Vulnerabilities
Vulnerability detail
This tag groups all operations for vulnerabilities.
Returns the Vulnerability by ID.
Authorizations
Path parameters
vulnerabilityIdstring · max: 64RequiredExample:
The ID of the Vulnerability.
CVE-2019-1234
Responses
200
Getting Vulnerability was successful.
application/json
400
### Bad Request
The request send to the API was malformed.
application/json
401
### Unauthorized
The request is missing authorization information or the authorization information provided are expired.
application/json
403
### Not Allowed
The user issuing the request does not have the needed permissions.
application/json
404
### Not Found
The resource that was requested could not be found.
application/json
429
### Too Many Requests
The user has sent too many requests in a given amount of time.
application/json
500
### Internal Server Error
An internal error occurred. We apologize for the inconvenience!
application/json
503
### Service Unavailable
The server is currently unable to handle the request due to a temporary overloading or maintenance of the server.
application/json
default
### Unexpected Internal Server Error
An unexpected internal error occurred. We apologize for the inconvenience!
application/json
get
GET /containerregistries/vulnerabilities/{vulnerabilityId} HTTP/1.1
Host: api.ionos.com
Authorization: YOUR_API_KEY
Accept: */*
{
"id": "CVE-2019-1234",
"type": "vulnerability",
"href": "https://api.ionos.com/containerregistries/vulnerabilities/CVE-2019-1234",
"metadata": {
"publishedAt": "2019-01-01T00:00:00+00:00",
"updatedAt": "2019-01-01T00:00:00+00:00"
},
"properties": {
"description": "A vulnerability in the web UI of Cisco IOS XE Software could allow an authenticated, remote attacker to execute commands on the underlying Linux shell of an affected device with root privileges.",
"recommendations": "Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.",
"dataSource": {
"id": "osv",
"url": "https://github.com/pypa/advisory-db"
},
"fixable": true,
"affects": [
{
"type": "maven",
"name": "org.apache.commons:commons-lang3",
"version": "3.8.1"
}
],
"references": [
"https://access.redhat.com/security/cve/CVE-2019-1234"
],
"severity": "high",
"score": 9.8
}
}
Was this helpful?