Search Fixes

GET https://{{API_URL}}/fixes/search

Filters fixes by a given set of vulnerability and asset parameters and returns the filtered fixes as well as the total number of fixes. By default, only fixes for open vulnerabilities with active assets are returned. Results are paginated in pages of 100. Each unique parameter is combined using AND while each of values passed in a single array will be combined using OR. For example, if you search for all fixes belonging to vulnerabilities with status=[open] and port=[443, 80] you will receive all fixes for open vulnerabilities that have either port 443 or port 80. This is shown in the CURL example below.

Request Params

KeyDatatypeRequiredDescription
active_internet_breach[]stringarray of booleans - An array of booleans for filtering your vulnerabilities by those that have seen tranding breach activity.
id[]stringarray of integers - Search for all fixes related to vulnerabilities that are connected to a set of assets.

id

| | status[] | string | | array of strings - By default, only fixes for vulnerabilities with active assets are returned. To override this default specify the status param for an asset as shown. Status choices are active and inactive. | | connector_names[] | string | | array of strings - An array of connector names related to your vulnerabilities. | | connector_types[] | string | | array of strings - An array of connector types related to your vulnerabilities. | | custom_field:CUSTOM_FIELD_NAME[] | string | | array of strings - Search for all fixes for vulnerabilities that have a specific custom field value. The proper format for a custom field query is 'custom_fields:' then the name of the custom_field you are searching on, then the value you are searching for.

curl -H "X-Risk-Token: <token>" "https://{{API_URL}}/fixes/search?custom_field:test_score[]=1&custom_field:test_date[]=10/1/2015" -X GET | | easily_exploitable[] | string | | array of booleans - An array of booleans for filtering your vulnerabilities by those that have seen high levels of exploitation recently. | | id[] | string | | array of integers - Array of vulnerability ids | | malware_exploitable[] | string | | array of booleans - An array of booleans for filtering your vulnerabilities by those that have had pieces of malware identified. | | max_risk_meter_score | string | | int32 - Find all fixes for vulnerabilities with risk scores less than this value. | | min_risk_meter_score | string | | int32 - Find all fixes for vulnerabilities with risk scores greater than this value. | | pci_related[] | string | | array of booleans - An array of booleans to filter for PCI related vulnerabilities. | | popular_target[] | string | | array of booleans - An array of booleans for filtering your vulnerabilities by those that are popular targets. | | port[] | string | | array of integers - An array of ports associated with your vulnerabilities. | | search_id | string | | int32 - The ID of a risk meter group to retrieve fixes for. Other parameters are ignored if search_id is provided. | | service_ticket_status | string | | array of strings - An array of strings that represent the statuses of all service tickets connected to your vulnerabilities. | | status[] | string | | array of strings - An array of statuses for vulnerabilities. | | top_priority[] | string | | array of booleans - An array of booleans for filtering your vulnerabilities by those that Kenna recommends should be a top priority to fix. | | vulnerability_class[] | string | | array of strings - An array of strings describing the class of your vulnerabilities. | | wasc_classification[] | string | | array of strings - An array of WASC classifications related to your vulnerabilities. | | zero_day[] | string | | array of booleans - An array of booleans for filtering your vulnerabilities by those that are classified as zero days. |