{"info":{"_postman_id":"a4dab12e-48d1-485c-9b6e-c4812660caeb","name":"FortifyData API Reference","description":"<html><head></head><body><p>The FortifyData API is a REST API for accessing assessment data from the FortifyData platform.</p>\n<hr>\n<h4 id=\"generating-a-key\">Generating a Key</h4>\n<p>To generate an API Key, please log onto the <a href=\"https://\">US FortifyData Platform</a> for US customers and <a href=\"https://\">EU FortifyData Platform</a> for European customers.</p>\n<ol>\n<li><p>You must be an <strong>Administrator</strong> or a <strong>user with the API role assigned</strong> to generate API Keys.</p>\n</li>\n<li><p>Select <em>Settings</em></p>\n</li>\n<li><p>Select <em>API</em> - &gt; <em>API Keys</em> from the <em>Settings</em> menu.</p>\n</li>\n<li><p>Click <em>Generate API Key</em></p>\n</li>\n</ol>\n<img src=\"https://content.pstmn.io/be4e9df4-ca8b-4f0d-a31b-d4ee45e4263c/aW1hZ2UucG5n\" width=\"664\" height=\"113\">\n\n<p>5.User-facing instructions:</p>\n<p>Give your key a clear, descriptive name.</p>\n<p>Select which endpoints the key should have access to.</p>\n<p>Assign access to the appropriate company, third parties, and portfolios.</p>\n<p>If you want the key to automatically include all subsidiaries or third parties (both current and future), check <strong>“Allow access to all [subsidiaries | third parties]”</strong>.</p>\n<p>You can also assign the key to users in the same company—permissions will update automatically based on their roles.</p>\n<p>Set an expiration date for the key.</p>\n<p>The expiration offers four preset options: <strong>30, 60, 90 days, and up to 1 year</strong>. Alternatively, you can select a <strong>custom expiration date</strong> using the date picker.</p>\n<img src=\"https://content.pstmn.io/27edfbca-608b-4572-9672-161320f71a7b/aW1hZ2UucG5n\" width=\"700\" height=\"873\">\n\n<img src=\"https://content.pstmn.io/234d4859-139d-4a2d-9361-66efd61f214a/aW1hZ2UucG5n\" width=\"701\" height=\"643\">\n\n<p>6. You will be taken to a confirmation window that displays some summary information and the newly generated key. Copy the key from the confirmation and store it somewhere safe. *<em>This is the only time you can view your key.__*</em></p>\n<img src=\"https://content.pstmn.io/61678053-8350-4094-a919-e722017b462c/aW1hZ2UucG5n\" alt=\"\" height=\"633\" width=\"700\">\n\n<p>Pass your API Key into each API call on the <code>Authorization</code> header with the prefix <code>ApiKey</code>.</p>\n<p>For example:</p>\n<pre class=\"click-to-expand-wrapper is-snippet-wrapper\"><code>curl --location --request GET \"https://api.{region}.fortifydata.com/api/v1/assessment/id/a-company-id\" \\\n  --header \"Authorization: ApiKey your-api-key-here\"\n\n</code></pre><h4 id=\"regional-base-urls\">Regional base URLs</h4>\n<ul>\n<li><p>US: <a href=\"https://\">https://api.us.fortifydata.com</a></p>\n</li>\n<li><p>EU: <a href=\"https://\">https://api.eu.fortifydata.com</a></p>\n</li>\n</ul>\n<h4 id=\"rate-limiting\">Rate Limiting</h4>\n<p>API access is rate limited to 5 calls per second. If rate limited is exceeded, the API will respond with a 429 status code</p>\n</body></html>","schema":"https://schema.getpostman.com/json/collection/v2.0.0/collection.json","toc":[],"owner":"7998040","collectionId":"a4dab12e-48d1-485c-9b6e-c4812660caeb","publishedId":"SVfWKk2F","public":true,"customColor":{"top-bar":"FFFFFF","right-sidebar":"1B2337","highlight":"00ABD1"},"publishDate":"2020-02-07T20:09:41.000Z"},"item":[{"name":"Get Assessment Summary Data by Domain","id":"59878908-3490-4064-bbbb-c3db0150b1f2","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"auth":{"type":"noauth","isInherited":false},"method":"GET","header":[{"key":"Authorization","value":"ApiKey {{api_key}}","type":"text"}],"url":"https://api.{{region}}.fortifydata.com/api/v1/assessment/domain/{{domain}}","description":"<p>This endpoint retrieves a company's <strong>assessment data</strong> based on the provided <strong>top-level domain (TLD)</strong>.</p>\n<h3 id=\"behavior\"><strong>Behavior</strong></h3>\n<ul>\n<li><p><strong>If the company exists</strong> → Returns the assessment data for the specified domain.</p>\n</li>\n<li><p><strong>For Partners</strong> →</p>\n<ul>\n<li><p>If the company is <strong>not found</strong>, a <strong>new company</strong> is automatically created using the provided domain.</p>\n</li>\n<li><p>The response will include:</p>\n<ul>\n<li><p>An <strong>empty assessment dataset</strong></p>\n</li>\n<li><p>The newly generated <strong>Company ID</strong></p>\n</li>\n<li><p>A <strong>status</strong> of <code>PENDING</code></p>\n</li>\n</ul>\n</li>\n</ul>\n</li>\n<li><p><strong>For Enterprise Customers</strong> →</p>\n<ul>\n<li>If the company is <strong>not found</strong>, the API returns a <strong>404 Not Found</strong> response.</li>\n</ul>\n</li>\n</ul>\n<h3 id=\"authorization--permissions\"><strong>Authorization &amp; Permissions</strong></h3>\n<ul>\n<li><p><strong>Required Permission</strong> → <code>Assessment Summary</code></p>\n</li>\n<li><p><strong>Unauthorized Access</strong> → Returns <strong>403 Forbidden</strong> if the user lacks the required permissions.</p>\n</li>\n</ul>\n","urlObject":{"protocol":"https","path":["api","v1","assessment","domain","{{domain}}"],"host":["api","{{region}}","fortifydata","com"],"query":[],"variable":[]}},"response":[{"id":"3fbdc759-c151-4030-b8d6-1eb6a3f70601","name":"404 Response for Unknown Domain","originalRequest":{"method":"GET","header":[{"key":"Authorization","value":"ApiKey {{api_key}}","type":"text"}],"url":"https://api.{{region}}.fortifydata.com/api/v1/assessment/domain/{{domain}}"},"status":"Not Found","code":404,"_postman_previewlanguage":"json","header":[{"key":"Date","value":"Fri, 14 Jul 2023 20:38:07 GMT"},{"key":"Content-Type","value":"application/json;charset=UTF-8"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Connection","value":"keep-alive"},{"key":"X-Rate-Limit-Remaining","value":"4"},{"key":"X-Content-Type-Options","value":"nosniff"},{"key":"X-XSS-Protection","value":"1; mode=block"},{"key":"Cache-Control","value":"no-cache, no-store, max-age=0, must-revalidate"},{"key":"Pragma","value":"no-cache"},{"key":"Expires","value":"0"},{"key":"Strict-Transport-Security","value":"max-age=31536000 ; includeSubDomains"},{"key":"X-Frame-Options","value":"DENY"},{"key":"Content-Disposition","value":"inline;filename=f.txt"}],"cookie":[],"responseTime":null,"body":"{\n    \"status\": 404,\n    \"path\": \"/api/v1/assessment/domain/webovio-new.com\",\n    \"timestamp\": 1689367087906,\n    \"message\": \"Unexpected error\",\n    \"error\": \"Not Found\"\n}"},{"id":"e5f8629e-c9c9-4d1d-b7f4-8465e20df56a","name":"Successful Response","originalRequest":{"method":"GET","header":[{"key":"Authorization","value":"ApiKey {{api_key}}","type":"text"}],"url":"https://api.