Vulnerable Applications by SHA256 and Computers
GET https://{{amp4e_APIhost}}/v1/vulnerabilities/{{Observable_SHA256}}/computers
This API call shows which vulnerability infos have been identified. Take a look into the wiki how vulnerability information is generated: https://wiki.cisco.com/x/crPiDg
Body
PARAM
Key | Datatype | Required | Description |
HEADERS
Key | Datatype | Required | Description |
RESPONSES
status
ENDPOINTS