CG Scanning API V2
latest
  • latest
  • 5.3.0
  • 5.4.2
Home
Docs
Home
Docs
latest
  • latest
  • 5.3.0
  • 5.4.2
latest
  • latest
  • 5.3.0
  • 5.4.2
  1. Scanning API
  • Scanning API
    • Getting Started
    • Authentication
    • Common Error Responses
    • Filtering Data
    • Authentication
      • User Confirmation
        • Confirm a User
        • Show confirmation form
      • User Invitation
        • Accept an invitation
        • Pre-Accept invitation check
      • Password Reset
        • Forgot Password
        • Reset Password
      • Impersonation
        • Impersonate user
        • Impersonate user
      • MFA
        • Check 2fa
        • Send SMS OTP
      • Sign in authentication
      • Sign in with recovery code
      • Sign out authentication
      • SSO Link login
    • Targets
      • List targets
      • Create Target
      • Show a target
      • Updates a target
      • Delete a target
      • Delete targets
    • Scans
      • Scan Histories
        • List of history for a scan
        • History details for a scan
      • Scan Hosts
        • List of hosts for a scan
        • Host details for a scan
      • Scan Vulnerabilities
        • List of vulnerabilities for a scan
        • Show vulnerability details
        • Statistics for a scan
      • Scan Profiles (Configs)
        • List Activated Scan Profiles
      • List scans
      • Create Scan
      • Show a scan
      • Updates a scan
      • Delete a scan
      • Delete scans
      • Start a scan
      • Stop a scan
      • List upcoming scans
      • List recent scans that have been completed
      • List of the running scans
      • Create Scan from Wizard
    • Reports
      • List Reports
      • Show a report
      • Delete a report
      • Delete reports
      • Generates a report file
      • Downloads a report file
      • Check if a report file exists
      • Verifies file integrity by comparing hashes
    • Vulnerabilities
      • List of vulnerabilities
      • Vulnerability details
      • Total Vulnerabilities (widget)
      • Top Vulnerabilities (widget)
      • PCI Compliant (widget)
      • Send prompt about a given Vulnerability
      • Chat history about a given Vulnerability
    • Exceptions
      • List Exceptions
      • Create Exception
      • Update Exception
      • Show an exception
      • Delete an exception
      • Show exception details
      • Delete exceptions
      • Activate exceptions
      • Reset exceptions
      • Show the exceptions statistics
    • Schedules
      • List Schedules
      • Create Schedule
      • Updates a schedule
      • Show a schedule
      • Delete a schedule
      • Delete schedules
      • Calculate First Time Schedule Date
      • Calculate Next Schedule Dates
    • Webhooks
      • Deliveries
        • List all deliveries for a webhook
        • Get a delivery for a webhook
      • List all webhooks
      • Create a webhook
      • Show a webhook
      • Update a webhook
      • Delete a webhook
      • Activate a webhook
      • Deactivate a webhook
    • Advanced Reports
      • List Advanced Reports
      • Create an advanced report
      • Show an advanced report
      • Update an advanced report
      • Delete an advanced report
      • Delete advanced reports
      • Generates an advanced report file
      • Downloads an advanced report file
    • Audit
      • Get all events
      • Get event by id
    • Notifications
      • List Notifications
      • Show a notification
      • Delete a notification
      • Mark as read a notification
      • Mark as seen a notification
      • Mark as read all notifications
      • Mark as seen all notifications
    • Hosts
      • List of hosts
      • Host details
      • List of most vulnerable hosts
    • Scanners
      • List scanners
      • Create scanner
      • Show scanner
      • Update scanner
      • Delete scanner
      • List activated scanners
      • Activate scanner
      • Deactivate scanner
      • Update scanner app type
      • Assign a scanner to an organization
      • Verify a scanner
    • Port Lists
      • List port lists
      • Create a port list
      • Show a port list
      • Update a port list
      • Delete a port list
      • List activated port lists
      • Add a port range to a port list
      • Delete a port range to a port list
      • Activate a port list
      • Deactivate a port list
      • Updates the app_type of a port list
      • Sync the a port lists
    • Credentials
      • List Credentials
      • Show Credential
      • Delete Credential
      • Create Credential
      • Update Credential
    • User
      • User 2FA
        • Enable 2FA
        • Verify 2FA installation
        • Disable 2FA
        • Lookup phone number
        • Default 2FA method
        • Generate Recovery Codes
        • Get Recovery Codes
      • User Preferences
        • Get users notification preferences
        • Change users product
        • Enable user's event notification preference
        • Disable user's event notification preference
      • Get current user
      • Update current user
      • Change current user password
      • Get current user active plans (Not implemented yet)
      • Get organization members
      • Get current user products
      • Get current organization
      • Update current organization
      • Get subscriptions history
      • Change users product
      • Checks if authorization token is valid
      • Get current user permissions
      • Check if the user can be deleted
      • Delete my account
      • Generates a new access token
      • Revokes the current access token
      • Transfers all the resources from the user to another user
    • Organizations
      • Organization Subscriptions
        • Retrieves all subscriptions of organization
        • Retrieves all active subscriptions of organization
        • Show a subscription of organization
        • Update organization's subscription
        • Assign features to a subscription
        • Revoke features from a subscription
      • Subscribe to a plan
      • List organizations
      • Create Organization
      • List dependent subscriptions
      • Retrieve an organization
      • Update an organization
      • Delete an organization
      • Subscribe an organization to a plan
      • Unsubscribe an organization from a plan
      • Change users Organization
      • Export organizations
    • Users
      • List Users
      • Create User
      • Show User
      • Update User
      • Delete a User
      • Create Customer
      • Invite User
      • Resend Confirmation Instructions
      • Import Users
      • Check if a user can be deleted
      • Inherit all the resources from a user
      • Export all users to a CSV file
      • Set partner
      • Unset partner
    • Whitelabel Settings
      • Show the white label settings
      • Show the white label settings
      • Update white label settings
    • Schemas
      • Schemas
        • errors_map
        • errorObject
        • not_found
        • ErrorResponse
        • forbidden
        • unauthorized
        • unprocessable_entity
        • pagination
        • meta
        • target
        • scan
        • targetAttributes
        • targetResponse
        • targetsResponse
        • product
        • productsResponse
  • SAQ API
    • List all SAQs
      GET
    • Get SAQ (JSON) or Download SAQ (PDF)
      GET
    • List Available SAQ Types
      GET
    • Get SAQ Type Template
      GET
    • Create a New SAQ
      POST
    • Delete an SAQ
      DELETE
    • Clone an SAQ
      PUT
    • Approve an SAQ
      PUT
    • Set SAQ as a template
      PUT
Home
Docs
Home
Docs
latest
  • latest
  • 5.3.0
  • 5.4.2
latest
  • latest
  • 5.3.0
  • 5.4.2
  1. Scanning API

