Inspector2 / Paginator / SearchVulnerabilities
SearchVulnerabilities#
- class Inspector2.Paginator.SearchVulnerabilities#
paginator = client.get_paginator('search_vulnerabilities')
- paginate(**kwargs)#
Creates an iterator that will paginate through responses from
Inspector2.Client.search_vulnerabilities()
.See also: AWS API Documentation
Request Syntax
response_iterator = paginator.paginate( filterCriteria={ 'vulnerabilityIds': [ 'string', ] }, PaginationConfig={ 'MaxItems': 123, 'StartingToken': 'string' } )
- Parameters:
filterCriteria (dict) –
[REQUIRED]
The criteria used to filter the results of a vulnerability search.
vulnerabilityIds (list) – [REQUIRED]
The IDs for specific vulnerabilities.
(string) –
PaginationConfig (dict) –
A dictionary that provides parameters to control pagination.
MaxItems (integer) –
The total number of items to return. If the total number of items available is more than the value specified in max-items then a
NextToken
will be provided in the output that you can use to resume pagination.StartingToken (string) –
A token to specify where to start paginating. This is the
NextToken
from a previous response.
- Return type:
dict
- Returns:
Response Syntax
{ 'vulnerabilities': [ { 'atigData': { 'firstSeen': datetime(2015, 1, 1), 'lastSeen': datetime(2015, 1, 1), 'targets': [ 'string', ], 'ttps': [ 'string', ] }, 'cisaData': { 'action': 'string', 'dateAdded': datetime(2015, 1, 1), 'dateDue': datetime(2015, 1, 1) }, 'cvss2': { 'baseScore': 123.0, 'scoringVector': 'string' }, 'cvss3': { 'baseScore': 123.0, 'scoringVector': 'string' }, 'cwes': [ 'string', ], 'description': 'string', 'detectionPlatforms': [ 'string', ], 'epss': { 'score': 123.0 }, 'exploitObserved': { 'firstSeen': datetime(2015, 1, 1), 'lastSeen': datetime(2015, 1, 1) }, 'id': 'string', 'referenceUrls': [ 'string', ], 'relatedVulnerabilities': [ 'string', ], 'source': 'NVD', 'sourceUrl': 'string', 'vendorCreatedAt': datetime(2015, 1, 1), 'vendorSeverity': 'string', 'vendorUpdatedAt': datetime(2015, 1, 1) }, ], 'NextToken': 'string' }
Response Structure
(dict) –
vulnerabilities (list) –
Details about the listed vulnerability.
(dict) –
Contains details about a specific vulnerability Amazon Inspector can detect.
atigData (dict) –
An object that contains information about the Amazon Web Services Threat Intel Group (ATIG) details for the vulnerability.
firstSeen (datetime) –
The date and time this vulnerability was first observed.
lastSeen (datetime) –
The date and time this vulnerability was last observed.
targets (list) –
The commercial sectors this vulnerability targets.
(string) –
ttps (list) –
The MITRE ATT&CK tactics, techniques, and procedures (TTPs) associated with vulnerability.
(string) –
cisaData (dict) –
An object that contains the Cybersecurity and Infrastructure Security Agency (CISA) details for the vulnerability.
action (string) –
The remediation action recommended by CISA for this vulnerability.
dateAdded (datetime) –
The date and time CISA added this vulnerability to their catalogue.
dateDue (datetime) –
The date and time CISA expects a fix to have been provided vulnerability.
cvss2 (dict) –
An object that contains the Common Vulnerability Scoring System (CVSS) Version 2 details for the vulnerability.
baseScore (float) –
The CVSS v2 base score for the vulnerability.
scoringVector (string) –
The scoring vector associated with the CVSS v2 score.
cvss3 (dict) –
An object that contains the Common Vulnerability Scoring System (CVSS) Version 3 details for the vulnerability.
baseScore (float) –
The CVSS v3 base score for the vulnerability.
scoringVector (string) –
The scoring vector associated with the CVSS v3 score.
cwes (list) –
The Common Weakness Enumeration (CWE) associated with the vulnerability.
(string) –
description (string) –
A description of the vulnerability.
detectionPlatforms (list) –
Platforms that the vulnerability can be detected on.
(string) –
epss (dict) –
An object that contains the Exploit Prediction Scoring System (EPSS) score.
score (float) –
The Exploit Prediction Scoring System (EPSS) score.
exploitObserved (dict) –
An object that contains details on when the exploit was observed.
firstSeen (datetime) –
The date an time when the exploit was first seen.
lastSeen (datetime) –
The date an time when the exploit was last seen.
id (string) –
The ID for the specific vulnerability.
referenceUrls (list) –
Links to various resources with more information on this vulnerability.
(string) –
relatedVulnerabilities (list) –
A list of related vulnerabilities.
(string) –
source (string) –
The source of the vulnerability information.
sourceUrl (string) –
A link to the official source material for this vulnerability.
vendorCreatedAt (datetime) –
The date and time when the vendor created this vulnerability.
vendorSeverity (string) –
The severity assigned by the vendor.
vendorUpdatedAt (datetime) –
The date and time when the vendor last updated this vulnerability.
NextToken (string) –
A token to resume pagination.