIED",
                  "report_confidence": "REPORT_CONFIDENCE_UNSPECIFIED",
                  "target_distribution": "TARGET_DISTRIBUTION_UNSPECIFIED",
                  "temporal_score": 123
                },
                "source": "<string>",
                "type": "NVD_METRIC_TYPE_UNSPECIFIED",
                "ac_insuf_info": true,
                "base_severity": "<string>",
                "exploitability_score": 123,
                "impact_score": 123,
                "obtain_all_privilege": true,
                "obtain_other_privilege": true,
                "obtain_user_privilege": true,
                "user_interaction_required": true
              }
            ],
            "cvss_metric_v30": [
              {
                "cvss_data": {
                  "base_score": 123,
                  "base_severity": "NVD_SEVERITY_UNSPECIFIED",
                  "vector_string": "<string>",
                  "version": "<string>",
                  "attack_complexity": "NVD_ATTACK_COMPLEXITY_UNSPECIFIED",
                  "attack_vector": "NVD_ATTACK_VECTOR_UNSPECIFIED",
                  "availability_impact": "NVD_IMPACT_UNSPECIFIED",
                  "availability_requirement": "NVD_REQUIREMENT_UNSPECIFIED",
                  "confidentiality_impact": "NVD_IMPACT_UNSPECIFIED",
                  "confidentiality_requirement": "NVD_REQUIREMENT_UNSPECIFIED",
                  "environmental_score": 123,
                  "environmental_severity": "NVD_SEVERITY_UNSPECIFIED",
                  "exploit_code_maturity": "NVD_EXPLOIT_CODE_MATURITY_UNSPECIFIED",
                  "integrity_impact": "NVD_IMPACT_UNSPECIFIED",
                  "integrity_requirement": "NVD_REQUIREMENT_UNSPECIFIED",
                  "modified_attack_complexity": "NVD_MODIFIED_ATTACK_COMPLEXITY_UNSPECIFIED",
                  "modified_attack_vector": "NVD_MODIFIED_ATTACK_VECTOR_UNSPECIFIED",
                  "modified_availability_impact": "NVD_MODIFIED_IMPACT_UNSPECIFIED",
                  "modified_confidentiality_impact": "NVD_MODIFIED_IMPACT_UNSPECIFIED",
                  "modified_integrity_impact": "NVD_MODIFIED_IMPACT_UNSPECIFIED",
                  "modified_privileges_required": "NVD_MODIFIED_PRIVILEGES_REQUIRED_UNSPECIFIED",
                  "modified_scope": "NVD_MODIFIED_SCOPE_UNSPECIFIED",
                  "modified_user_interaction": "NVD_MODIFIED_USER_INTERACTION_UNSPECIFIED",
                  "privileges_required": "NVD_PRIVILEGES_REQUIRED_UNSPECIFIED",
                  "remediation_level": "NVD_REMEDIATION_LEVEL_UNSPECIFIED",
                  "report_confidence": "NVD_REPORT_CONFIDENCE_UNSPECIFIED",
                  "scope": "NVD_SCOPE_UNSPECIFIED",
                  "temporal_score": 123,
                  "temporal_severity": "NVD_SEVERITY_UNSPECIFIED",
                  "user_interaction": "NVD_USER_INTERACTION_UNSPECIFIED"
                },
                "source": "<string>",
                "type": "NVD_METRIC_TYPE_UNSPECIFIED",
                "exploitability_score": 123,
                "impact_score": 123
              }
            ],
            "cvss_metric_v31": [
              {
                "cvss_data": {
                  "base_score": 123,
                  "base_severity": "NVD_SEVERITY_UNSPECIFIED",
                  "vector_string": "<string>",
                  "version": "<string>",
                  "attack_complexity": "NVD_ATTACK_COMPLEXITY_UNSPECIFIED",
                  "attack_vector": "NVD_ATTACK_VECTOR_UNSPECIFIED",
                  "availability_impact": "NVD_IMPACT_UNSPECIFIED",
                  "availability_requirement": "NVD_REQUIREMENT_UNSPECIFIED",
                  "confidentiality_impact": "NVD_IMPACT_UNSPECIFIED",
                  "confidentiality_requirement": "NVD_REQUIREMENT_UNSPECIFIED",
                  "environmental_score": 123,
                  "environmental_severity": "NVD_SEVERITY_UNSPECIFIED",
                  "exploit_code_maturity": "NVD_EXPLOIT_CODE_MATURITY_UNSPECIFIED",
                  "integrity_impact": "NVD_IMPACT_UNSPECIFIED",
