Vulnerabilities

List the image vulnerabilities discovered in an account

get/vulnerabilities

List the container image vulnerabilities that have been found running in all clusters of the account

SecurityTrend Micro Cloud One API Key
Request
query Parameters
cursor
string <byte>
Default: ""

An encoded value used to retrieve the next set of results for a query that returns more than limit results.

filter
string

When present, the filter query parameter with a value of "all" will return a list of vulnerabilities, including ones that do not have current occurrences but were detected recently.

This query parameter may be combined with the cursor and limit query parameters, and one of the sort/name/severity query parameters.

Value: "all"
limit
integer <int64> <= 100
Default: 25

The maximum number of records to return.

name
string

When present, the name query parameter will filter the list of vulnerabilities to those vulnerabilities where the name is the provided value.

This query parameter may be combined with only the cursor and limit and filter query parameters.

severity
string

When present, the severity query parameter will filter the list of vulnerabilities to those vulnerabilities where the severity is the provided value.

This query parameter may be combined with only the cursor and limit and filter query parameters.

Enum: "critical" "high" "medium" "low" "negligible" "unknown"
sort
string
Default: "severity"

When present, the sort query parameter will order the list of events by the value of the provided field

This query parameter may be combined with only the cursor and limit and filter query parameters.

Value: "severity"
header Parameters
api-version
string
Default: v1

The version of the API to use.

Value: "v1"
Responses
200

The response body contains the list of vulnerabilities, or nothing if Container Security is not deployed into any clusters.

400

Something about your request didn't quite make sense. The error message should help you figure out what went wrong.

401

Did you forget to include an API Key in your request? You need to include a valid authentication header in your request. See API reference documentation for details on available authentication methods.

403

You tried to do something that you're not allowed to do, you naughty scamp. Check your privileges to see what you're actually allowed to do. This could also mean that your token has expired.

404

The resource you were looking for doesn't exist.

429

You have made too many requests too quickly. Check the Retry-After header for an indication of when you might be able to try again.

500

Something has gone terribly wrong. Sorry! The error message may help you figure out what went wrong, but it's unlikely that you'll be able to do anything about it unless you're the server administrator. It's possible that trying again will help, but it's more likely that you're out of luck for the moment.

503

The service is temporarily unavailable, likely due to maintenance. It should be available soon, check the Retry-After header for an indication of when you might be able to try again.

Request samples
curl --request GET \
  --url 'https://container.us-1.cloudone.trendmicro.com/api/vulnerabilities?cursor=SOME_STRING_VALUE&limit=SOME_INTEGER_VALUE&severity=SOME_STRING_VALUE&name=SOME_STRING_VALUE&filter=SOME_STRING_VALUE&sort=SOME_STRING_VALUE' \
  --header 'Authorization: REPLACE_KEY_VALUE'
Response samples
application/json
{
  • "vulnerabilities": [
    ],
  • "next": "dGhpcyB2YWx1ZSBpcyBvcGFxdWUsIGRlY29kaW5nIGl0IHdvbid0IGJlIHVzZWZ1bAo="
}

List the image vulnerabilities discovered in a cluster

get/clusters/{id}/vulnerabilities

List the container image vulnerabilities that have been found running in a particular cluster of an account

SecurityTrend Micro Cloud One API Key
Request
path Parameters
id
required
string

The cluster id.

query Parameters
cursor
string <byte>
Default: ""

An encoded value used to retrieve the next set of results for a query that returns more than limit results.

filter
string

When present, the filter query parameter with a value of "all" will return a list of vulnerabilities, including ones that do not have current occurrences but were detected recently in the cluster.

This query parameter may be combined with the cursor and limit query parameters, and one of the name/severity query parameters.

Value: "all"
limit
integer <int64> <= 100
Default: 25

The maximum number of records to return.

name
string

When present, the name query parameter will filter the list of vulnerabilities to those vulnerabilities where the name is the provided value.

This query parameter may be combined with only the cursor and limit and filter query parameters.

severity
string

When present, the severity query parameter will filter the list of vulnerabilities to those vulnerabilities where the severity is the provided value.

This query parameter may be combined with only the cursor and limit and filter query parameters.

Enum: "critical" "high" "medium" "low" "negligible" "unknown"
header Parameters
api-version
string
Default: v1

The version of the API to use.

Value: "v1"
Responses
200

The response body contains the list of vulnerabilities, or nothing if Container Security is not deployed into any clusters.

400

Something about your request didn't quite make sense. The error message should help you figure out what went wrong.

