Logo
Cisco Secure Endpoint API Documentation

Vulnerable Applications by SHA256 and Computers

GET https://{{amp4e_APIhost}}/v1/vulnerabilities/{{Observable_SHA256}}/computers

This API call shows which vulnerability infos have been identified. Take a look into the wiki how vulnerability information is generated: https://wiki.cisco.com/x/crPiDg

 

Body PARAM

Key Datatype Required Description 



HEADERS

Key Datatype Required Description 




RESPONSES

status





Curl
curl -X GET 'https://amp4e_APIhost/v1/vulnerabilities/Observable_SHA256/computers'

ENDPOINTS