Description: Gets an issue created by a vendor.
Security: Requires a valid user with the "Read" permission. Premium Vulnerability Database details is only available with an Enterprise and Enterprise+ subscription.
Since: Xray 3.51.0
Usage: GET /api/v2/events/{id}
Produces: application/json
Sample Request
curl -v -uadmin:Password@1 -XGET http://localhost:8000/api/v2/events/XRAY-115734
Public Vulnerability Sample Response
{ "id": "XRAY-263268", "package_type": "pypi", "type": "security", "provider": "JFrog", "summary": "Certifi is a curated collection of Root Certificates for validating the trustworthiness of SSL certificates while verifying the identity of TLS hosts. Certifi 2022.12.07 removes root certificates from \"TrustCor\" from the root store. These are in the process of being removed from Mozilla's trust store. TrustCor's root certificates are being removed pursuant to an investigation prompted by media reporting that TrustCor's ownership also operated a business that produced spyware. Conclusions of Mozilla's investigation can be found in the linked google group discussion.", "description": "Certifi is a curated collection of Root Certificates for validating the trustworthiness of SSL certificates while verifying the identity of TLS hosts. Certifi 2022.12.07 removes root certificates from \"TrustCor\" from the root store. These are in the process of being removed from Mozilla's trust store. TrustCor's root certificates are being removed pursuant to an investigation prompted by media reporting that TrustCor's ownership also operated a business that produced spyware. Conclusions of Mozilla's investigation can be found in the linked google group discussion.", "severity": "High", "leading_severity": { "severity": "High", "source": "NVD" }, "created": "2022-12-08T18:44:47.519Z", "cves": [ { "cve": "CVE-2022-23491", "cwe": [ "CWE-345" ], "cvss_v3": "7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" } ], "sources": [ { "name": "nvd", "source_id": "CVE-2022-23491", "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-23491" } ], "components": [ { "id": "certifi", "vulnerable_versions": [ "[2017.11.05,2022.12.07)" ], "fixed_versions": [ "[2022.12.07]" ], "vulnerable_ranges": [ { "vulnerable_versions": [ "[2017.11.05,2022.12.07)" ], "fixed_versions": [ "[2022.12.07]" ], "container_affected_cpes": null } ] } ], "references": [ "https://groups.google.com/a/mozilla.org/g/dev-security-policy/c/oxX69KFvsm4/m/yLohoVqtCgAJ", "https://github.com/certifi/python-certifi/security/advisories/GHSA-43fp-rhv2-5gv8" ], "modified": "2023-07-17T10:38:41.86Z", "modified_time": 0, "edited": "0001-01-01T00:00:00Z", "issue_kind": 0 }
Custom Issue Sample Response
{ "id": "CustomIssue_IvPwvFGilq1w5t3s", "package_type": "maven", "type": "security", "provider": "Custom", "summary": "custom issue example", "description": "Security issue in specific package and version\nCustom issue type: security\nSeverity: Critical\nPkg: com.google.guava:guava \nAssigned versions: specific version, version 16.0", "severity": "Critical", "leading_severity": { "severity": "Critical" }, "created": "2023-06-08T06:52:16.383Z", "sources": [ { "source_id": "CustomIssue_BClINuPvH9JmkVy4" } ], "components": [ { "id": "com.google.guava:guava", "vulnerable_versions": [ "[16.0]" ], "fixed_versions": null, "vulnerable_ranges": [ { "vulnerable_versions": [ "[16.0]" ], "fixed_versions": null, "container_affected_cpes": null } ] } ], "modified": "2023-06-08T06:52:16.383Z", "modified_time": 0, "edited": "2023-06-08T06:52:16.507Z", "issue_kind": 0 }