Skip to content

Mend API (3.0.1)

Mend's enhanced SCA API enables automation of workflows in a REST compliant format. The API features:

  • Access for any user with Mend credentials, via a user key available in the user's profile page in the Mend App.
  • Improved security with a JWT token per organization, which expires every 30 minutes.
  • Added scalability with support for pagination, filtering and sorting search results.
  • Broader functionality available programmatically.
  • New standard API documentation for easy navigation and search.

If you have a dedicated instance of Mend, contact your Mend representative to access this API on your instance.

Download OpenAPI description
Languages
Servers
Generated server url

https://api-saas.mend.io/

Operations
Operations
Operations
Operations

project-attribution-report-controller

Operations
Operations
Operations
Operations
Operations
Operations
Operations
Operations
Operations
Operations
Operations
Operations
Operations
Operations
Operations
Operations
Operations
Operations

Get Vulnerability Remediation Proposals

Request

Returns the recommended remediation actions to take for a given vulnerability

Security
bearer-key
Path
vulnerabilityIdstringrequired

Vulnerability Name in the form of CVE-xxxx-xxx or WS-xxxx-xxx.

No request payload

Responses

OK

Bodyapplication/json
supportTokenstring(Support Token)
Example: "1171c60d"
retValobject(VulnerabilityFixSummaryInfoDTO)
Response
application/json
{ "supportToken": "1171c60d", "retVal": { "vulnerability": "CVE-2021-42392", "topRankedFix": {}, "allFixes": [], "totalUpVotes": 0, "totalDownVotes": 0 } }

Request

Returns a complete vulnerability profile of a given CVE-ID

Security
bearer-key
Path
vulnerabilityIdstringrequired

Vulnerability Name in the form of CVE-xxxx-xxx or WS-xxxx-xxx.

No request payload

Responses

OK

Bodyapplication/json
supportTokenstring(Support Token)
Example: "1171c60d"
retValobject(VulnerabilityProfileDTO)
Response
application/json
{ "supportToken": "1171c60d", "retVal": { "name": "CVE-2021-42392", "type": "WS", "description": "Security vulnerability found in plexus-utils before 3.0.24. XML injection found in XmlWriterUtil.java", "score": 5, "severity": "MEDIUM", "publishDate": "2019-08-24T14:15:22Z", "modifiedDate": "2019-08-24T14:15:22Z", "vulnerabilityScoring": [], "references": [], "effectiveInfo": {}, "threatAssessment": {} } }
Operations

User Management - Roles And Permissions

Operations
Operations
Operations
Operations
Operations
Operations
Operations
Operations
Operations

product-attribution-report-controller

Operations