Refresh Vulnerability Stats
x-prisma-cloud-target-env: {"permission":"monitorVuln","saas":true,"self-hosted":true}
x-public: true
Refreshes the current day's CVE counts and CVE list, as well as their descriptions.
This endpoint returns the same response as /api/v<VERSION>/stats/vulnerabilities
, but with updated data for the current day.
cURL Request
Refer to the following example cURL command that refreshes the vulnerability statistics for current day:
$ curl -k \
-u <USER> \
-H 'Content-Type: application/json' \
-X POST \
'https://<CONSOLE>/api/v<VERSION>/stats/vulnerabilities/refresh'
A successful response returns a summary count of the CVEs and detailed descriptions for each CVE for the current day.
Query Parameters
- offset integer
Offsets the result to a specific report count. Offset starts from 0.
- limit integer
Number of reports to retrieve in a page. For PCCE, the maximum limit is 250. For PCEE, the maximum limit is 50. The default value is 50.
- search string
Retrieves the result for a search term.
- sort string
Sorts the result using a key. Refer to the columns in the relevant Prisma Cloud Compute user interface to use them as sort keys.
- reverse boolean
Sorts the result in reverse order.
- collections string[]
Filters the result based on collection names that you have defined in Prisma Cloud Compute.
- provider string[]
Scopes the query by cloud provider.
- accountIDs string[]
Filters the result based on cloud account IDs.
- resourceIDs string[]
Scopes the query by resource ID.
- region string[]
Scopes the query by cloud region.
- fields string[]
Retrieves the fields that you need in a report. Use the list of fields you want to retrieve. By default, the result shows all fields of data.
- 200
- default
- application/json
- Schema
- Example (from schema)
Schema
- Array [
- _id string
ID of the vulnerability stats.
codeRepos object
ResourceVulnerabilityStats holds vulnerability stats of a single resource type
count integerCount is the total number of vulnerabilities.
cves object
Distribution counts the number of vulnerabilities per type
critical integer.
high integer.
low integer.
medium integer.
total integer.
impacted object
Distribution counts the number of vulnerabilities per type
critical integer.
high integer.
low integer.
medium integer.
total integer.
vulnerabilities object[]
All resource vulnerabilities.
Array [cve stringCVE ID.
description stringVulnerability description.
exploits object[]
Exploits represents the exploits data found for a CVE
Array [kind vuln.ExploitKindPossible values: [
poc,in-the-wild
]ExploitKind represents the kind of the exploit
link stringLink is a link to information about the exploit.
source vuln.ExploitTypePossible values: [
,exploit-db,exploit-windows,cisa-kev
]ExploitType represents the source of an exploit
]highestCVSS floatHighestCVSS is the highest CVSS score of the vulnerability.
highestRiskFactors object
RiskScoreFactors holds factors used to calculate risk score
envVarSecrets booleanEnvVarSecrets indicates whether a container has access to secrets via environment variables.
hostAccess booleanHostAccess indicates whether a container has access to the host network or namespace.
internet booleanInternet indicates whether a container has internet access.
network booleanNetwork indicates whether a container is listening to ports.
noSecurityProfile booleanNoSecurityProfile indicates whether a container has security profile issue.
privilegedContainer booleanPrivilegedContainer indicates whether a container runs using the --privileged flag.
rootMount booleanRootMount indicates whether a container has access to the host file system using a root mount.
rootPrivilege booleanRootPrivilege indicates whether a container runs as root.
runtimeSocket booleanRuntimeSocket indicates whether a container has the runtime socket mounted.
highestSeverity stringHighestSeverity is the highest severity of the vulnerability.
impactedPkgs string[]Packages impacted by the vulnerability.
impactedResourceType vuln.ResourceTypePossible values: [
container,image,host,istio,vm,function,codeRepo,registryImage
]ResourceType represents the resource type
impactedResourcesCnt integerNumber of resources impacted by this vulnerability.
link stringLink to CVE.
riskFactors object
RiskFactors maps the existence of vulnerability risk factors
property name*
stringriskScore floatRisk score.
status stringCVE status.
]containers object
ResourceVulnerabilityStats holds vulnerability stats of a single resource type
count integerCount is the total number of vulnerabilities.
cves object
Distribution counts the number of vulnerabilities per type
critical integer.
high integer.
low integer.
medium integer.
total integer.
impacted object
Distribution counts the number of vulnerabilities per type
critical integer.
high integer.
low integer.
medium integer.
total integer.
vulnerabilities object[]
All resource vulnerabilities.
