Yandex Cloud
Search
Contact UsGet started
  • Blog
  • Pricing
  • Documentation
  • All Services
  • System Status
    • Featured
    • Infrastructure & Network
    • Data Platform
    • Containers
    • Developer tools
    • Serverless
    • Security
    • Monitoring & Resources
    • ML & AI
    • Business tools
  • All Solutions
    • By industry
    • By use case
    • Economics and Pricing
    • Security
    • Technical Support
    • Customer Stories
    • Gateway to Russia
    • Cloud for Startups
    • Education and Science
  • Blog
  • Pricing
  • Documentation
Yandex project
© 2025 Yandex.Cloud LLC
Yandex Container Registry
  • Getting started
  • Yandex Container Solution
  • Access management
  • Pricing policy
  • Terraform reference
    • Authentication with the API
      • Overview
        • Overview
        • Scan
        • Get
        • GetLast
        • List
        • ListVulnerabilities
  • Monitoring metrics
  • Audit Trails events
  • Troubleshooting
  • FAQ

In this article:

  • gRPC request
  • ListVulnerabilitiesRequest
  • ListVulnerabilitiesResponse
  • Vulnerability
  • PackageVulnerability
  1. API reference
  2. gRPC
  3. Scanner
  4. ListVulnerabilities

Container Registry API, gRPC: ScannerService.ListVulnerabilities

Written by
Yandex Cloud
Updated at November 26, 2024
  • gRPC request
  • ListVulnerabilitiesRequest
  • ListVulnerabilitiesResponse
  • Vulnerability
  • PackageVulnerability

Retrieves the list of vulnerabilities found in particular scan.

gRPC requestgRPC request

rpc ListVulnerabilities (ListVulnerabilitiesRequest) returns (ListVulnerabilitiesResponse)

ListVulnerabilitiesRequestListVulnerabilitiesRequest

{
  "scan_result_id": "string",
  "page_size": "int64",
  "page_token": "string",
  "filter": "string",
  "order_by": "string"
}

Field

Description

scan_result_id

string

Required field. ID of the ScanResult to get list of vulnerabilities for.

page_size

int64

The maximum number of results per page to return. If the number of available
results is larger than page_size,
the service returns a ListRegistriesResponse.next_page_token
that can be used to get the next page of results in subsequent list requests.
Default value: 100.

page_token

string

Page token. To get the next page of results, set page_token to the
ListRegistriesResponse.next_page_token returned by a previous list request.

filter

string

A filter expression that filters resources listed in the response.
The expression must specify:

  1. The field name. Currently you can use filtering only on Vulnerability.severity and PackageVulnerability.name fields.
  2. An = operator.
  3. The value in double quotes (").

order_by

string

An order expression that orders resources listed in the response.
The expression must specify:

  1. The field name. Currently you can use filtering only on Vulnerability.severity and PackageVulnerability.name fields.
  2. Order selector. Currently you can use ordering only on Vulnerability.severity field (recent first).

ListVulnerabilitiesResponseListVulnerabilitiesResponse

{
  "vulnerabilities": [
    {
      "severity": "Severity",
      // Includes only one of the fields `package`
      "package": {
        "name": "string",
        "link": "string",
        "package": "string",
        "source": "string",
        "version": "string",
        "fixed_by": "string",
        "origin": "string",
        "type": "string"
      }
      // end of the list of possible fields
    }
  ],
  "next_page_token": "string"
}

Field

Description

vulnerabilities[]

Vulnerability

List of Vulnerability resources.

next_page_token

string

This token allows you to get the next page of results for list requests. If the number of results
is larger than ListImagesRequest.page_size, use
the next_page_token as the value
for the ListImagesRequest.page_token query parameter
in the next list request. Each subsequent list request will have its own
next_page_token to continue paging through the results.

VulnerabilityVulnerability

A Vulnerability resource.

Field

Description

severity

enum Severity

Output only. Severity of the Vulnerability.

  • SEVERITY_UNSPECIFIED
  • CRITICAL: Critical severity is a world-burning problem, exploitable for nearly all users.
    Includes remote root privilege escalations, or massive data loss.
  • HIGH: High severity is a real problem, exploitable for many users in a default installation.
    Includes serious remote denial of services, local root privilege escalations, or data loss.
  • MEDIUM: Medium severity is a real security problem, and is exploitable for many users.
    Includes network daemon denial of service attacks, cross-site scripting, and gaining user privileges.
    Updates should be made soon for this priority of issue.
  • LOW: Low severity is a security problem, but is hard to exploit due to environment, requires a user-assisted attack,
    a small install base, or does very little damage. These tend to be included in security updates only when
    higher priority issues require an update, or if many low priority issues have built up.
  • NEGLIGIBLE: Negligible severity is technically a security problem, but is only theoretical in nature, requires a very special situation,
    has almost no install base, or does no real damage. These tend not to get backport from upstream,
    and will likely not be included in security updates unless there is an easy fix and some other issue causes an update.
  • UNDEFINED: Unknown severity is either a security problem that has not been assigned to a priority yet or
    a priority that our system did not recognize.

package

PackageVulnerability

Includes only one of the fields package.

Details of vulnerability depending on type. Only package vulnerability is supported at the moment.

PackageVulnerabilityPackageVulnerability

A PackageVulnerability resource.

Field

Description

name

string

Name of vulnerability in CVE database.

link

string

URL to the page with description of vulnerability.

package

string

The package name where vulnerability has been found.

source

string

The package manager name. Ex.: yum, rpm, dpkg.

version

string

The version of the package where vulnerability has been found.

fixed_by

string

The version of the package where vulnerability has been fixed.

origin

string

The place where vulnerability is originated (OS, lang package, etc.)

type

string

The type of vulnerability origin - name of OS if origin="os" or package type (jar, gobinary, etc.) if origin="lang"

Was the article helpful?

Previous
List
Next
Overview
Yandex project
© 2025 Yandex.Cloud LLC