{{region}}.fortifydata.com/api/v1/assessment/id/{{companyId}}"},"status":"OK","code":200,"_postman_previewlanguage":"json","header":[{"key":"Date","value":"Fri, 14 Jul 2023 20:34:05 GMT"},{"key":"Content-Type","value":"application/json;charset=UTF-8"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Connection","value":"keep-alive"},{"key":"X-Rate-Limit-Remaining","value":"4"},{"key":"X-Content-Type-Options","value":"nosniff"},{"key":"X-XSS-Protection","value":"1; mode=block"},{"key":"Cache-Control","value":"no-cache, no-store, max-age=0, must-revalidate"},{"key":"Pragma","value":"no-cache"},{"key":"Expires","value":"0"},{"key":"Strict-Transport-Security","value":"max-age=31536000 ; includeSubDomains"},{"key":"X-Frame-Options","value":"DENY"}],"cookie":[],"responseTime":null,"body":"{\n    \"companyId\": 17,\n    \"companyName\": \"Webovio\",\n    \"domain\": \"webovio.com\",\n    \"status\": \"COMPLETE\",\n    \"score\": 635,\n    \"lastCheckedDate\": \"2023-07-06T22:39:29.000+0000\",\n    \"totalInfrastructureIssuesCount\": 381,\n    \"severeInfrastructureIssuesCount\": 0,\n    \"highInfrastructureIssuesCount\": 7,\n    \"mediumInfrastructureIssuesCount\": 7,\n    \"lowInfrastructureIssuesCount\": 61,\n    \"totalApplicationIssuesCount\": 37,\n    \"criticalApplicationIssuesCount\": 0,\n    \"highApplicationIssuesCount\": 17,\n    \"mediumApplicationIssuesCount\": 7,\n    \"lowApplicationIssuesCount\": 13,\n    \"totalDarkWebRecordsCount\": 0,\n    \"partialCredentialsCount\": 0,\n    \"fullCredentialsCount\": 0,\n    \"companyAssetsCount\": 100,\n    \"vendorImpactScore\": -75,\n    \"scores\": [\n        {\n            \"scoreName\": \"FortifyScore\",\n            \"score\": 635,\n            \"scoreChange\": 0\n        },\n        {\n            \"scoreName\": \"New Web\",\n            \"score\": 571,\n            \"scoreChange\": 0\n        },\n        {\n            \"scoreName\": \"Testing\",\n            \"score\": 552,\n            \"scoreChange\": 0\n        }\n    ],\n    \"criticalIssues\": 0,\n    \"openPortsCount\": 113,\n    \"dataBreachesCount\": 2,\n    \"patchCadenceCounts\": [\n        {\n            \"countType\": \"EXTERNAL_INFRA\",\n            \"criticalGreaterThan30\": 4,\n            \"criticalGreaterThan60\": 4,\n            \"criticalGreaterThan90\": 9,\n            \"highGreaterThan30\": 5,\n            \"highGreaterThan60\": 0,\n            \"highGreaterThan90\": 118,\n            \"moderateGreaterThan30\": 5,\n            \"moderateGreaterThan60\": 0,\n            \"moderateGreaterThan90\": 13,\n            \"lowGreaterThan30\": 0,\n            \"lowGreaterThan60\": 0,\n            \"lowGreaterThan90\": 0\n        },\n        {\n            \"countType\": \"WEB_APP\",\n            \"criticalGreaterThan30\": 0,\n            \"criticalGreaterThan60\": 0,\n            \"criticalGreaterThan90\": 0,\n            \"highGreaterThan30\": 0,\n            \"highGreaterThan60\": 0,\n            \"highGreaterThan90\": 1,\n            \"moderateGreaterThan30\": 0,\n            \"moderateGreaterThan60\": 0,\n            \"moderateGreaterThan90\": 0,\n            \"lowGreaterThan30\": 0,\n            \"lowGreaterThan60\": 0,\n            \"lowGreaterThan90\": 8\n        }\n    ],\n    \"emailCounts\": {\n        \"emailLowCount\": 1,\n        \"emailMediumCount\": 1,\n        \"emailHighCount\": 0,\n        \"emailCriticalCount\": 0\n    }\n}"}],"_postman_id":"59878908-3490-4064-bbbb-c3db0150b1f2"},{"name":"Get Assessment Summary Data by Company ID","id":"7e5f6db6-6160-407b-bb9a-580d519da682","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"auth":{"type":"noauth","isInherited":false},"method":"GET","header":[{"key":"Authorization","value":"ApiKey {{api_key}}","type":"text"}],"url":"https://api.{{region}}.fortifydata.com/api/v1/assessment/id/{{id}}","description":"<p>This endpoint retrieves assessment data for a specific company using its Company ID. If a Portfolio ID is provided instead, the API returns aggregated assessment data for all companies within that portfolio.</p>\n<h3 id=\"authorization--permissions\"><strong>Authorization &amp; Permissions:</strong></h3>\n<ul>\n<li><p>Requires the <strong>Assessment Summary</strong> permission.</p>\n</li>\n<li><p>Returns <strong>403 Forbidden</strong> if the user is not authorized.</p>\n</li>\n<li><p>Returns <strong>404 Not Found</strong> if no company exists for the provided Company ID.</p>\n</li>\n</ul>\n<h4 id=\"endpoint-get-apiv1assessmentscompanyid\"><strong>Endpoint:</strong> <code>GET /api/v1/assessments/{companyId}</code></h4>\n<h3 id=\"response\"><strong>Response:</strong></h3>\n<ul>\n<li><p><strong>200 OK</strong> → Returns the assessment data for the specified company or aggregated data for the portfolio.</p>\n</li>\n<li><p><strong>403 Forbidden</strong> → Returned when the request is unauthorized.</p>\n</li>\n<li><p><strong>404 Not Found</strong> → Returned when no company exists for the provided Company ID.</p>\n</li>\n</ul>\n","urlObject":{"protocol":"https","path":["api","v1","assessment","id","{{id}}"],"host":["api","{{region}}","fortifydata","com"],"query":[],"variable":[]}},"response":[{"id":"c567dc36-22f7-43ca-b2f8-43f4f5b65e62","name":"Successful Response","originalRequest":{"method":"GET","header":[{"key":"Authorization","value":"ApiKey {{api_key}}","type":"text"}],"url":"https://api.{{region}}.fortifydata.com/api/v1/assessment/id/{{companyId}}"},"status":"OK","code":200,"_postman_previewlanguage":"json","header":[{"key":"Date","value":"Fri, 14 Jul 2023 20:34:05 GMT"},{"key":"Content-Type","value":"application/json;charset=UTF-8"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Connection","value":"keep-alive"},{"key":"X-Rate-Limit-Remaining","value":"4"},{"key":"X-Content-Type-Options","value":"nosniff"},{"key":"X-XSS-Protection","value":"1; mode=block"},{"key":"Cache-Control","value":"no-cache, no-store, max-age=0, must-revalidate"},{"key":"Pragma","value":"no-cache"},{"key":"Expires","value":"0"},{"key":"Strict-Transport-Security","value":"max-age=31536000 ; includeSubDomains"},{"key":"X-Frame-Options","value":"DENY"}],"cookie":[],"responseTime":null,"body":"{\n    \"companyId\": 17,\n    \"companyName\": \"Webovio\",\n    \"domain\": \"webovio.com\",\n    \"status\": \"COMPLETE\",\n    \"score\": 635,\n    \"lastCheckedDate\": \"2023-07-06T22:39:29.000+0000\",\n    \"totalInfrastructureIssuesCount\": 381,\n    \"severeInfrastructureIssuesCount\": 0,\n    \"highInfrastructureIssuesCount\": 