Array [cve stringCVE ID.
description stringVulnerability description.
exploits object[]
Exploits represents the exploits data found for a CVE
Array [kind vuln.ExploitKindPossible values: [
poc,in-the-wild
]ExploitKind represents the kind of the exploit
link stringLink is a link to information about the exploit.
source vuln.ExploitTypePossible values: [
,exploit-db,exploit-windows,cisa-kev
]ExploitType represents the source of an exploit
]highestCVSS floatHighestCVSS is the highest CVSS score of the vulnerability.
highestRiskFactors object
RiskScoreFactors holds factors used to calculate risk score
envVarSecrets booleanEnvVarSecrets indicates whether a container has access to secrets via environment variables.
hostAccess booleanHostAccess indicates whether a container has access to the host network or namespace.
internet booleanInternet indicates whether a container has internet access.
network booleanNetwork indicates whether a container is listening to ports.
noSecurityProfile booleanNoSecurityProfile indicates whether a container has security profile issue.
privilegedContainer booleanPrivilegedContainer indicates whether a container runs using the --privileged flag.
rootMount booleanRootMount indicates whether a container has access to the host file system using a root mount.
rootPrivilege booleanRootPrivilege indicates whether a container runs as root.
runtimeSocket booleanRuntimeSocket indicates whether a container has the runtime socket mounted.
highestSeverity stringHighestSeverity is the highest severity of the vulnerability.
impactedPkgs string[]Packages impacted by the vulnerability.
impactedResourceType vuln.ResourceTypePossible values: [
container,image,host,istio,vm,function,codeRepo,registryImage
]ResourceType represents the resource type
impactedResourcesCnt integerNumber of resources impacted by this vulnerability.
link stringLink to CVE.
riskFactors object
RiskFactors maps the existence of vulnerability risk factors
property name*
stringriskScore floatRisk score.
status stringCVE status.
]functions object
ResourceVulnerabilityStats holds vulnerability stats of a single resource type
count integerCount is the total number of vulnerabilities.
cves object
Distribution counts the number of vulnerabilities per type
critical integer.
high integer.
low integer.
medium integer.
total integer.
impacted object
Distribution counts the number of vulnerabilities per type
critical integer.
high integer.
low integer.
medium integer.
total integer.
vulnerabilities object[]
All resource vulnerabilities.
Array [cve stringCVE ID.
description stringVulnerability description.
exploits object[]
Exploits represents the exploits data found for a CVE
Array [kind vuln.ExploitKindPossible values: [
poc,in-the-wild
]ExploitKind represents the kind of the exploit
link stringLink is a link to information about the exploit.
source vuln.ExploitTypePossible values: [
,exploit-db,exploit-windows,cisa-kev
]ExploitType represents the source of an exploit
]highestCVSS floatHighestCVSS is the highest CVSS score of the vulnerability.
highestRiskFactors object
RiskScoreFactors holds factors used to calculate risk score
envVarSecrets booleanEnvVarSecrets indicates whether a container has access to secrets via environment variables.
hostAccess booleanHostAccess indicates whether a container has access to the host network or namespace.
internet booleanInternet indicates whether a container has internet access.
network booleanNetwork indicates whether a container is listening to ports.
noSecurityProfile booleanNoSecurityProfile indicates whether a container has security profile issue.
privilegedContainer booleanPrivilegedContainer indicates whether a container runs using the --privileged flag.
rootMount booleanRootMount indicates whether a container has access to the host file system using a root mount.
rootPrivilege booleanRootPrivilege indicates whether a container runs as root.
runtimeSocket booleanRuntimeSocket indicates whether a container has the runtime socket mounted.
highestSeverity stringHighestSeverity is the highest severity of the vulnerability.
impactedPkgs string[]Packages impacted by the vulnerability.
impactedResourceType vuln.ResourceTypePossible values: [
container,image,host,istio,vm,function,codeRepo,registryImage
]ResourceType represents the resource type
impactedResourcesCnt integerNumber of resources impacted by this vulnerability.
link stringLink to CVE.
riskFactors object
RiskFactors maps the existence of vulnerability risk factors
property name*
stringriskScore floatRisk score.
status stringCVE status.
]hosts object
ResourceVulnerabilityStats holds vulnerability stats of a single resource type
count integerCount is the total number of vulnerabilities.
cves object
Distribution counts the number of vulnerabilities per type
critical integer.
high integer.
low integer.
medium integer.
total integer.
impacted object
Distribution counts the number of vulnerabilities per type
critical integer.
high integer.
low integer.
medium integer.
total integer.
vulnerabilities object[]
All resource vulnerabilities.
