Skip to main content
Retrieve a finding details by its ID.
External DocumentationTo learn more, visit the Upwind documentation.

Parameters

ParameterDescription
Finding IDThe vulnerability ID to retrieve.
Organization IDThe ID of the organization.

Example Output

{
	"id": "string",
	"status": "OPEN",
	"vulnerability": {
		"name": "string",
		"description": "string",
		"exploitable": true,
		"nvd_description": "string",
		"nvd_cve_id": "string",
		"nvd_publish_time": "2024-07-29T15:51:28.071Z",
		"cve_first_seen_time": "2024-07-29T15:51:28.071Z",
		"nvd_cvss_v2_severity": "string",
		"nvd_cvss_v2_score": "string",
		"nvd_cvss_v3_severity": "LOW",
		"nvd_cvss_v3_score": "string",
		"nvd_cvss_v4_severity": "string",
		"nvd_cvss_v4_score": "string",
		"sbom_artifact_locations": [
			"string"
		]
	},
	"image": {
		"name": "string",
		"digest": "string",
		"uri": "string",
		"tag": "string",
		"os_version": "string",
		"os_name": "string"
	},
	"resource": {
		"id": "string",
		"external_id": "string",
		"name": "string",
		"type": "string",
		"cloud_provider": "AWS",
		"region": "string",
		"cluster_id": "string",
		"cloud_account_id": "string",
		"cloud_account_name": "string",
		"namespace": "string",
		"internet_exposure": {
			"ingress": {
				"active_communication": true
			}
		},
		"cloud_account_tags": [
			{
				"key": "string",
				"value": "string"
			}
		],
		"risk_categories": [
			"string"
		]
	},
	"remediation": [
		{
			"type": "OFFICIAL_FIX",
			"data": {
				"fixed_in_version": "string"
			}
		}
	],
	"source": "SENSOR",
	"first_seen_time": "2024-07-29T15:51:28.071Z",
	"last_scan_time": "2024-07-29T15:51:28.071Z",
	"package": {
		"name": "string",
		"framework": "string",
		"type": "string",
		"version": "string",
		"in_use": true
	}
}

Workflow Library Example

Get Vulnerability Finding with Upwind and Send Results Via Email
Workflow LibraryPreview this Workflow on desktop