7,\n    \"mediumInfrastructureIssuesCount\": 7,\n    \"lowInfrastructureIssuesCount\": 61,\n    \"totalApplicationIssuesCount\": 37,\n    \"criticalApplicationIssuesCount\": 0,\n    \"highApplicationIssuesCount\": 17,\n    \"mediumApplicationIssuesCount\": 7,\n    \"lowApplicationIssuesCount\": 13,\n    \"totalDarkWebRecordsCount\": 0,\n    \"partialCredentialsCount\": 0,\n    \"fullCredentialsCount\": 0,\n    \"companyAssetsCount\": 100,\n    \"vendorImpactScore\": -75,\n    \"scores\": [\n        {\n            \"scoreName\": \"FortifyScore\",\n            \"score\": 635,\n            \"scoreChange\": 0\n        },\n        {\n            \"scoreName\": \"New Web\",\n            \"score\": 571,\n            \"scoreChange\": 0\n        },\n        {\n            \"scoreName\": \"Testing\",\n            \"score\": 552,\n            \"scoreChange\": 0\n        }\n    ],\n    \"criticalIssues\": 0,\n    \"openPortsCount\": 113,\n    \"dataBreachesCount\": 2,\n    \"patchCadenceCounts\": [\n        {\n            \"countType\": \"EXTERNAL_INFRA\",\n            \"criticalGreaterThan30\": 4,\n            \"criticalGreaterThan60\": 4,\n            \"criticalGreaterThan90\": 9,\n            \"highGreaterThan30\": 5,\n            \"highGreaterThan60\": 0,\n            \"highGreaterThan90\": 118,\n            \"moderateGreaterThan30\": 5,\n            \"moderateGreaterThan60\": 0,\n            \"moderateGreaterThan90\": 13,\n            \"lowGreaterThan30\": 0,\n            \"lowGreaterThan60\": 0,\n            \"lowGreaterThan90\": 0\n        },\n        {\n            \"countType\": \"WEB_APP\",\n            \"criticalGreaterThan30\": 0,\n            \"criticalGreaterThan60\": 0,\n            \"criticalGreaterThan90\": 0,\n            \"highGreaterThan30\": 0,\n            \"highGreaterThan60\": 0,\n            \"highGreaterThan90\": 1,\n            \"moderateGreaterThan30\": 0,\n            \"moderateGreaterThan60\": 0,\n            \"moderateGreaterThan90\": 0,\n            \"lowGreaterThan30\": 0,\n            \"lowGreaterThan60\": 0,\n            \"lowGreaterThan90\": 8\n        }\n    ],\n    \"emailCounts\": {\n        \"emailLowCount\": 1,\n        \"emailMediumCount\": 1,\n        \"emailHighCount\": 0,\n        \"emailCriticalCount\": 0\n    }\n}"}],"_postman_id":"7e5f6db6-6160-407b-bb9a-580d519da682"},{"name":"Get Assessment Summary Data for Date Range","id":"64c92342-e84c-437d-b758-8c9eef89949a","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"auth":{"type":"noauth","isInherited":false},"method":"GET","header":[{"key":"Authorization","value":"ApiKey {{api_key}}","type":"text"}],"body":{"mode":"raw","raw":""},"url":"https://api.{{region}}.fortifydata.com/api/v1/assessment/query?companyId={{companyId}}&startDate={{startDate}}&endDate={{endDate}}","description":"<p>Retrieves <strong>Assessment Summary</strong> data based on the provided query parameters.</p>\n<h3 id=\"parameters\"><strong>Parameters</strong>:</h3>\n<ul>\n<li><p><strong>companyId</strong> <em>(required)</em> – The ID of the company to retrieve data for.</p>\n</li>\n<li><p><strong>startDate</strong> <em>(optional)</em> – The beginning of the date range, in milliseconds.</p>\n</li>\n<li><p><strong>endDate</strong> <em>(optional)</em> – The end of the date range, in milliseconds.</p>\n</li>\n</ul>\n<h3 id=\"behavior\"><strong>Behavior</strong>:</h3>\n<ul>\n<li><p>If no dates are specified, the last 30 days of data are returned.</p>\n</li>\n<li><p>If only a start date is provided, data is returned from that date through the current day.</p>\n</li>\n</ul>\n<h3 id=\"requirements\"><strong>Requirements</strong>:</h3>\n<ul>\n<li>Requires the <em>Assessment Summary</em> privilege.</li>\n</ul>\n<h3 id=\"error-responses\"><strong>Error Responses</strong>:</h3>\n<ul>\n<li><p><strong>404</strong> – Company not found for the provided ID.</p>\n</li>\n<li><p><strong>403</strong> – User not authorized.</p>\n</li>\n<li><p><strong>400</strong> – Invalid date range:</p>\n<ul>\n<li><p>Start and end dates span more than one year.</p>\n</li>\n<li><p>End date is provided without a start date.</p>\n</li>\n<li><p>Start date occurs after the end date.</p>\n</li>\n</ul>\n</li>\n</ul>\n","urlObject":{"protocol":"https","path":["api","v1","assessment","query"],"host":["api","{{region}}","fortifydata","com"],"query":[{"key":"companyId","value":"{{companyId}}"},{"key":"startDate","value":"{{startDate}}"},{"key":"endDate","value":"{{endDate}}"}],"variable":[]}},"response":[{"id":"1e5d23fb-9666-4c7a-b480-b6b6ae672f7e","name":"Successful Response","originalRequest":{"method":"GET","header":[{"key":"Authorization","value":"ApiKey {{api_key}}","type":"text"}],"body":{"mode":"raw","raw":""},"url":{"raw":"https://api.{{region}}.fortifydata.com/api/v1/assessment/query?companyId={{companyId}}&startDate={{startDate}}&endDate={{endDate}}","protocol":"https","host":["api","{{region}}","fortifydata","com"],"path":["api","v1","assessment","query"],"query":[{"key":"companyId","value":"{{companyId}}"},{"key":"startDate","value":"{{startDate}}"},{"key":"endDate","value":"{{endDate}}"}]}},"status":"OK","code":200,"_postman_previewlanguage":"json","header":[{"key":"Date","value":"Fri, 14 Jul 2023 20:51:27 GMT"},{"key":"Content-Type","value":"application/json;charset=UTF-8"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Connection","value":"keep-alive"},{"key":"X-Rate-Limit-Remaining","value":"4"},{"key":"X-Content-Type-Options","value":"nosniff"},{"key":"X-XSS-Protection","value":"1; mode=block"},{"key":"Cache-Control","value":"no-cache, no-store, max-age=0, must-revalidate"},{"key":"Pragma","value":"no-cache"},{"key":"Expires","value":"0"},{"key":"Strict-Transport-Security","value":"max-age=31536000 ; includeSubDomains"},{"key":"X-Frame-Options","value":"DENY"}],"cookie":[],"responseTime":null,"body":"[\n    {\n        \"companyId\": 17,\n        \"companyName\": \"Webovio\",\n        \"domain\": \"webovio.com\",\n        \"status\": \"COMPLETE\",\n        \"score\": 635,\n        \"lastCheckedDate\": \"2023-07-06T22:39:29.000+0000\",\n        \"totalInfrastructureIssuesCount\": 381,\n        \"severeInfrastructureIssuesCount\": 0,\n        \"highInfrastructureIssuesCount\": 7,\n        \"mediumInfrastructureIssuesCount\": 7,\n        \"lowInfrastructureIssuesCount\": 61,\n        \"totalApplicationIssuesCount\": 37,\n        \"criticalApplicationIssuesCount\": 0,\n        \"highApplicationIssuesCount\": 17,\n        \"mediumApplicationIssuesCount\": 7,\n        \"lowApplicationIssuesCount\": 13,\n        \"totalDarkWebRecordsCount\": 0,\n        \"partialCredentialsCount\": 0,\n        \"fullCredentialsCount\": 