Array [cve stringCVE ID.
description stringVulnerability description.
exploits object[]
Exploits represents the exploits data found for a CVE
Array [kind vuln.ExploitKindPossible values: [
poc,in-the-wild
]ExploitKind represents the kind of the exploit
link stringLink is a link to information about the exploit.
source vuln.ExploitTypePossible values: [
,exploit-db,exploit-windows,cisa-kev
]ExploitType represents the source of an exploit
]highestCVSS floatHighestCVSS is the highest CVSS score of the vulnerability.
highestRiskFactors object
RiskScoreFactors holds factors used to calculate risk score
envVarSecrets booleanEnvVarSecrets indicates whether a container has access to secrets via environment variables.
hostAccess booleanHostAccess indicates whether a container has access to the host network or namespace.
internet booleanInternet indicates whether a container has internet access.
network booleanNetwork indicates whether a container is listening to ports.
noSecurityProfile booleanNoSecurityProfile indicates whether a container has security profile issue.
privilegedContainer booleanPrivilegedContainer indicates whether a container runs using the --privileged flag.
rootMount booleanRootMount indicates whether a container has access to the host file system using a root mount.
rootPrivilege booleanRootPrivilege indicates whether a container runs as root.
runtimeSocket booleanRuntimeSocket indicates whether a container has the runtime socket mounted.
highestSeverity stringHighestSeverity is the highest severity of the vulnerability.
impactedPkgs string[]Packages impacted by the vulnerability.
impactedResourceType vuln.ResourceTypePossible values: [
container,image,host,istio,vm,function,codeRepo,registryImage
]ResourceType represents the resource type
impactedResourcesCnt integerNumber of resources impacted by this vulnerability.
link stringLink to CVE.
riskFactors object
RiskFactors maps the existence of vulnerability risk factors
property name*
stringriskScore floatRisk score.
status stringCVE status.
]images object
ResourceVulnerabilityStats holds vulnerability stats of a single resource type
count integerCount is the total number of vulnerabilities.
cves object
Distribution counts the number of vulnerabilities per type
critical integer.
high integer.
low integer.
medium integer.
total integer.
impacted object
Distribution counts the number of vulnerabilities per type
critical integer.
high integer.
low integer.
medium integer.
total integer.
vulnerabilities object[]
All resource vulnerabilities.
Array [cve stringCVE ID.
description stringVulnerability description.
exploits object[]
Exploits represents the exploits data found for a CVE
Array [kind vuln.ExploitKindPossible values: [
poc,in-the-wild
]ExploitKind represents the kind of the exploit
link stringLink is a link to information about the exploit.
source vuln.ExploitTypePossible values: [
,exploit-db,exploit-windows,cisa-kev
]ExploitType represents the source of an exploit
]highestCVSS floatHighestCVSS is the highest CVSS score of the vulnerability.
highestRiskFactors object
RiskScoreFactors holds factors used to calculate risk score
envVarSecrets booleanEnvVarSecrets indicates whether a container has access to secrets via environment variables.
hostAccess booleanHostAccess indicates whether a container has access to the host network or namespace.
internet booleanInternet indicates whether a container has internet access.
network booleanNetwork indicates whether a container is listening to ports.
noSecurityProfile booleanNoSecurityProfile indicates whether a container has security profile issue.
privilegedContainer booleanPrivilegedContainer indicates whether a container runs using the --privileged flag.
rootMount booleanRootMount indicates whether a container has access to the host file system using a root mount.
rootPrivilege booleanRootPrivilege indicates whether a container runs as root.
runtimeSocket booleanRuntimeSocket indicates whether a container has the runtime socket mounted.
highestSeverity stringHighestSeverity is the highest severity of the vulnerability.
impactedPkgs string[]Packages impacted by the vulnerability.
impactedResourceType vuln.ResourceTypePossible values: [
container,image,host,istio,vm,function,codeRepo,registryImage
]ResourceType represents the resource type
impactedResourcesCnt integerNumber of resources impacted by this vulnerability.
link stringLink to CVE.
riskFactors object
RiskFactors maps the existence of vulnerability risk factors
property name*
stringriskScore floatRisk score.
status stringCVE status.
]- modified date-time
Date/time when the entity was modified.
registryImages object
ResourceVulnerabilityStats holds vulnerability stats of a single resource type
count integerCount is the total number of vulnerabilities.
cves object
Distribution counts the number of vulnerabilities per type
critical integer.
high integer.
low integer.
medium integer.
total integer.
impacted object
Distribution counts the number of vulnerabilities per type
critical integer.
high integer.
low integer.
medium integer.
total integer.
vulnerabilities object[]
All resource vulnerabilities.
