Yandex Cloud
Search
Contact UsGet started
  • Blog
  • Pricing
  • Documentation
  • All Services
  • System Status
    • Featured
    • Infrastructure & Network
    • Data Platform
    • Containers
    • Developer tools
    • Serverless
    • Security
    • Monitoring & Resources
    • ML & AI
    • Business tools
  • All Solutions
    • By industry
    • By use case
    • Economics and Pricing
    • Security
    • Technical Support
    • Customer Stories
    • Start testing with double trial credits
    • Cloud credits to scale your IT product
    • Gateway to Russia
    • Cloud for Startups
    • Education and Science
    • Yandex Cloud Partner program
  • Blog
  • Pricing
  • Documentation
© 2025 Direct Cursus Technology L.L.C.
Yandex Container Registry
  • Getting started
  • Yandex Container Solution
  • Access management
  • Pricing policy
  • Terraform reference
    • Authentication with the API
      • Overview
        • Overview
        • Scan
        • Get
        • GetLast
        • List
        • ListVulnerabilities
  • Monitoring metrics
  • Audit Trails events
  • Troubleshooting
  • FAQ

In this article:

  • HTTP request
  • Path parameters
  • Query parameters
  • Response
  • Vulnerability
  • PackageVulnerability
  1. API reference
  2. REST
  3. Scanner
  4. ListVulnerabilities

Container Registry API, REST: Scanner.ListVulnerabilities

Written by
Yandex Cloud
Updated at November 26, 2024
  • HTTP request
  • Path parameters
  • Query parameters
  • Response
  • Vulnerability
  • PackageVulnerability

Retrieves the list of vulnerabilities found in particular scan.

HTTP requestHTTP request

GET https://container-registry.api.cloud.yandex.net/container-registry/v1/scans/{scanResultId}:listVulnerabilities

Path parametersPath parameters

Field

Description

scanResultId

string

Required field. ID of the ScanResult to get list of vulnerabilities for.

Query parametersQuery parameters

Field

Description

pageSize

string (int64)

The maximum number of results per page to return. If the number of available
results is larger than pageSize,
the service returns a ListRegistriesResponse.nextPageToken
that can be used to get the next page of results in subsequent list requests.
Default value: 100.

pageToken

string

Page token. To get the next page of results, set pageToken to the
ListRegistriesResponse.nextPageToken returned by a previous list request.

filter

string

A filter expression that filters resources listed in the response.
The expression must specify:

  1. The field name. Currently you can use filtering only on Vulnerability.severity and PackageVulnerability.name fields.
  2. An = operator.
  3. The value in double quotes (").

orderBy

string

An order expression that orders resources listed in the response.
The expression must specify:

  1. The field name. Currently you can use filtering only on Vulnerability.severity and PackageVulnerability.name fields.
  2. Order selector. Currently you can use ordering only on Vulnerability.severity field (recent first).

ResponseResponse

HTTP Code: 200 - OK

{
  "vulnerabilities": [
    {
      "severity": "string",
      // Includes only one of the fields `package`
      "package": {
        "name": "string",
        "link": "string",
        "package": "string",
        "source": "string",
        "version": "string",
        "fixedBy": "string",
        "origin": "string",
        "type": "string"
      }
      // end of the list of possible fields
    }
  ],
  "nextPageToken": "string"
}

Field

Description

vulnerabilities[]

Vulnerability

List of Vulnerability resources.

nextPageToken

string

This token allows you to get the next page of results for list requests. If the number of results
is larger than ListImagesRequest.pageSize, use
the nextPageToken as the value
for the ListImagesRequest.pageToken query parameter
in the next list request. Each subsequent list request will have its own
nextPageToken to continue paging through the results.

VulnerabilityVulnerability

A Vulnerability resource.

Field

Description

severity

enum (Severity)

Output only. Severity of the Vulnerability.

  • SEVERITY_UNSPECIFIED
  • CRITICAL: Critical severity is a world-burning problem, exploitable for nearly all users.
    Includes remote root privilege escalations, or massive data loss.
  • HIGH: High severity is a real problem, exploitable for many users in a default installation.
    Includes serious remote denial of services, local root privilege escalations, or data loss.
  • MEDIUM: Medium severity is a real security problem, and is exploitable for many users.
    Includes network daemon denial of service attacks, cross-site scripting, and gaining user privileges.
    Updates should be made soon for this priority of issue.
  • LOW: Low severity is a security problem, but is hard to exploit due to environment, requires a user-assisted attack,
    a small install base, or does very little damage. These tend to be included in security updates only when
    higher priority issues require an update, or if many low priority issues have built up.
  • NEGLIGIBLE: Negligible severity is technically a security problem, but is only theoretical in nature, requires a very special situation,
    has almost no install base, or does no real damage. These tend not to get backport from upstream,
    and will likely not be included in security updates unless there is an easy fix and some other issue causes an update.
  • UNDEFINED: Unknown severity is either a security problem that has not been assigned to a priority yet or
    a priority that our system did not recognize.

package

PackageVulnerability

Includes only one of the fields package.

Details of vulnerability depending on type. Only package vulnerability is supported at the moment.

PackageVulnerabilityPackageVulnerability

A PackageVulnerability resource.

Field

Description

name

string

Name of vulnerability in CVE database.

link

string

URL to the page with description of vulnerability.

package

string

The package name where vulnerability has been found.

source

string

The package manager name. Ex.: yum, rpm, dpkg.

version

string

The version of the package where vulnerability has been found.

fixedBy

string

The version of the package where vulnerability has been fixed.

origin

string

The place where vulnerability is originated (OS, lang package, etc.)

type

string

The type of vulnerability origin - name of OS if origin="os" or package type (jar, gobinary, etc.) if origin="lang"

Was the article helpful?

Previous
List
Next
Overview
© 2025 Direct Cursus Technology L.L.C.