Skip to main content

Bulk Update Account's Findings

POST 

/findings/bulk/update/

Request

Body

required

    ids string[]required

    List of object IDs.

    scans string[]

    Scans that originated the vulnerability finding.

    labels

    object[]

    Labels of the vulnerability finding.

  • Array [

  • name stringrequired

    Possible values: <= 255 characters

    Name of the label.
    The maximum length is 255 characters.

    color string

    Possible values: Value must match regular expression ^[a-zA-Z0-9#_-]*$

    Color of the label, in RGB hexadecimal format prefixed with "#".
    For example, "#00FF00" for green.

  • ]

  • definition stringrequired

    Definition of the vulnerability.

    insertion_point string

    Possible values: [cookie, parameter, arbitrary_url_param, header, url_folder, url_filename, json_parameter, request_body, multipart_parameter, graphql_parameter, non_standard_parameter, ``]

    Insertion point of the parameter:

    • cookie - Cookie
    • parameter - Parameter
    • arbitrary_url_param - Parameter
    • header - Header
    • url_folder - URL Path
    • url_filename - URL Path
    • json_parameter - JSON Parameter
    • request_body - Request Body
    • multipart_parameter - Multipart Parameter
    • graphql_parameter - GraphQL Parameter
    • non_standard_parameter - Non Standard Parameter
    parameter string

    Possible values: <= 1024 characters

    Name of the inserted parameter.
    The maximum length is 1024 characters.

    assignee stringnullable

    User who is assigned to fix the vulnerability.

    state string

    Possible values: [notfixed, invalid, accepted, fixed]

    State of the vulnerability finding:
    (Read more about the meaning of vulnerability findings states)

    • notfixed - Not Fixed
    • invalid - Invalid
    • accepted - Accepted
    • fixed - Fixed
    severity integer

    Possible values: >= -2147483648 and <= 2147483647, [10, 20, 30]

    Severity of the vulnerability finding:

    • 10 - low
    • 20 - medium
    • 30 - high
    last_found date-time

    Date and time of when the vulnerability was last found, in ISO 8601 UTC format. For example, "2023-08-09T13:27:43.8208302"

    new booleanrequired

    If true, this is a newly found vulnerability. If false, this vulnerability has been found in previous scans.

    comment stringnullable

    Comment on the object.

Responses

Schema

    ids string[]required

    List of object IDs.

Loading...