Array [cve stringCVE ID.
description stringVulnerability description.
exploits object[]
Exploits represents the exploits data found for a CVE
Array [kind vuln.ExploitKindPossible values: [
poc,in-the-wild
]ExploitKind represents the kind of the exploit
link stringLink is a link to information about the exploit.
source vuln.ExploitTypePossible values: [
,exploit-db,exploit-windows,cisa-kev
]ExploitType represents the source of an exploit
]highestCVSS floatHighestCVSS is the highest CVSS score of the vulnerability.
highestRiskFactors object
RiskScoreFactors holds factors used to calculate risk score
envVarSecrets booleanEnvVarSecrets indicates whether a container has access to secrets via environment variables.
hostAccess booleanHostAccess indicates whether a container has access to the host network or namespace.
internet booleanInternet indicates whether a container has internet access.
network booleanNetwork indicates whether a container is listening to ports.
noSecurityProfile booleanNoSecurityProfile indicates whether a container has security profile issue.
privilegedContainer booleanPrivilegedContainer indicates whether a container runs using the --privileged flag.
rootMount booleanRootMount indicates whether a container has access to the host file system using a root mount.
rootPrivilege booleanRootPrivilege indicates whether a container runs as root.
runtimeSocket booleanRuntimeSocket indicates whether a container has the runtime socket mounted.
highestSeverity stringHighestSeverity is the highest severity of the vulnerability.
impactedPkgs string[]Packages impacted by the vulnerability.
impactedResourceType vuln.ResourceTypePossible values: [
container,image,host,istio,vm,function,codeRepo,registryImage
]ResourceType represents the resource type
impactedResourcesCnt integerNumber of resources impacted by this vulnerability.
link stringLink to CVE.
riskFactors object
RiskFactors maps the existence of vulnerability risk factors
property name*
stringriskScore floatRisk score.
status stringCVE status.
]- ]
[
{
"_id": "string",
"codeRepos": {
"count": 0,
"cves": {
"critical": 0,
"high": 0,
"low": 0,
"medium": 0,
"total": 0
},
"impacted": {
"critical": 0,
"high": 0,
"low": 0,
"medium": 0,
"total": 0
},
"vulnerabilities": [
{
"cve": "string",
"description": "string",
"exploits": [
{
"kind": [
"poc",
"in-the-wild"
],
"link": "string",
"source": [
"",
"exploit-db",
"exploit-windows",
"cisa-kev"
]
}
],
"highestCVSS": 0,
"highestRiskFactors": {
"envVarSecrets": true,
"hostAccess": true,
"internet": true,
"network": true,
"noSecurityProfile": true,
"privilegedContainer": true,
"rootMount": true,
"rootPrivilege": true,
"runtimeSocket": true
},
"highestSeverity": "string",
"impactedPkgs": [
"string"
],
"impactedResourceType": [
"container",
"image",
"host",
"istio",
"vm",
"function",
"codeRepo",
"registryImage"
],
"impactedResourcesCnt": 0,
"link": "string",
"riskFactors": {},
"riskScore": 0,
"status": "string"
}
]
},
"containers": {
"count": 0,
"cves": {
"critical": 0,
"high": 0,
"low": 0,
"medium": 0,
"total": 0
},
"impacted": {
"critical": 0,
"high": 0,
"low": 0,
"medium": 0,
"total": 0
},
"vulnerabilities": [
{
"cve": "string",
"description": "string",
"exploits": [
{
"kind": [
"poc",
"in-the-wild"
],
"link": "string",
"source": [
"",
"exploit-db",
"exploit-windows",
"cisa-kev"
]
}
],
"highestCVSS": 0,
"highestRiskFactors": {
"envVarSecrets": true,
"hostAccess": true,
"internet": true,
"network": true,
"noSecurityProfile": true,
"privilegedContainer": true,
"rootMount": true,
"rootPrivilege": true,
"runtimeSocket": true
},
"highestSeverity": "string",
"impactedPkgs": [
"string"
],
"impactedResourceType": [
"container",
"image",
"host",
"istio",
"vm",
"function",
"codeRepo",
"registryImage"