0,\n        \"companyAssetsCount\": 100,\n        \"vendorImpactScore\": -75,\n        \"scores\": [\n            {\n                \"scoreName\": \"FortifyScore\",\n                \"score\": 635,\n                \"scoreChange\": 0\n            },\n            {\n                \"scoreName\": \"Web\",\n                \"score\": 571,\n                \"scoreChange\": 0\n            },\n            {\n                \"scoreName\": \"Testing\",\n                \"score\": 552,\n                \"scoreChange\": 0\n            }\n        ],\n        \"criticalIssues\": 0,\n        \"openPortsCount\": 113,\n        \"dataBreachesCount\": 2,\n        \"patchCadenceCounts\": [\n            {\n                \"countType\": \"EXTERNAL_INFRA\",\n                \"criticalGreaterThan30\": 4,\n                \"criticalGreaterThan60\": 4,\n                \"criticalGreaterThan90\": 9,\n                \"highGreaterThan30\": 5,\n                \"highGreaterThan60\": 0,\n                \"highGreaterThan90\": 118,\n                \"moderateGreaterThan30\": 5,\n                \"moderateGreaterThan60\": 0,\n                \"moderateGreaterThan90\": 13,\n                \"lowGreaterThan30\": 0,\n                \"lowGreaterThan60\": 0,\n                \"lowGreaterThan90\": 0\n            },\n            {\n                \"countType\": \"WEB_APP\",\n                \"criticalGreaterThan30\": 0,\n                \"criticalGreaterThan60\": 0,\n                \"criticalGreaterThan90\": 0,\n                \"highGreaterThan30\": 0,\n                \"highGreaterThan60\": 0,\n                \"highGreaterThan90\": 1,\n                \"moderateGreaterThan30\": 0,\n                \"moderateGreaterThan60\": 0,\n                \"moderateGreaterThan90\": 0,\n                \"lowGreaterThan30\": 0,\n                \"lowGreaterThan60\": 0,\n                \"lowGreaterThan90\": 8\n            }\n        ],\n        \"emailCounts\": {\n            \"emailLowCount\": 1,\n            \"emailMediumCount\": 1,\n            \"emailHighCount\": 0,\n            \"emailCriticalCount\": 0\n        }\n    },\n    {\n        \"companyId\": 17,\n        \"companyName\": \"Webovio\",\n        \"domain\": \"webovio.com\",\n        \"status\": \"COMPLETE\",\n        \"score\": 635,\n        \"lastCheckedDate\": \"2023-06-07T20:59:19.000+0000\",\n        \"totalInfrastructureIssuesCount\": 187,\n        \"severeInfrastructureIssuesCount\": 0,\n        \"highInfrastructureIssuesCount\": 7,\n        \"mediumInfrastructureIssuesCount\": 7,\n        \"lowInfrastructureIssuesCount\": 61,\n        \"totalApplicationIssuesCount\": 36,\n        \"criticalApplicationIssuesCount\": 0,\n        \"highApplicationIssuesCount\": 17,\n        \"mediumApplicationIssuesCount\": 6,\n        \"lowApplicationIssuesCount\": 13,\n        \"totalDarkWebRecordsCount\": 0,\n        \"partialCredentialsCount\": 0,\n        \"fullCredentialsCount\": 0,\n        \"companyAssetsCount\": 100,\n        \"vendorImpactScore\": -75,\n        \"scores\": [\n            {\n                \"scoreName\": \"FortifyScore\",\n                \"score\": 635,\n                \"scoreChange\": 0\n            },\n            {\n                \"scoreName\": \"Web\",\n                \"score\": 571,\n                \"scoreChange\": 0\n            },\n            {\n                \"scoreName\": \"Testing\",\n                \"score\": 552,\n                \"scoreChange\": 0\n            }\n        ],\n        \"criticalIssues\": 0,\n        \"openPortsCount\": 112,\n        \"dataBreachesCount\": 2,\n        \"patchCadenceCounts\": [\n            {\n                \"countType\": \"WEB_APP\",\n                \"criticalGreaterThan30\": 0,\n                \"criticalGreaterThan60\": 0,\n                \"criticalGreaterThan90\": 0,\n                \"highGreaterThan30\": 0,\n                \"highGreaterThan60\": 0,\n                \"highGreaterThan90\": 1,\n                \"moderateGreaterThan30\": 0,\n                \"moderateGreaterThan60\": 0,\n                \"moderateGreaterThan90\": 0,\n                \"lowGreaterThan30\": 0,\n                \"lowGreaterThan60\": 0,\n                \"lowGreaterThan90\": 8\n            }\n        ],\n        \"emailCounts\": {\n            \"emailLowCount\": 1,\n            \"emailMediumCount\": 1,\n            \"emailHighCount\": 0,\n            \"emailCriticalCount\": 0\n        }\n    },\n    {\n        \"companyId\": 17,\n        \"companyName\": \"Webovio\",\n        \"domain\": \"webovio.com\",\n        \"status\": \"COMPLETE\",\n        \"score\": 635,\n        \"lastCheckedDate\": \"2023-06-02T14:24:59.000+0000\",\n        \"totalInfrastructureIssuesCount\": 277,\n        \"severeInfrastructureIssuesCount\": 0,\n        \"highInfrastructureIssuesCount\": 6,\n        \"mediumInfrastructureIssuesCount\": 7,\n        \"lowInfrastructureIssuesCount\": 61,\n        \"totalApplicationIssuesCount\": 35,\n        \"criticalApplicationIssuesCount\": 0,\n        \"highApplicationIssuesCount\": 16,\n        \"mediumApplicationIssuesCount\": 6,\n        \"lowApplicationIssuesCount\": 13,\n        \"totalDarkWebRecordsCount\": 0,\n        \"partialCredentialsCount\": 0,\n        \"fullCredentialsCount\": 0,\n        \"companyAssetsCount\": 100,\n        \"vendorImpactScore\": -75,\n        \"scores\": [\n            {\n                \"scoreName\": \"FortifyScore\",\n                \"score\": 635,\n                \"scoreChange\": 0\n            },\n            {\n                \"scoreName\": \"Web\",\n                \"score\": 621,\n                \"scoreChange\": 0\n            },\n            {\n                \"scoreName\": \"Testing\",\n                \"score\": 552,\n                \"scoreChange\": 0\n            }\n        ],\n        \"criticalIssues\": 0,\n        \"openPortsCount\": 107,\n        \"dataBreachesCount\": 2,\n        \"patchCadenceCounts\": [\n            {\n                \"countType\": \"WEB_APP\",\n                \"criticalGreaterThan30\": 0,\n                \"criticalGreaterThan60\": 0,\n                \"criticalGreaterThan90\": 0,\n                \"highGreaterThan30\": 0,\n                \"highGreaterThan60\": 0,\n                \"highGreaterThan90\": 1,\n                \"moderateGreaterThan30\": 0,\n                \"moderateGreaterThan60\": 0,\n                \"moderateGreaterThan90\": 0,\n                \"lowGreaterThan30\": 0,\n                \"lowGreaterThan60\": 0,\n                \"lowGreaterThan90\": 8\n            }\n        ],\n        \"emailCounts\": {\n            \"emailLowCount\": 1,\n            \"emailMediumCount\": 2,\n            \"emailHighCount\": 0,\n            \"emailCriticalCount\": 0\n        }\n    }\n]"}],"_postman_id":"64c92342-e84c-437d-b758-8c9eef89949a"},{"name":"Get Score Change Details","id":"2029cd6a-f248-406d-ad91-6200ac64c1b2","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"auth":{"type":"noauth","isInherited":false},"method":"GET","header":[{"key":"Authorization","value":"ApiKey {{api_key}}","type":"text"}],"url":"https://api.