{
"data": [
{
"id": 1,
"workspace": "example.com",
"vuln_info": "CVE-2024-1234",
"vuln_title": "SQL Injection in Login Form",
"vuln_desc": "The login form is vulnerable to SQL injection via the username parameter.",
"vuln_poc": "username=' OR '1'='1' --&password=test",
"severity": "critical",
"confidence": "Certain",
"asset_type": "web",
"asset_value": "https://example.com/login",
"tags": ["sqli", "owasp-top10", "authentication"],
"detail_http_request": "POST /login HTTP/1.1\nHost: example.com\n...",
"detail_http_response": "HTTP/1.1 200 OK\n...",
"raw_vuln_json": "{\"template\":\"sqli-login.yaml\",...}",
"created_at": "2025-01-15T10:30:00Z",
"updated_at": "2025-01-15T10:30:00Z"
},
{
"id": 2,
"workspace": "example.com",
"vuln_info": "CVE-2024-5678",
"vuln_title": "Cross-Site Scripting (XSS) in Search",
"vuln_desc": "Reflected XSS vulnerability in the search functionality.",
"vuln_poc": "<script>alert('XSS')</script>",
"severity": "high",
"confidence": "Firm",
"asset_type": "web",
"asset_value": "https://example.com/search",
"tags": ["xss", "owasp-top10"],
"detail_http_request": "GET /search?q=<script>alert(1)</script> HTTP/1.1\n...",
"detail_http_response": "HTTP/1.1 200 OK\n...",
"raw_vuln_json": "{\"template\":\"xss-reflected.yaml\",...}",
"created_at": "2025-01-15T10:31:00Z",
"updated_at": "2025-01-15T10:31:00Z"
}
],
"pagination": {
"total": 15,
"offset": 0,
"limit": 20
}
}