Yandex Cloud
Поиск
Связаться с намиПодключиться
  • Документация
  • Блог
  • Все сервисы
  • Статус работы сервисов
    • Популярные
    • Инфраструктура и сеть
    • Платформа данных
    • Контейнеры
    • Инструменты разработчика
    • Бессерверные вычисления
    • Безопасность
    • Мониторинг и управление ресурсами
    • Машинное обучение
    • Бизнес-инструменты
  • Все решения
    • По отраслям
    • По типу задач
    • Экономика платформы
    • Безопасность
    • Техническая поддержка
    • Каталог партнёров
    • Обучение и сертификация
    • Облако для стартапов
    • Облако для крупного бизнеса
    • Центр технологий для общества
    • Облако для интеграторов
    • Поддержка IT-бизнеса
    • Облако для фрилансеров
    • Обучение и сертификация
    • Блог
    • Документация
    • Контент-программа
    • Мероприятия и вебинары
    • Контакты, чаты и сообщества
    • Идеи
    • Истории успеха
    • Тарифы Yandex Cloud
    • Промоакции и free tier
    • Правила тарификации
  • Документация
  • Блог
Проект Яндекса
© 2025 ООО «Яндекс.Облако»
Yandex Container Registry
  • Начало работы
  • Yandex Container Solution
  • Управление доступом
  • Правила тарификации
  • Справочник Terraform
    • Аутентификация в API
      • Overview
        • Overview
        • Scan
        • Get
        • GetLast
        • List
        • ListVulnerabilities
  • Метрики Monitoring
  • Аудитные логи Audit Trails
  • Решение проблем
  • Вопросы и ответы
  • Обучающие курсы

В этой статье:

  • gRPC request
  • ListVulnerabilitiesRequest
  • ListVulnerabilitiesResponse
  • Vulnerability
  • PackageVulnerability
  1. Справочник API
  2. gRPC (англ.)
  3. Scanner
  4. ListVulnerabilities

Container Registry API, gRPC: ScannerService.ListVulnerabilities

Статья создана
Yandex Cloud
Обновлена 26 ноября 2024 г.
  • gRPC request
  • ListVulnerabilitiesRequest
  • ListVulnerabilitiesResponse
  • Vulnerability
  • PackageVulnerability

Retrieves the list of vulnerabilities found in particular scan.

gRPC request

rpc ListVulnerabilities (ListVulnerabilitiesRequest) returns (ListVulnerabilitiesResponse)

ListVulnerabilitiesRequest

{
  "scan_result_id": "string",
  "page_size": "int64",
  "page_token": "string",
  "filter": "string",
  "order_by": "string"
}

Field

Description

scan_result_id

string

Required field. ID of the ScanResult to get list of vulnerabilities for.

page_size

int64

The maximum number of results per page to return. If the number of available
results is larger than page_size,
the service returns a ListRegistriesResponse.next_page_token
that can be used to get the next page of results in subsequent list requests.
Default value: 100.

page_token

string

Page token. To get the next page of results, set page_token to the
ListRegistriesResponse.next_page_token returned by a previous list request.

filter

string

A filter expression that filters resources listed in the response.
The expression must specify:

  1. The field name. Currently you can use filtering only on Vulnerability.severity and PackageVulnerability.name fields.
  2. An = operator.
  3. The value in double quotes (").

order_by

string

An order expression that orders resources listed in the response.
The expression must specify:

  1. The field name. Currently you can use filtering only on Vulnerability.severity and PackageVulnerability.name fields.
  2. Order selector. Currently you can use ordering only on Vulnerability.severity field (recent first).

ListVulnerabilitiesResponse

{
  "vulnerabilities": [
    {
      "severity": "Severity",
      // Includes only one of the fields `package`
      "package": {
        "name": "string",
        "link": "string",
        "package": "string",
        "source": "string",
        "version": "string",
        "fixed_by": "string",
        "origin": "string",
        "type": "string"
      }
      // end of the list of possible fields
    }
  ],
  "next_page_token": "string"
}

Field

Description

vulnerabilities[]

Vulnerability

List of Vulnerability resources.

next_page_token

string

This token allows you to get the next page of results for list requests. If the number of results
is larger than ListImagesRequest.page_size, use
the next_page_token as the value
for the ListImagesRequest.page_token query parameter
in the next list request. Each subsequent list request will have its own
next_page_token to continue paging through the results.

Vulnerability

A Vulnerability resource.

Field

Description

severity

enum Severity

Output only. Severity of the Vulnerability.

  • SEVERITY_UNSPECIFIED
  • CRITICAL: Critical severity is a world-burning problem, exploitable for nearly all users.
    Includes remote root privilege escalations, or massive data loss.
  • HIGH: High severity is a real problem, exploitable for many users in a default installation.
    Includes serious remote denial of services, local root privilege escalations, or data loss.
  • MEDIUM: Medium severity is a real security problem, and is exploitable for many users.
    Includes network daemon denial of service attacks, cross-site scripting, and gaining user privileges.
    Updates should be made soon for this priority of issue.
  • LOW: Low severity is a security problem, but is hard to exploit due to environment, requires a user-assisted attack,
    a small install base, or does very little damage. These tend to be included in security updates only when
    higher priority issues require an update, or if many low priority issues have built up.
  • NEGLIGIBLE: Negligible severity is technically a security problem, but is only theoretical in nature, requires a very special situation,
    has almost no install base, or does no real damage. These tend not to get backport from upstream,
    and will likely not be included in security updates unless there is an easy fix and some other issue causes an update.
  • UNDEFINED: Unknown severity is either a security problem that has not been assigned to a priority yet or
    a priority that our system did not recognize.

package

PackageVulnerability

Includes only one of the fields package.

Details of vulnerability depending on type. Only package vulnerability is supported at the moment.

PackageVulnerability

A PackageVulnerability resource.

Field

Description

name

string

Name of vulnerability in CVE database.

link

string

URL to the page with description of vulnerability.

package

string

The package name where vulnerability has been found.

source

string

The package manager name. Ex.: yum, rpm, dpkg.

version

string

The version of the package where vulnerability has been found.

fixed_by

string

The version of the package where vulnerability has been fixed.

origin

string

The place where vulnerability is originated (OS, lang package, etc.)

type

string

The type of vulnerability origin - name of OS if origin="os" or package type (jar, gobinary, etc.) if origin="lang"

Была ли статья полезна?

Предыдущая
List
Следующая
Overview
Проект Яндекса
© 2025 ООО «Яндекс.Облако»