Reports

Product Context Awareness
All resources in the Scanning API (such as scans, targets, schedules, and reports) are product-specific.
Before creating, updating, or querying any resource, ensure that the correct product is currently active.
Always switch to the appropriate product using the Change User Product endpoint before interacting with product-specific resources.
Confidentiality & Security Notice
Reports may contain sensitive details about your infrastructure, services, and security posture.
Please:
Download reports only when necessary
Store them in a secure location
Avoid sharing reports with unauthorized parties
Protecting report data is essential to maintaining your organization’s security.
Reports represent the final output of a scan.
They act as structured containers (buckets) of all results collected during a scan, including both vulnerabilities and informative findings for the scanned assets.
Each report reflects the security posture of the assets at the time the scan was completed and remains immutable for audit and historical purposes.

What Reports Contain#

Vulnerability findings with severity, evidence, and remediation guidance
Informative results, such as detected services, configurations, and observations
Metadata related to the scan, targets, and product used
Reports are always tied to:
A specific scan
A specific product
A specific point in time

Report Generation & Availability#

Depending on the selected product, reports can be:
Generated after scan completion
Downloaded later, without re-running the scan
Reports are generated on demand and remain available for future access as long as retention policies allow.

Report Types per Product#

Different products provide different PDF report formats, designed for technical, executive, or compliance use cases.

PCI Compliance#

Attestation of Scan Compliance (AOSC)
Detailed PCI Report
Executive PCI Report

VRMS (Vulnerability Assessment)#

Vulnerability Assessment Report
Vulnerability Summary Report
Executive VRMS Report

Penetration Testing#

Penetration Test Report (Detailed)
Penetration Test Executive Report
Each report type serves a different audience while using the same underlying scan data.

Exceptions Handling#

If a vulnerability exception has been:
1.
Submitted by a user, and
2.
Approved by the SOC team,
then
The vulnerability will still appear in the report
Its severity will be shown as Low
The exception justification and description will be included

PCI-Specific Behavior (DoS Findings)#

For PCI Compliance reports, special rules apply:
Denial of Service (DoS) vulnerabilities are not considered compliance failures
Even if a DoS issue has a high severity (e.g. CVSS 10.0), it does not cause PCI compliance to fail
Such findings are still included in the report for visibility
This behavior follows PCI ASV requirements.
Modified at 2026-01-02 16:01:05
Previous
Create Scan from Wizard
Next
List Reports
Built with