Vulnerability: Search

Find vulnerabilities by CVSS score, risk score, exploitation status, or affected product for patch prioritization.

Query Params
string

Freetext

string

The enrichment fields requested for the entities returned. Several fields can be given as a comma separated string.

See https://docs.recordedfuture.com/reference/enrichment-field-attributes for a list of values.

enum

Annotates the response with additional metadata explaining the response data elements.

Allowed:
int32
≤ 1000

Maximum number of records returned,

int32
Defaults to 0

Offsets the pagination of the request. Note that there is a limit of returning only the top 10000 results from a search, meaning if limit plus from exceeds 10000, this will result in an Bad Request message.

string

Filters entities based on risk score, e.g. on the form [20, 80] (20 <= risk score <= 80), [20,) (20 <= risk score), or [,90) (risk score < 90). '[' and ']' are inclusive while '(' and ')' are exclusive.

string

Filters for vulnerabilities based on CVSS score (from most trusted source), e.g. on the form [8.0, 9.0] (8.0 <= CVSS score <= 9.0)

string

Filters for vulnerabilities based on CVSS v3 score, e.g. on the form [8.0, 9.0] (8.0 <= CVSS v3 score <= 9.0)

string

RF ID of affected product

string

Filters entities based on the download of the first reference which is taken into account during risk scoring of the entity. All Elasticsearch compatible date formats are valid.

string

Filters entities based on the download of the latest reference which is taken into account during risk scoring of the entity. All Elasticsearch compatible date formats are valid.

string

Filters entities based on presence in a single list. Requires the list ID, which can be found using the List API

enum

Filters for Vulnerabilities based on a single risk rule.

enum

Sorts the search according to the chosen parameter. Results are sorted before pagination.

enum

The direction of the sorting by the orderBy parameter, ascending or descending.

Allowed:
string
deprecated
string

Filters for vulnerabilities based on affected products using the CPE identifier system. This field, if used, will be validated as follows:

cpe:2.3:a:wordpress:wordpress:4.5: - Valid. Will find all products with CPEs that start with this string, like WordPress 4.5, but also 4.5 beta3 and 4.5 rc1.

cpe:2.3:a:wordpress:wordpress:4 - Valid. Note the lack of trailing colon. Will find products with versions starting with 4. Like 4.2, 4.2.3, 4.5.

cpe:2.3:a:wordpress:wordpress: - Valid. Will find all known identifiers for WordPress, regardless of version.

cpe:2.3:a:wordpress: - Invalid. Too broad, the "product" part must be defined.

Response

Language
Credentials
Header
LoadingLoading…
Response
Click Try It! to start a request and see the response here! Or choose an example:
application/json