Fetches a paginated list of suspected vulnerabilities associated with a specific organization. Supports comprehensive filtering by status, source, listings, categories, and search queries.
Unique identifier for the organization whose vulnerabilities are being retrieved
Filter vulnerabilities by their current status (e.g, qualified, in_triage, vulnerable, not_vulnerable, qualified)
Filter by automated triage status. Indicates whether the vulnerability has been processed through automated triage workflows and its current automated assessment state. (e.g., eligible, ineligible, agent_review, ops_review, vulnerable, not_vulnerable, target_unreachable, out_of_scope, not_applicable)
Filter by vulnerability detection source (e.g., 'synack', 'tenable', 'qualys', 'tenablewas'). Identifies the tool or method that originally discovered the vulnerability.
Filter by vulnerability detection source ID/job ID. This represents the specific batch or job identifier from external scanning tools that discovered the vulnerability.
Filter vulnerabilities by specific listing UIDs. Listings represent individual penetration testing engagements.
Filter by vulnerability category ID. Categories classify vulnerabilities by type (e.g., authorization_permissions/cross_origin_resource_sharing_cors, cross_site_scripting_xss/) to organize findings.
Filter by the specific category of listings (penetration testing scopes). Helps narrow results to particular types of security assessments. (e.g., web application, mobile)
Filter by the specific severity of vulnerabilities. Helps narrow results to particular types of security. (e.g., low, medium, high, critical, none)
Specify the format for data export: 'csv' for spreadsheet analysis. When provided, returns downloadable file instead of JSON.
Specify which fields to include in exported files. Allows customization of export content to include only relevant fields for specific reporting or analysis needs. Will return all fields by default.
Specify the column headers for the exported file. Returns all custom names for headers in the file, it will be the same as SuspectedVulnerabilityResponse by default.
Free-text search query to filter vulnerabilities. Searches across vulnerability titles, descriptions, asset information, and other relevant text fields for matching content.
Maximum number of vulnerability records to return per page. Controls pagination size for better performance and manageable result sets. Typical values range from 10-100.
Page number for paginated results. Used in conjunction with perPage to navigate through large result sets. Page numbering starts from 1.
Field to sort results by: 'createdAt' for chronological discovery, 'lastDetectedAt' for most recent activity, or 'cvssBase' for severity-based ordering.
Sort direction: 'asc' for ascending or 'desc' for descending order.
asc, desc Successfully retrieved a paginated list of suspected vulnerabilities matching the specified filter criteria, including metadata for pagination and summary statistics.