Refresh Vulnerability Stats
POST/api/v34.00/stats/vulnerabilities/refresh
x-prisma-cloud-target-env: {"permission":"monitorVuln"}
Refreshes the current day's CVE counts and CVE list, as well as their descriptions.
This endpoint returns the same response as /api/v<VERSION>/stats/vulnerabilities
, but with updated data for the current day.
cURL Request
Refer to the following example cURL command that refreshes the vulnerability statistics for current day:
$ curl -k \
-u <USER> \
-H 'Content-Type: application/json' \
-X POST \
'https://<CONSOLE>/api/v<VERSION>/stats/vulnerabilities/refresh'
A successful response returns a summary count of the CVEs and detailed descriptions for each CVE for the current day.
Request
Query Parameters
offset integer
Offsets the result to a specific report count. Offset starts from 0.
limit integer
Limit is the amount to fix.
sort string
Sorts the result using a key.
reverse boolean
Sorts the result in reverse order.
Responses
- 200
- default
- application/json
- Schema
- Example (auto)
Schema
- Array [
- ]
_idstring
ID of the vulnerability stats.
containers object
functions object
hosts object
images object
modifieddate-time
Date/time when the entity was modified.
registryImages object
[
{
"_id": "string",
"containers": {
"count": 0,
"cves": {
"critical": 0,
"high": 0,
"low": 0,
"medium": 0,
"total": 0
},
"impacted": {
"critical": 0,
"high": 0,
"low": 0,
"medium": 0,
"total": 0
},
"vulnerabilities": [
{
"cve": "string",
"description": "string",
"exploits": [
{
"kind": [
"poc",
"in-the-wild"
],
"link": "string",
"source": [
"",
"exploit-db",
"exploit-windows",
"cisa-kev"
]
}
],
"highestCVSS": 0,
"highestRiskFactors": {
"envVarSecrets": true,
"hostAccess": true,
"internet": true,
"network": true,
"noSecurityProfile": true,
"privilegedContainer": true,
"rootMount": true,
"rootPrivilege": true,
"runtimeSocket": true
},
"highestSeverity": "string",
"impactedPkgs": [
"string"
],
"impactedResourceType": [
"container",
"image",
"host",
"istio",
"vm",
"function",
"registryImage"
],
"impactedResourcesCnt": 0,
"link": "string",
"riskFactors": {},
"riskScore": 0,
"status": "string"
}
]
},
"functions": {
"count": 0,
"cves": {
"critical": 0,
"high": 0,
"low": 0,
"medium": 0,
"total": 0
},
"impacted": {
"critical": 0,
"high": 0,
"low": 0,
"medium": 0,
"total": 0
},
"vulnerabilities": [
{
"cve": "string",
"description": "string",
"exploits": [
{
"kind": [
"poc",
"in-the-wild"
],
"link": "string",
"source": [
"",
"exploit-db",
"exploit-windows",
"cisa-kev"
]
}
],
"highestCVSS": 0,
"highestRiskFactors": {
"envVarSecrets": true,
"hostAccess": true,
"internet": true,
"network": true,
"noSecurityProfile": true,
"privilegedContainer": true,
"rootMount": true,
"rootPrivilege": true,
"runtimeSocket": true
},
"highestSeverity": "string",
"impactedPkgs": [
"string"
],
"impactedResourceType": [
"container",
"image",
"host",
"istio",
"vm",
"function",
"registryImage"
],
"impactedResourcesCnt": 0,
"link": "string",
"riskFactors": {},
"riskScore": 0,
"status": "string"
}
]
},
"hosts": {
"count": 0,
"cves": {
"critical": 0,
"high": 0,
"low": 0,
"medium": 0,
"total": 0
},
"impacted": {
"critical": 0,
"high": 0,
"low": 0,
"medium": 0,
"total": 0
},
"vulnerabilities": [
{
"cve": "string",
"description": "string",
"exploits": [
{
"kind": [
"poc",
"in-the-wild"
],
"link": "string",
"source": [
"",
"exploit-db",
"exploit-windows",
"cisa-kev"
]
}
],
"highestCVSS": 0,
"highestRiskFactors": {
"envVarSecrets": true,
"hostAccess": true,
"internet": true,
"network": true,
"noSecurityProfile": true,
"privilegedContainer": true,
"rootMount": true,
"rootPrivilege": true,
"runtimeSocket": true
},
"highestSeverity": "string",
"impactedPkgs": [
"string"
],
"impactedResourceType": [
"container",
"image",
"host",
"istio",
"vm",
"function",
"registryImage"
],
"impactedResourcesCnt": 0,
"link": "string",
"riskFactors": {},
"riskScore": 0,
"status": "string"
}
]
},
"images": {
"count": 0,
"cves": {
"critical": 0,
"high": 0,
"low": 0,
"medium": 0,
"total": 0
},
"impacted": {
"critical": 0,
"high": 0,
"low": 0,
"medium": 0,
"total": 0
},
"vulnerabilities": [
{
"cve": "string",
"description": "string",
"exploits": [
{
"kind": [
"poc",
"in-the-wild"
],
"link": "string",
"source": [
"",
"exploit-db",
"exploit-windows",
"cisa-kev"
]
}
],
"highestCVSS": 0,
"highestRiskFactors": {
"envVarSecrets": true,
"hostAccess": true,
"internet": true,
"network": true,
"noSecurityProfile": true,
"privilegedContainer": true,
"rootMount": true,
"rootPrivilege": true,
"runtimeSocket": true
},
"highestSeverity": "string",
"impactedPkgs": [
"string"
],
"impactedResourceType": [
"container",
"image",
"host",
"istio",
"vm",
"function",
"registryImage"
],
"impactedResourcesCnt": 0,
"link": "string",
"riskFactors": {},
"riskScore": 0,
"status": "string"
}
]
},
"modified": "2024-07-29T15:51:28.071Z",
"registryImages": {
"count": 0,
"cves": {
"critical": 0,
"high": 0,
"low": 0,
"medium": 0,
"total": 0
},
"impacted": {
"critical": 0,
"high": 0,
"low": 0,
"medium": 0,
"total": 0
},
"vulnerabilities": [
{
"cve": "string",
"description": "string",
"exploits": [
{
"kind": [
"poc",
"in-the-wild"
],
"link": "string",
"source": [
"",
"exploit-db",
"exploit-windows",
"cisa-kev"
]
}
],
"highestCVSS": 0,
"highestRiskFactors": {
"envVarSecrets": true,
"hostAccess": true,
"internet": true,
"network": true,
"noSecurityProfile": true,
"privilegedContainer": true,
"rootMount": true,
"rootPrivilege": true,
"runtimeSocket": true
},
"highestSeverity": "string",
"impactedPkgs": [
"string"
],
"impactedResourceType": [
"container",
"image",
"host",
"istio",
"vm",
"function",
"registryImage"
],
"impactedResourcesCnt": 0,
"link": "string",
"riskFactors": {},
"riskScore": 0,
"status": "string"
}
]
}
}
]
- curl
- python
- go
- nodejs
- csharp
- php
- CURL
curl -L -X POST 'https://pan.dev/api/v34.00/stats/vulnerabilities/refresh' \
-H 'Accept: application/json'