                  "integrity_requirement": "NVD_REQUIREMENT_UNSPECIFIED",
                  "modified_attack_complexity": "NVD_MODIFIED_ATTACK_COMPLEXITY_UNSPECIFIED",
                  "modified_attack_vector": "NVD_MODIFIED_ATTACK_VECTOR_UNSPECIFIED",
                  "modified_availability_impact": "NVD_MODIFIED_IMPACT_UNSPECIFIED",
                  "modified_confidentiality_impact": "NVD_MODIFIED_SCOPE_UNSPECIFIED",
                  "modified_integrity_impact": "NVD_MODIFIED_IMPACT_UNSPECIFIED",
                  "modified_privileges_required": "NVD_MODIFIED_PRIVILEGES_REQUIRED_UNSPECIFIED",
                  "modified_scope": "NVD_MODIFIED_SCOPE_UNSPECIFIED",
                  "modified_user_interaction": "NVD_MODIFIED_USER_INTERACTION_UNSPECIFIED",
                  "privileges_required": "NVD_PRIVILEGES_REQUIRED_UNSPECIFIED",
                  "remediation_level": "NVD_REMEDIATION_LEVEL_UNSPECIFIED",
                  "report_confidence": "NVD_REPORT_CONFIDENCE_UNSPECIFIED",
                  "scope": "NVD_SCOPE_UNSPECIFIED",
                  "temporal_score": 123,
                  "temporal_severity": "NVD_SEVERITY_UNSPECIFIED",
                  "user_interaction": "NVD_USER_INTERACTION_UNSPECIFIED"
                },
                "source": "<string>",
                "type": "NVD_METRIC_TYPE_UNSPECIFIED",
                "exploitability_score": 123,
                "impact_score": 123
              }
            ],
            "cvss_metric_v40": [
              {
                "cvss_data": {
                  "base_score": 123,
                  "base_severity": "NVD_SEVERITY_UNSPECIFIED",
                  "vector_string": "<string>",
                  "version": "<string>",
                  "attack_complexity": "NVDV40_ATTACK_COMPLEXITY_UNSPECIFIED",
                  "attack_requirements": "NVDV40_ATTACK_REQUIREMENTS_UNSPECIFIED",
                  "attack_vector": "NVDV40_ATTACK_VECTOR_UNSPECIFIED",
                  "automatable": "NVDV40_AUTOMATABLE_UNSPECIFIED",
                  "availability_requirement": "NVDV40_REQUIREMENT_UNSPECIFIED",
                  "confidentiality_requirement": "NVDV40_REQUIREMENT_UNSPECIFIED",
                  "environmental_score": 123,
                  "environmental_severity": "NVD_SEVERITY_UNSPECIFIED",
                  "exploit_maturity": "NVDV40_EXPLOIT_MATURITY_UNSPECIFIED",
                  "integrity_requirement": "NVDV40_REQUIREMENT_UNSPECIFIED",
                  "modified_attack_complexity": "NVDV40_MODIFIED_ATTACK_COMPLEXITY_UNSPECIFIED",
                  "modified_attack_requirements": "NVDV40_MODIFIED_ATTACK_REQUIREMENTS_UNSPECIFIED",
                  "modified_attack_vector": "NVDV40_MODIFIED_ATTACK_VECTOR_UNSPECIFIED",
                  "modified_privileges_required": "NVDV40_MODIFIED_PRIVILEGES_REQUIRED_UNSPECIFIED",
                  "modified_sub_availability_impact": "NVDV40_MODIFIED_SUB_IMPACT_UNSPECIFIED",
                  "modified_sub_confidentiality_impact": "NVDV40_MODIFIED_SUB_IMPACT_UNSPECIFIED",
                  "modified_sub_integrity_impact": "NVDV40_MODIFIED_SUB_IMPACT_UNSPECIFIED",
                  "modified_user_interaction": "NVDV40_MODIFIED_USER_INTERACTION_UNSPECIFIED",
                  "modified_vuln_availability_impact": "NVDV40_MODIFIED_IMPACT_UNSPECIFIED",
                  "modified_vuln_confidentiality_impact": "NVDV40_MODIFIED_IMPACT_UNSPECIFIED",
                  "modified_vuln_integrity_impact": "NVDV40_MODIFIED_IMPACT_UNSPECIFIED",
                  "privileges_required": "NVDV40_PRIVILEGES_REQUIRED_UNSPECIFIED",
                  "provider_urgency": "NVDV40_PROVIDER_URGENCY_UNSPECIFIED",
                  "recovery": "NVDV40_RECOVERY_UNSPECIFIED",
                  "safety": "NVDV40_SAFETY_UNSPECIFIED",
                  "sub_availability_impact": "NVDV40_IMPACT_UNSPECIFIED",
                  "sub_confidentiality_impact": "NVDV40_IMPACT_UNSPECIFIED",
                  "sub_integrity_impact": "NVDV40_IMPACT_UNSPECIFIED",
                  "threat_score": 123,
                  "threat_severity": "NVD_SEVERITY_UNSPECIFIED",
