Bulk Update Account's Findings
POST/findings/bulk/update/
Request
- application/json
- application/x-www-form-urlencoded
- multipart/form-data
Body
required
Array [
]
cookie
- Cookieparameter
- Parameterarbitrary_url_param
- Parameterheader
- Headerurl_folder
- URL Pathurl_filename
- URL Pathjson_parameter
- JSON Parameterrequest_body
- Request Bodymultipart_parameter
- Multipart Parametergraphql_parameter
- GraphQL Parameternon_standard_parameter
- Non Standard Parameternotfixed
- Not Fixedinvalid
- Invalidaccepted
- Acceptedfixed
- Fixed10
- low20
- medium30
- high
List of object IDs.
Scans that originated the vulnerability finding.
labels
object[]
Labels of the vulnerability finding.
Possible values: <= 255 characters
Name of the label.
The maximum length is 255 characters.
Possible values: Value must match regular expression ^[a-zA-Z0-9#_-]*$
Color of the label, in RGB hexadecimal format prefixed with "#".
For example, "#00FF00" for green.
Definition of the vulnerability.
Possible values: [cookie
, parameter
, arbitrary_url_param
, header
, url_folder
, url_filename
, json_parameter
, request_body
, multipart_parameter
, graphql_parameter
, non_standard_parameter
, ``]
Insertion point of the parameter:
Possible values: <= 1024 characters
Name of the inserted parameter.
The maximum length is 1024 characters.
User who is assigned to fix the vulnerability.
Possible values: [notfixed
, invalid
, accepted
, fixed
]
State of the vulnerability finding:
(Read more about the meaning of vulnerability findings states)
Possible values: >= -2147483648
and <= 2147483647
, [10
, 20
, 30
]
Severity of the vulnerability finding:
Date and time of when the vulnerability was last found, in ISO 8601 UTC format. For example, "2023-08-09T13:27:43.8208302"
If true, this is a newly found vulnerability. If false, this vulnerability has been found in previous scans.
Comment on the object.
Body
required
Array [
]
cookie
- Cookieparameter
- Parameterarbitrary_url_param
- Parameterheader
- Headerurl_folder
- URL Pathurl_filename
- URL Pathjson_parameter
- JSON Parameterrequest_body
- Request Bodymultipart_parameter
- Multipart Parametergraphql_parameter
- GraphQL Parameternon_standard_parameter
- Non Standard Parameternotfixed
- Not Fixedinvalid
- Invalidaccepted
- Acceptedfixed
- Fixed10
- low20
- medium30
- high
List of object IDs.
Scans that originated the vulnerability finding.
labels
object[]
Labels of the vulnerability finding.
Possible values: <= 255 characters
Name of the label.
The maximum length is 255 characters.
Possible values: Value must match regular expression ^[a-zA-Z0-9#_-]*$
Color of the label, in RGB hexadecimal format prefixed with "#".
For example, "#00FF00" for green.
Definition of the vulnerability.
Possible values: [cookie
, parameter
, arbitrary_url_param
, header
, url_folder
, url_filename
, json_parameter
, request_body
, multipart_parameter
, graphql_parameter
, non_standard_parameter
, ``]
Insertion point of the parameter:
Possible values: <= 1024 characters
Name of the inserted parameter.
The maximum length is 1024 characters.
User who is assigned to fix the vulnerability.
Possible values: [notfixed
, invalid
, accepted
, fixed
]
State of the vulnerability finding:
(Read more about the meaning of vulnerability findings states)
Possible values: >= -2147483648
and <= 2147483647
, [10
, 20
, 30
]
Severity of the vulnerability finding:
Date and time of when the vulnerability was last found, in ISO 8601 UTC format. For example, "2023-08-09T13:27:43.8208302"
If true, this is a newly found vulnerability. If false, this vulnerability has been found in previous scans.
Comment on the object.
Body
required
Array [
]
cookie
- Cookieparameter
- Parameterarbitrary_url_param
- Parameterheader
- Headerurl_folder
- URL Pathurl_filename
- URL Pathjson_parameter
- JSON Parameterrequest_body
- Request Bodymultipart_parameter
- Multipart Parametergraphql_parameter
- GraphQL Parameternon_standard_parameter
- Non Standard Parameternotfixed
- Not Fixedinvalid
- Invalidaccepted
- Acceptedfixed
- Fixed10
- low20
- medium30
- high
List of object IDs.
Scans that originated the vulnerability finding.
labels
object[]
Labels of the vulnerability finding.
Possible values: <= 255 characters
Name of the label.
The maximum length is 255 characters.
Possible values: Value must match regular expression ^[a-zA-Z0-9#_-]*$
Color of the label, in RGB hexadecimal format prefixed with "#".
For example, "#00FF00" for green.
Definition of the vulnerability.
Possible values: [cookie
, parameter
, arbitrary_url_param
, header
, url_folder
, url_filename
, json_parameter
, request_body
, multipart_parameter
, graphql_parameter
, non_standard_parameter
, ``]
Insertion point of the parameter:
Possible values: <= 1024 characters
Name of the inserted parameter.
The maximum length is 1024 characters.
User who is assigned to fix the vulnerability.
Possible values: [notfixed
, invalid
, accepted
, fixed
]
State of the vulnerability finding:
(Read more about the meaning of vulnerability findings states)
Possible values: >= -2147483648
and <= 2147483647
, [10
, 20
, 30
]
Severity of the vulnerability finding:
Date and time of when the vulnerability was last found, in ISO 8601 UTC format. For example, "2023-08-09T13:27:43.8208302"
If true, this is a newly found vulnerability. If false, this vulnerability has been found in previous scans.
Comment on the object.
Responses
- 200
- 400
- 401
- 500
- application/json
- Schema
- Example (from schema)
Schema
List of object IDs.
{
"ids": [
"string"
]
}
- application/json
- Schema
- Example (from schema)
Schema
{
"<field name>": [
"Errors related to field <field name>."
],
"non_field_errors": [
"Errors not related to any field specific field."
]
}
- application/json
- Schema
- Example (from schema)
Schema
{
"detail": "Incorrect authentication credentials."
}
- application/json
- Schema
- Example (from schema)
Schema
{
"detail": "Unexpected error while handling your request."
}