401

Did you forget to include an API Key in your request? You need to include a valid authentication header in your request. See API reference documentation for details on available authentication methods.

403

You tried to do something that you're not allowed to do, you naughty scamp. Check your privileges to see what you're actually allowed to do. This could also mean that your token has expired.

404

The resource you were looking for doesn't exist.

429

You have made too many requests too quickly. Check the Retry-After header for an indication of when you might be able to try again.

500

Something has gone terribly wrong. Sorry! The error message may help you figure out what went wrong, but it's unlikely that you'll be able to do anything about it unless you're the server administrator. It's possible that trying again will help, but it's more likely that you're out of luck for the moment.

503

The service is temporarily unavailable, likely due to maintenance. It should be available soon, check the Retry-After header for an indication of when you might be able to try again.

Request samples
curl --request GET \
  --url 'https://container.us-1.cloudone.trendmicro.com/api/clusters/{id}/vulnerabilities?cursor=SOME_STRING_VALUE&limit=SOME_INTEGER_VALUE&severity=SOME_STRING_VALUE&name=SOME_STRING_VALUE&filter=SOME_STRING_VALUE' \
  --header 'Authorization: REPLACE_KEY_VALUE'
Response samples
application/json
{
  • "vulnerabilities": [
    ],
  • "next": "dGhpcyB2YWx1ZSBpcyBvcGFxdWUsIGRlY29kaW5nIGl0IHdvbid0IGJlIHVzZWZ1bAo="
}

List the vulnerabilities discovered in an image

get/clusters/{id}/images/{image}/vulnerabilities

List the container image vulnerabilities that have been found running in a particular image of a particular cluster of an account

SecurityTrend Micro Cloud One API Key
Request
path Parameters
id
required
string

The cluster id.

image
required
string

The image id.

query Parameters
cursor
string <byte>
Default: ""

An encoded value used to retrieve the next set of results for a query that returns more than limit results.

filter
string

When present, the filter query parameter with a value of "all" will return a list of vulnerabilities, including ones that do not have current occurrences but were detected recently in the cluster for the specified image.

This query parameter may be combined with the cursor and limit query parameters, and one of the name/severity query parameters.

Value: "all"
limit
integer <int64> <= 100
Default: 25

The maximum number of records to return.

name
string

When present, the name query parameter will filter the list of vulnerabilities to those vulnerabilities where the name is the provided value.

This query parameter may be combined with only the cursor and limit and filter query parameters.

severity
string

When present, the severity query parameter will filter the list of vulnerabilities to those vulnerabilities where the severity is the provided value.

This query parameter may be combined with only the cursor and limit and filter query parameters.

Enum: "critical" "high" "medium" "low" "negligible" "unknown"
header Parameters
api-version
string
Default: v1

The version of the API to use.

Value: "v1"
Responses
200

The response body contains the list of vulnerabilities, or nothing if Container Security is not deployed into any clusters.

400

Something about your request didn't quite make sense. The error message should help you figure out what went wrong.

401

Did you forget to include an API Key in your request? You need to include a valid authentication header in your request. See API reference documentation for details on available authentication methods.

403

You tried to do something that you're not allowed to do, you naughty scamp. Check your privileges to see what you're actually allowed to do. This could also mean that your token has expired.

404

The resource you were looking for doesn't exist.

429

You have made too many requests too quickly. Check the Retry-After header for an indication of when you might be able to try again.

500

Something has gone terribly wrong. Sorry! The error message may help you figure out what went wrong, but it's unlikely that you'll be able to do anything about it unless you're the server administrator. It's possible that trying again will help, but it's more likely that you're out of luck for the moment.

503

The service is temporarily unavailable, likely due to maintenance. It should be available soon, check the Retry-After header for an indication of when you might be able to try again.

Request samples
curl --request GET \
  --url 'https://container.us-1.cloudone.trendmicro.com/api/clusters/{id}/images/{image}/vulnerabilities?cursor=SOME_STRING_VALUE&limit=SOME_INTEGER_VALUE&severity=SOME_STRING_VALUE&name=SOME_STRING_VALUE&filter=SOME_STRING_VALUE' \
  --header 'Authorization: REPLACE_KEY_VALUE'
Response samples
application/json
{
  • "vulnerabilities": [
    ],
  • "next": "dGhpcyB2YWx1ZSBpcyBvcGFxdWUsIGRlY29kaW5nIGl0IHdvbid0IGJlIHVzZWZ1bAo="
}