CVE Vulnerabilities
Draft
Get the Common Vulnerabilities and Exposures (CVE) summary of an application.
The service returns the CVE description and the number of impacted third-party packages.
These insights come from CAST Highlight Scanner.
URI
GET /rest/applications/{name}/insights/cve
Path Parameters
-
name (string)
:- This parameter identifies the analyzed application.
The application name must be properly encoded if it is required. Character back-quote is not allowed.
Query Parameters
-
criticality (string)
, optional:- Filter detection patterns on criticality level (case insensitive). See Insight CVE Criticality.
Responses
-
application/json
:The response is the list of CVE insights.
Example:
[ { "id": "CVE-2021-41411", "description": "drools \u003C=7.59.x is affected by an XML External Entity (XXE) vulnerability ...", "reference": "https://nvd.nist.gov/vuln/detail/CVE-2021-41411", "criticality": { "id": "CRITICAL" }, "nbPackages": 1 }, ... ]
JSON Representation
Property Type Description id string CVE reference ID. description string Summary reference string Official Web Page URL criticality.id enum Level of criticality/severity. nbPackages int The number of impacted third-party packages