],
"impactedResourcesCnt": 0,
"link": "string",
"riskFactors": {},
"riskScore": 0,
"status": "string"
}
]
},
"functions": {
"count": 0,
"cves": {
"critical": 0,
"high": 0,
"low": 0,
"medium": 0,
"total": 0
},
"impacted": {
"critical": 0,
"high": 0,
"low": 0,
"medium": 0,
"total": 0
},
"vulnerabilities": [
{
"cve": "string",
"description": "string",
"exploits": [
{
"kind": [
"poc",
"in-the-wild"
],
"link": "string",
"source": [
"",
"exploit-db",
"exploit-windows",
"cisa-kev"
]
}
],
"highestCVSS": 0,
"highestRiskFactors": {
"envVarSecrets": true,
"hostAccess": true,
"internet": true,
"network": true,
"noSecurityProfile": true,
"privilegedContainer": true,
"rootMount": true,
"rootPrivilege": true,
"runtimeSocket": true
},
"highestSeverity": "string",
"impactedPkgs": [
"string"
],
"impactedResourceType": [
"container",
"image",
"host",
"istio",
"vm",
"function",
"codeRepo",
"registryImage"
],
"impactedResourcesCnt": 0,
"link": "string",
"riskFactors": {},
"riskScore": 0,
"status": "string"
}
]
},
"hosts": {
"count": 0,
"cves": {
"critical": 0,
"high": 0,
"low": 0,
"medium": 0,
"total": 0
},
"impacted": {
"critical": 0,
"high": 0,
"low": 0,
"medium": 0,
"total": 0
},
"vulnerabilities": [
{
"cve": "string",
"description": "string",
"exploits": [
{
"kind": [
"poc",
"in-the-wild"
],
"link": "string",
"source": [
"",
"exploit-db",
"exploit-windows",
"cisa-kev"
]
}
],
"highestCVSS": 0,
"highestRiskFactors": {
"envVarSecrets": true,
"hostAccess": true,
"internet": true,
"network": true,
"noSecurityProfile": true,
"privilegedContainer": true,
"rootMount": true,
"rootPrivilege": true,
"runtimeSocket": true
},
"highestSeverity": "string",
"impactedPkgs": [
"string"
],
"impactedResourceType": [
"container",
"image",
"host",
"istio",
"vm",
"function",
"codeRepo",
"registryImage"
],
"impactedResourcesCnt": 0,
"link": "string",
"riskFactors": {},
"riskScore": 0,
"status": "string"
}
]
},
"images": {
"count": 0,
"cves": {
"critical": 0,
"high": 0,
"low": 0,
"medium": 0,
"total": 0
},
"impacted": {
"critical": 0,
"high": 0,
"low": 0,
"medium": 0,
"total": 0
},
"vulnerabilities": [
{
"cve": "string",
"description": "string",
"exploits": [
{
"kind": [
"poc",
"in-the-wild"
],
"link": "string",
"source": [
"",
"exploit-db",
"exploit-windows",
"cisa-kev"
]
}
],
"highestCVSS": 0,
"highestRiskFactors": {
"envVarSecrets": true,
"hostAccess": true,
"internet": true,
"network": true,
"noSecurityProfile": true,
"privilegedContainer": true,
"rootMount": true,
"rootPrivilege": true,
"runtimeSocket": true
},
"highestSeverity": "string",
"impactedPkgs": [
"string"
],
"impactedResourceType": [
"container",
"image",
"host",
"istio",
"vm",
"function",
"codeRepo",
"registryImage"
],
"impactedResourcesCnt": 0,
"link": "string",
"riskFactors": {},
"riskScore": 0,
"status": "string"
}
]
},
"modified": "2023-05-27T04:01:51.429Z",
"registryImages": {
"count": 0,
"cves": {
"critical": 0,
"high": 0,
"low": 0,
"medium": 0,
"total": 0
},
"impacted": {
"critical": 0,
"high": 0,
"low": 0,
"medium": 0,
"total": 0
},
"vulnerabilities": [
{
"cve": "string",
"description": "string",
"exploits": [
{
"kind": [
"poc",
"in-the-wild"
],
"link": "string",
"source": [
"",
"exploit-db",
"exploit-windows",
"cisa-kev"
]
}
],
"highestCVSS": 0,
"highestRiskFactors": {
"envVarSecrets": true,
"hostAccess": true,
"internet": true,
"network": true,
"noSecurityProfile": true,
"privilegedContainer": true,
"rootMount": true,
"rootPrivilege": true,
"runtimeSocket": true
},
"highestSeverity": "string",
"impactedPkgs": [
"string"
],
"impactedResourceType": [
"container",
"image",
"host",
"istio",
"vm",
"function",
"codeRepo",
"registryImage"
],
"impactedResourcesCnt": 0,
"link": "string",
"riskFactors": {},
"riskScore": 0,
"status": "string"
}
]
}
}
]