{{region}}.fortifydata.com/api/v1/summary/score-change-details/{{companyId}}","description":"<p>Retrieves all applicable scores for a given company, including the <strong>FortifyScore</strong> and any relevant customer scoring models.</p>\n<ul>\n<li><p>Only available at the company level.</p>\n</li>\n<li><p>Not applicable to portfolios.</p>\n</li>\n<li><p>Only score factors relevant to a given score will be returned.</p>\n</li>\n</ul>\n<h3 id=\"score-factors\"><strong>Score Factors</strong></h3>\n<p>Each factor includes the following fields:</p>\n<ul>\n<li><p><strong>factor</strong> – The score factor name</p>\n</li>\n<li><p><strong>BREACH_RECORDS</strong> – Historical data breaches</p>\n</li>\n<li><p><strong>COMPLIANCE</strong> – Compliance measured against the default questionnaire</p>\n</li>\n<li><p><strong>CRITICAL_ISSUES</strong> – Vulnerability findings with a critical risk level</p>\n</li>\n<li><p><strong>DARK_WEB</strong> – Company credentials with passwords found on the dark web</p>\n</li>\n<li><p><strong>EXTERNAL_INFRA</strong> – Vulnerabilities in externally facing infrastructure</p>\n</li>\n<li><p><strong>INTERNAL_INFRA</strong> – Vulnerabilities in internal infrastructure</p>\n</li>\n<li><p><strong>MALWARE</strong> – Agent-based malware findings</p>\n</li>\n<li><p><strong>PATCHING_CADENCE</strong> – Vulnerabilities not patched in line with patching cadence guidelines and recommendations</p>\n</li>\n<li><p><strong>RISK_HISTORY</strong> – Based on the company’s score trends over time</p>\n</li>\n<li><p><strong>VENDOR_IMPACT</strong> – Risks originating from third-party vendors</p>\n</li>\n<li><p><strong>WEB_APP</strong> – Vulnerabilities in web applications</p>\n</li>\n</ul>\n<p>Each factor also includes:</p>\n<ul>\n<li><p><strong>changeAmount</strong> – The point change for the factor between the most recent assessment and the previous one</p>\n</li>\n<li><p><strong>currentScore</strong> – The score contribution from this factor</p>\n</li>\n<li><p><strong>currentValue</strong> – The current evaluated value (e.g., number of critical issues)</p>\n</li>\n</ul>\n<h3 id=\"requirements\"><strong>Requirements</strong></h3>\n<ul>\n<li>Requires the <strong>Assessment Summary</strong> privilege.</li>\n</ul>\n<h3 id=\"responses\"><strong>Responses</strong></h3>\n<ul>\n<li><p><strong>200 OK</strong> – Returns a collection of scores with change details if the company exists and access is authorized.</p>\n</li>\n<li><p><strong>404 Not Found</strong> – Company ID not found.</p>\n</li>\n<li><p><strong>403 Forbidden</strong> – Not authorized.</p>\n</li>\n</ul>\n","urlObject":{"protocol":"https","path":["api","v1","summary","score-change-details","{{companyId}}"],"host":["api","{{region}}","fortifydata","com"],"query":[],"variable":[]}},"response":[{"id":"64a0e7e5-7ff6-4ea4-96f0-ff89eb46fc4c","name":"Successful Response","originalRequest":{"method":"GET","header":[{"key":"Authorization","value":"ApiKey {{api_key}}","type":"text"}],"url":"https://api.{{region}}.fortifydata.com/api/v1/summary/score-change-details/{{companyId}}"},"status":"OK","code":200,"_postman_previewlanguage":"json","header":[{"key":"Date","value":"Mon, 31 Jul 2023 18:53:24 GMT"},{"key":"Content-Type","value":"application/json;charset=UTF-8"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Connection","value":"keep-alive"},{"key":"X-Rate-Limit-Remaining","value":"4"},{"key":"X-Content-Type-Options","value":"nosniff"},{"key":"X-XSS-Protection","value":"1; mode=block"},{"key":"Cache-Control","value":"no-cache, no-store, max-age=0, must-revalidate"},{"key":"Pragma","value":"no-cache"},{"key":"Expires","value":"0"},{"key":"Strict-Transport-Security","value":"max-age=31536000 ; includeSubDomains"},{"key":"X-Frame-Options","value":"DENY"}],"cookie":[],"responseTime":null,"body":"[\n    {\n        \"score\": \"FortifyScore\",\n        \"scoreChangeReasons\": [\n            {\n                \"factor\": \"RISK_HISTORY\",\n                \"changeAmount\": 0,\n                \"currentScore\": 0,\n                \"currentValue\": 0\n            },\n            {\n                \"factor\": \"PATCHING_CADENCE\",\n                \"changeAmount\": 0,\n                \"currentScore\": 0,\n                \"currentValue\": 0\n            },\n            {\n                \"factor\": \"DARK_WEB\",\n                \"changeAmount\": 0,\n                \"currentScore\": 0,\n                \"currentValue\": 0\n            },\n            {\n                \"factor\": \"VENDOR_IMPACT\",\n                \"changeAmount\": 0,\n                \"currentScore\": -15,\n                \"currentValue\": -15\n            },\n            {\n                \"factor\": \"EXTERNAL_INFRA\",\n                \"changeAmount\": 0,\n                \"currentScore\": 0,\n                \"currentValue\": 0\n            },\n            {\n                \"factor\": \"BREACH_RECORDS\",\n                \"changeAmount\": 0,\n                \"currentScore\": 0,\n                \"currentValue\": 0\n            },\n            {\n                \"factor\": \"CRITICAL_ISSUES\",\n                \"changeAmount\": 0,\n                \"currentScore\": 0,\n                \"currentValue\": 0\n            },\n            {\n                \"factor\": \"WEB_APP\",\n                \"changeAmount\": 0,\n                \"currentScore\": 0,\n                \"currentValue\": 2\n            }\n        ]\n    },\n    {\n        \"score\": \"Fortify 360 Score\",\n        \"scoreChangeReasons\": [\n            {\n                \"factor\": \"PATCHING_CADENCE\",\n                \"changeAmount\": -191,\n                \"currentScore\": -191,\n                \"currentValue\": 108\n            },\n            {\n                \"factor\": \"DARK_WEB\",\n                \"changeAmount\": 0,\n                \"currentScore\": 0,\n                \"currentValue\": 0\n            },\n            {\n                \"factor\": \"VENDOR_IMPACT\",\n                \"changeAmount\": 0,\n                \"currentScore\": -15,\n                \"currentValue\": -15\n            },\n            {\n                \"factor\": \"EXTERNAL_INFRA\",\n                \"changeAmount\": 0,\n                \"currentScore\": 0,\n                \"currentValue\": 0\n            },\n            {\n                \"factor\": \"BREACH_RECORDS\",\n                \"changeAmount\": 0,\n                \"currentScore\": 0,\n                \"currentValue\": 0\n            },\n            {\n                \"factor\": \"MALWARE\",\n                \"changeAmount\": 0,\n                \"currentScore\": 0,\n                \"currentValue\": 0\n            },\n            {\n                \"factor\": \"INTERNAL_INFRA\",\n                \"changeAmount\": -51,\n                \"currentScore\": -51,\n                \"currentValue\": 138\n            },\n            {\n                \"factor\": \"CRITICAL_ISSUES\",\n                \"changeAmount\": -200,\n                \"currentScore\": -200,\n                \"currentValue\": 8.5\n            },\n            {\n                \"factor\": \"WEB_APP\",\n                \"changeAmount\": 0,\n                \"currentScore\": 0,\n                \"currentValue\": 2\n            },\n            {\n                \"factor\": \"COMPLIANCE\",\n                \"changeAmount\": 0,\n                \"currentScore\": -3,\n                \"currentValue\": 0.7923052362707536\n            }\n        ]\n    },\n    {\n        \"score\": \"Demo\",\n        \"scoreChangeReasons\": [\n            {\n                \"factor\": \"PATCHING_CADENCE\",\n                \"changeAmount\": 0,\n                \"currentScore\": 0,\n                \"currentValue\": 0\n            },\n            {\n                \"factor\": \"DARK_WEB\",\n                \"changeAmount\": 0,\n                \"currentScore\": 0,\n                \"currentValue\": 0\n            },\n            {\n                \"factor\": \"VENDOR_IMPACT\",\n                \"changeAmount\": 0,\n                \"currentScore\": -15,\n                \"currentValue\": -15\n            },\n            {\n                \"factor\": \"EXTERNAL_INFRA\",\n                \"changeAmount\": 0,\n                \"currentScore\": 0,\n                \"currentValue\": 0\n            },\n            {\n                \"factor\": \"BREACH_RECORDS\",\n                \"changeAmount\": 0,\n                \"currentScore\": 0,\n                \"currentValue\": 0\n            },\n            {\n                \"factor\": \"CRITICAL_ISSUES\",\n                \"changeAmount\": 0,\n                \"currentScore\": 0,\n                \"currentValue\": 0\n            },\n            {\n                \"factor\": \"WEB_APP\",\n                \"changeAmount\": 0,\n                \"currentScore\": 0,\n                \"currentValue\": 2\n            }\n        ]\n    },\n    {\n        \"score\": \"Risk model 5.11\",\n        \"scoreChangeReasons\": [\n            {\n                \"factor\": \"PATCHING_CADENCE\",\n                \"changeAmount\": -191,\n                \"currentScore\": -191,\n                \"currentValue\": 108\n            },\n            {\n                \"factor\": \"DARK_WEB\",\n                \"changeAmount\": 0,\n                \"currentScore\": 0,\n                \"currentValue\": 0\n            },\n            {\n                \"factor\": \"VENDOR_IMPACT\",\n                \"changeAmount\": 0,\n                \"currentScore\": -15,\n                \"currentValue\": -15\n            },\n            {\n                \"factor\": \"EXTERNAL_INFRA\",\n                \"changeAmount\": 0,\n                \"currentScore\": 0,\n                \"currentValue\": 0\n            },\n            {\n                \"factor\": \"INTERNAL_INFRA\",\n                \"changeAmount\": -51,\n                \"currentScore\": -51,\n                \"currentValue\": 138\n            },\n            {\n                \"factor\": \"CRITICAL_ISSUES\",\n                \"changeAmount\": -200,\n                \"currentScore\": -200,\n                \"currentValue\": 8.5\n            },\n            {\n                \"factor\": \"WEB_APP\",\n                \"changeAmount\": 0,\n                \"currentScore\": 0,\n                \"currentValue\": 2\n            }\n        ]\n    }\n]"}],"_postman_id":"2029cd6a-f248-406d-ad91-6200ac64c1b2"},{"name":"Get Asset Data","id":"473ce2b6-1f92-42c5-9925-3a1b5b715d55","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"auth":{"type":"noauth","isInherited":false},"method":"GET","header":[{"key":"Authorization","value":"ApiKey {{api_key}}","type":"text"}],"url":"https://api.{{region}}.fortifydata.com/api/v1/asset/id/{{companyId}}","description":"<p>Retrieves a list of assets for the specified <strong>Company ID</strong>.</p>\n<ul>\n<li>If a <strong>Portfolio ID</strong> is provided instead, the response will include an aggregated asset list for all companies within that portfolio.</li>\n</ul>\n<h3 id=\"requirements\"><strong>Requirements</strong></h3>\n<ul>\n<li>Requires the <strong>Asset Data</strong> permission.</li>\n</ul>\n<h3 id=\"responses\"><strong>Responses</strong></h3>\n<ul>\n<li><p><strong>200 OK</strong> – Returns the list of assets.</p>\n</li>\n<li><p><strong>403 Forbidden</strong> – Not authorized.</p>\n</li>\n</ul>\n","urlObject":{"protocol":"https","path":["api","v1","asset","id","{{companyId}}"],"host":["api","{{region}}","fortifydata","com"],"query":[],"variable":[]}},"response":[{"id":"58101ab8-e1dd-4dfa-ab0a-115ee5b17417","name":"Successful Response","originalRequest":{"method":"GET","header":[{"key":"Authorization","value":"ApiKey {{api_key}}","type":"text"}],"url":"https://api.{{region}}.fortifydata.com/api/v1/asset/id/{{companyId}}"},"status":"OK","code":200,"_postman_previewlanguage":"json","header":[{"key":"Server","value":"nginx/1.19.0"},{"key":"Date","value":"Wed, 30 Sep 2020 15:52:32 GMT"},{"key":"Content-Type","value":"application/json;charset=UTF-8"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Connection","value":"keep-alive"},{"key":"X-Content-Type-Options","value":"nosniff"},{"key":"X-Content-Type-Options","value":"nosniff"},{"key":"X-XSS-Protection","value":"1; mode=block"},{"key":"Cache-Control","value":"no-cache, no-store, max-age=0, must-revalidate"},{"key":"Pragma","value":"no-cache"},{"key":"Expires","value":"0"},{"key":"X-Frame-Options","value":"DENY"},{"key":"X-Frame-Options","value":"DENY"},{"key":"Strict-Transport-Security","value":"max-age=31536000;"},{"key":"Content-Security-Policy-Report-Only","value":"default-src https:; script-src https: 'unsafe-eval' 'unsafe-inline'; style-src https: 'unsafe-inline'; img-src https: data:; font-src https: data:; report-uri /csp-report"}],"cookie":[],"responseTime":null,"body":"[\n    {\n        \"id\": 