QuimeraX - EASM
  1. 217
QuimeraX - EASM
  • External - V1
    • external
      • teams
        • domain-assets/vulnerabilities
          • 217
            • show asset vulnerability
              GET
            • update vulnerability status
              PATCH
          • list assets vulnerabilities
            GET
        • intelligence
          • takedowns
            • 15
              • show takedown
              • store tkd history
            • list takedowns
          • compromised-cards
            • list compromised cards
            • update compromised card status
          • brands
            • brand details
            • show phishings
          • detection-logs
            • 1448
              • show detection log
            • list detection logs
            • create detection log
            • store takedown with detection log
          • social-media-detection-logs
            • list social media detection logs
            • create social media detection log
            • show social media detection log
            • store takedown with social medi
      • cyber-threats
        • change status info stealer
        • list info stealer
        • change bulk status info stealer
      • leaked-assets
        • change leaked asset status
        • change bulk leaked asset status
      • list breaches3parties
        GET
  1. 217

update vulnerability status

PATCH
https://api.quimerax.com/api/external/teams/domain-assets/vulnerabilities/1/status
Last modified:2025-06-11 21:58:47

Request

Authorization
Provide your bearer token in the
Authorization
header when making requests to protected resources.
Example:
Authorization: Bearer ********************
Header Params

Body Params application/x-www-form-urlencoded

Request samples

Shell
JavaScript
Java
Swift
Go
PHP
Python
HTTP
C
C#
Objective-C
Ruby
OCaml
Dart
R
Request Request Example
Shell
JavaScript
Java
Swift
curl --location --request PATCH 'https://api.quimerax.com/api/external/teams/domain-assets/vulnerabilities/1/status' \
--header 'X-TEAM-ID: 1' \
--header 'X-HASH-KEY: f1d80684e51e20d0d065f1db49fe89ba1f65c0876ef154c688db3841f33962a6' \
--header 'Accept: application/json' \
--header 'Content-Type: application/x-www-form-urlencoded' \
--data-urlencode 'status=open' \
--data-urlencode 'reason=reason why'

Responses

🟢200Untitled Response
application/json
Body

Example
{}
Modified at 2025-06-11 21:58:47
Previous
show asset vulnerability
Next
list assets vulnerabilities
Built with