Vulnerable Applications by SHA256 and Computers

GET https://{{amp4e_APIhost}}/v1/vulnerabilities/{{Observable_SHA256}}/computers

This API call shows which vulnerability infos have been identified. Take a look into the wiki how vulnerability information is generated: https://wiki.cisco.com/x/crPiDg