3204,\n        \"target\": \"www.piedpiper.com\",\n        \"companyId\": 68,\n        \"ip\": \"104.18.23.192\",\n        \"city\": \"San Jose\",\n        \"country\": \"United States\",\n        \"countryCode\": \"US\",\n        \"latitude\": 37.330528259277,\n        \"longitude\": -121.838226318359,\n        \"os\": null,\n        \"fqdn\": null,\n        \"score\": 801,\n        \"classification\": \"CRITICAL\"\n    },\n    {\n        \"id\": 3363,\n        \"target\": \"dev.piedpiper.com\",\n        \"companyId\": 68,\n        \"ip\": \"104.18.22.192\",\n        \"city\": \"San Jose\",\n        \"country\": \"United States\",\n        \"countryCode\": \"US\",\n        \"latitude\": 37.330528259277,\n        \"longitude\": -121.838226318359,\n        \"os\": null,\n        \"fqdn\": null,\n        \"score\": 841,\n        \"classification\": \"CRITICAL\"\n    },\n    {\n        \"id\": 3424,\n        \"target\": \"assets.piedpiper.com\",\n        \"companyId\": 68,\n        \"ip\": \"99.86.61.113\",\n        \"city\": \"San Jose\",\n        \"country\": \"United States\",\n        \"countryCode\": \"US\",\n        \"latitude\": 37.330528259277,\n        \"longitude\": -121.838226318359,\n        \"os\": \"Linux Kernel 2.2\\nLinux Kernel 2.4\\nLinux Kernel 2.6\",\n        \"fqdn\": null,\n        \"score\": 841,\n        \"classification\": \"CRITICAL\"\n    },\n    {\n        \"id\": 3203,\n        \"target\": \"piedpiper.com\",\n        \"companyId\": 68,\n        \"ip\": \"104.18.22.192\",\n        \"city\": \"San Jose\",\n        \"country\": \"United States\",\n        \"countryCode\": \"US\",\n        \"latitude\": 37.330528259277,\n        \"longitude\": -121.838226318359,\n        \"os\": null,\n        \"fqdn\": null,\n        \"score\": 841,\n        \"classification\": \"CRITICAL\"\n    },\n    {\n        \"id\": 3205,\n        \"target\": \"h.piedpiper.com\",\n        \"companyId\": 68,\n        \"ip\": \"104.18.22.192\",\n        \"city\": \"San Jose\",\n        \"country\": \"United States\",\n        \"countryCode\": \"US\",\n        \"latitude\": 37.330528259277,\n        \"longitude\": -121.838226318359,\n        \"os\": null,\n        \"fqdn\": null,\n        \"score\": 841,\n        \"classification\": \"CRITICAL\"\n    }\n]"}],"_postman_id":"473ce2b6-1f92-42c5-9925-3a1b5b715d55"},{"name":"Get Company Data","id":"0af47b40-cfc1-46ac-b765-c01e19d9f32f","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"auth":{"type":"noauth","isInherited":false},"method":"GET","header":[{"key":"Authorization","value":"ApiKey {{api_key}}","type":"text"}],"url":"https://api.{{region}}.fortifydata.com/api/v1/company/id/{{companyId}}","description":"<p>Retrieves <strong>company demographic information</strong> along with a collection of the company’s most recent scores for the specified company.</p>\n<h3 id=\"requirements\"><strong>Requirements</strong></h3>\n<ul>\n<li>Requires the <strong>Company Details</strong> permission.</li>\n</ul>\n<h3 id=\"responses\"><strong>Responses</strong></h3>\n<ul>\n<li><p><strong>200 OK</strong> – Returns company details and recent scores.</p>\n</li>\n<li><p><strong>null</strong> – No company found for the provided ID.</p>\n</li>\n<li><p><strong>403 Forbidden</strong> – Not authorized.</p>\n</li>\n</ul>\n","urlObject":{"protocol":"https","path":["api","v1","company","id","{{companyId}}"],"host":["api","{{region}}","fortifydata","com"],"query":[],"variable":[]}},"response":[{"id":"da0103f2-8ff4-4520-af2b-1749c47bcfad","name":"Successful Response","originalRequest":{"method":"GET","header":[{"key":"Authorization","value":"ApiKey 000000249qE0XbCq2GEl6vVsKmWZoiA7Mw2aRdIqBNgJtYOxWcxmulJGLAg3tZf1foKNWm7N","type":"text"}],"url":"https://api.{{region}}.fortifydata.com/api/v1/company/id/68"},"status":"OK","code":200,"_postman_previewlanguage":"json","header":[{"key":"Server","value":"nginx/1.19.0"},{"key":"Date","value":"Wed, 30 Sep 2020 15:46:30 GMT"},{"key":"Content-Type","value":"application/json;charset=UTF-8"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Connection","value":"keep-alive"},{"key":"X-Content-Type-Options","value":"nosniff"},{"key":"X-Content-Type-Options","value":"nosniff"},{"key":"X-XSS-Protection","value":"1; mode=block"},{"key":"Cache-Control","value":"no-cache, no-store, max-age=0, must-revalidate"},{"key":"Pragma","value":"no-cache"},{"key":"Expires","value":"0"},{"key":"X-Frame-Options","value":"DENY"},{"key":"X-Frame-Options","value":"DENY"},{"key":"Strict-Transport-Security","value":"max-age=31536000;"},{"key":"Content-Security-Policy-Report-Only","value":"default-src https:; script-src https: 'unsafe-eval' 'unsafe-inline'; style-src https: 'unsafe-inline'; img-src https: data:; font-src https: data:; report-uri /csp-report"}],"cookie":[],"responseTime":null,"body":"{\n    \"id\": 68,\n    \"logo\": null,\n    \"name\": \"Pied Piper\",\n    \"legalName\": null,\n    \"type\": \"private\",\n    \"domain\": \"piedpiper.com\",\n    \"additionalDomains\": [],\n    \"employees\": 32,\n    \"location\": \"Newell Rd, Palo Alto, CA 94303, USA\",\n    \"description\": \"Stream all episodes now on HBO.\",\n    \"industry\": \"Internet Software & Services\",\n    \"phone\": \"555-555-5566\",\n    \"scores\": [\n        {\n            \"scoreName\": \"FortifyScore\",\n            \"score\": 802,\n            \"scoreChange\": 0\n        },\n        {\n            \"scoreName\": \"Demo\",\n            \"score\": 802,\n            \"scoreChange\": 0\n        },\n        {\n            \"scoreName\": \"External Only\",\n            \"score\": 802,\n            \"scoreChange\": 0\n        }\n    ]\n}"}],"_postman_id":"0af47b40-cfc1-46ac-b765-c01e19d9f32f"},{"name":"Get Infrastructure Vulnerabilities","id":"0d890b4c-8086-43a9-91f3-08901a21d5b3","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"auth":{"type":"noauth","isInherited":false},"method":"GET","header":[{"key":"Authorization","value":"ApiKey {{api_key}}","type":"text"}],"url":"https://api.{{region}}.fortifydata.com/api/v1/vulnerability/infrastructure/id/{{companyId}}","description":"<p>Retrieves a list of <strong>infrastructure vulnerabilities</strong> for the specified <strong>Company ID</strong>.</p>\n<ul>\n<li>If a <strong>Portfolio ID</strong> is provided instead, the response includes aggregated infrastructure vulnerability data for all companies in the portfolio.</li>\n</ul>\n<h3 id=\"requirements\"><strong>Requirements</strong></h3>\n<ul>\n<li>Requires the <strong>Infrastructure Vulnerabilities</strong> permission.</li>\n</ul>\n<h3 id=\"responses\"><strong>Responses</strong></h3>\n<ul>\n<li><p><strong>200 OK</strong> – Returns infrastructure vulnerability data.