                  "user_interaction": "NVDV40_USER_INTERACTION_UNSPECIFIED",
                  "value_density": "NVDV40_VALUE_DENSITY_UNSPECIFIED",
                  "vuln_availability_impact": "NVDV40_IMPACT_UNSPECIFIED",
                  "vuln_confidentiality_impact": "NVDV40_IMPACT_UNSPECIFIED",
                  "vuln_integrity_impact": "NVDV40_IMPACT_UNSPECIFIED",
                  "vulnerability_response_effort": "NVDV40_VULNERABILITY_RESPONSE_EFFORT_UNSPECIFIED"
                },
                "source": "<string>",
                "type": "NVD_METRIC_TYPE_UNSPECIFIED",
                "exploitability_score": 123,
                "impact_score": 123
              }
            ]
          },
          "source_identifier": "<string>",
          "vendor_comments": [
            {
              "comment": "<string>",
              "last_modified": "2023-11-07T05:31:56Z",
              "organization": "<string>"
            }
          ],
          "vuln_status": "<string>",
          "vuln_typed_status": "NVD_STATUS_UNSPECIFIED",
          "weaknesses": [
            {
              "description": [
                {
                  "lang": "<string>",
                  "value": "<string>"
                }
              ],
              "source": "<string>",
              "type": "<string>"
            }
          ]
        }
      },
      "osv_vulnerability": {
        "affected": [
          {
            "database_specific": {},
            "ecosystem_specific": {},
            "package": {
              "ecosystem": "<string>",
              "name": "<string>",
              "purl": "<string>"
            },
            "ranges": [
              {
                "events": [
                  {
                    "fixed": "<string>",
                    "introduced": "<string>",
                    "limit": "<string>"
                  }
                ],
                "repo": "<string>",
                "type": "UNSPECIFIED"
              }
            ],
            "versions": [
              "<string>"
            ]
          }
        ],
        "aliases": [
          "<string>"
        ],
        "credits": [
          {
            "contact": [
              "<string>"
            ],
            "name": "<string>"
          }
        ],
        "database_specific": {},
        "details": "<string>",
        "id": "<string>",
        "modified": "2023-11-07T05:31:56Z",
        "package": {
          "ecosystem": "<string>",
          "name": "<string>",
          "purl": "<string>"
        },
        "published": "2023-11-07T05:31:56Z",
        "references": [
          {
            "type": "NONE",
            "url": "<string>"
          }
        ],
        "related": [
          "<string>"
        ],
        "schema_version": "<string>",
        "severity": [
          {
            "score": "<string>",
            "type": "UNSPECIFIED"
          }
        ],
        "summary": "<string>",
        "withdrawn": "2023-11-07T05:31:56Z"
      }
    },
    "references": [
      {
        "type": "REFERENCE_TYPE_UNSPECIFIED",
        "url": "<string>"
      }
    ],
    "related": [
      "<string>"
    ],
    "summary": "<string>",
    "withdrawn": "2023-11-07T05:31:56Z"
  },
  "tenant_meta": {
    "namespace": "<string>"
  },
  "uuid": "<string>"
}

Path Parameters

tenant_meta.namespace
string
required

Namespaces are a way to organize organizational units into virtual groupings of resources. Namespaces must be a fully qualified name, for example, the child namespace of namespace "endor.prod" called "app" is called "endor.prod.app".

uuid
string
required

The UUID of the requested resource.

Query Parameters

get_parameters.mask
string

List of fields to return (all fields are returned by default).

Response

A successful response.

Vuln represents an Endor Labs vulnerability in the system.

meta
object
required

Common fields for all Endor Labs resources.

spec
object
tenant_meta
object

Tenant related data for the tenant containing the resource.

uuid
string

The UUID of a vulnerability.