</p>\n</li>\n<li><p><strong>404 Not Found</strong> – Invalid company ID.</p>\n</li>\n<li><p><strong>403 Forbidden</strong> – Not authorized.</p>\n</li>\n</ul>\n","urlObject":{"protocol":"https","path":["api","v1","vulnerability","infrastructure","id","{{companyId}}"],"host":["api","{{region}}","fortifydata","com"],"query":[],"variable":[]}},"response":[{"id":"759928a9-f476-48bc-8570-79fbf2388701","name":"Successful Response","originalRequest":{"method":"GET","header":[{"key":"Authorization","value":"ApiKey {{api_key}}","type":"text"}],"url":"https://api.{{region}}.fortifydata.com/api/v1/vulnerability/infrastructure/id/{{companyId}}"},"status":"OK","code":200,"_postman_previewlanguage":"json","header":[{"key":"Server","value":"nginx/1.19.0"},{"key":"Date","value":"Wed, 30 Sep 2020 18:54:47 GMT"},{"key":"Content-Type","value":"application/json;charset=UTF-8"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Connection","value":"keep-alive"},{"key":"X-Content-Type-Options","value":"nosniff"},{"key":"X-Content-Type-Options","value":"nosniff"},{"key":"X-XSS-Protection","value":"1; mode=block"},{"key":"Cache-Control","value":"no-cache, no-store, max-age=0, must-revalidate"},{"key":"Pragma","value":"no-cache"},{"key":"Expires","value":"0"},{"key":"X-Frame-Options","value":"DENY"},{"key":"X-Frame-Options","value":"DENY"},{"key":"Strict-Transport-Security","value":"max-age=31536000;"},{"key":"Content-Security-Policy-Report-Only","value":"default-src https:; script-src https: 'unsafe-eval' 'unsafe-inline'; style-src https: 'unsafe-inline'; img-src https: data:; font-src https: data:; report-uri /csp-report"}],"cookie":[],"responseTime":null,"body":"[\n    {\n        \"threatEventText\": \"Information systems software compromise\",\n        \"maxRisk\": 5,\n        \"sources\": [\n            {\n                \"asset\": {\n                    \"id\": 3355,\n                    \"target\": \"giveapi-dev.eteamsponsor.com\",\n                    \"companyId\": 0,\n                    \"ip\": \"209.182.235.151\",\n                    \"city\": null,\n                    \"country\": null,\n                    \"countryCode\": null,\n                    \"latitude\": 0.0,\n                    \"longitude\": 0.0,\n                    \"os\": null,\n                    \"fqdn\": null,\n                    \"score\": 0,\n                    \"classification\": \"CRITICAL\"\n                },\n                \"vulnerabilities\": [\n                    {\n                        \"id\": 21370262,\n                        \"assetId\": 3355,\n                        \"target\": \"giveapi-dev.eteamsponsor.com\",\n                        \"pluginName\": \"OpenSSH < 7.8\",\n                        \"pluginFamily\": \"Misc.\",\n                        \"synopsis\": \"The SSH server running on the remote host is affected by a information disclosure vulnerability.\",\n                        \"description\": \"According to its banner, the version of OpenSSH running on the remote host is prior to 7.8. It is, therefore, affected by an information disclosure vulnerability in the auth2-gss.c, auth2-hostbased.c, and auth2-pubkey due to not delaying for an invalid authenticating user. An unauthenticated, remote attacker can exploit this, via a malformed packet, to potentially enumerate users.\\n\\nNote that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.\",\n                        \"solution\": \"Upgrade to OpenSSH version 7.8 or later.\",\n                        \"severity\": 2,\n                        \"cvssBaseScore\": \"5.0\",\n                        \"cvss3BaseScore\": \"5.3\",\n                        \"exploitAvailable\": true,\n                        \"cve\": \"CVE-2018-15473\",\n                        \"riskLevel\": \"Moderate\",\n                        \"vulnerabilityPublicationDate\": 1534291200000,\n                        \"patchPublicationDate\": 1535068800000,\n                        \"findingDate\": 1715212800000,\n                        \"seeAlso\": [\n                            \"https://www.openwall.com/lists/oss-security/2018/08/15/5\",\n                            \"https://www.openssh.com/txt/release-7.8\"\n                        ]\n                    },\n                    {\n                        \"id\": 21370294,\n                        \"assetId\": 3355,\n                        \"target\": \"giveapi-dev.eteamsponsor.com\",\n                        \"pluginName\": \"SSH Terrapin Prefix Truncation Weakness (CVE-2023-48795)\",\n                        \"pluginFamily\": \"Misc.\",\n                        \"synopsis\": \"The remote SSH server is vulnerable to a mitm prefix truncation attack.\",\n                        \"description\": \"The remote SSH server is vulnerable to a man-in-the-middle prefix truncation weakness known as Terrapin. This can allow a remote, man-in-the-middle attacker to bypass integrity checks and downgrade the connection's security.\\n\\nNote that this plugin only checks for remote SSH servers that support either ChaCha20-Poly1305 or CBC with Encrypt-then-MAC and do not support the strict key exchange countermeasures. It does not check for vulnerable software versions.\",\n                        \"solution\": \"Contact the vendor for an update with the strict key exchange countermeasures or disable the affected algorithms.\",\n                        \"severity\": 2,\n                        \"cvssBaseScore\": \"5.4\",\n                        \"cvss3BaseScore\": \"5.9\",\n                        \"exploitAvailable\": true,\n                        \"cve\": \"CVE-2023-48795\",\n                        \"riskLevel\": \"Moderate\",\n                        \"vulnerabilityPublicationDate\": 1702857600000,\n                        \"patchPublicationDate\": 1702857600000,\n                        \"findingDate\": 1709078400000,\n                        \"seeAlso\": [\n                            \"https://terrapin-attack.com/\"\n                        ]\n                    },\n                    {\n                        \"id\": 21370264,\n                        \"assetId\": 3355,\n                        \"target\": \"giveapi-dev.eteamsponsor.com\",\n                        \"pluginName\": \"OpenSSH < 8.0\",\n                        \"pluginFamily\": \"Misc.\",\n                        \"synopsis\": \"The SSH server running on the remote host is affected by multiple vulnerabilities.\",\n                        \"description\": \"According to its banner, the version of OpenSSH running on the remote host is prior to 8.0. It is, therefore, affected by the following vulnerabilities:\\n\\n  - A permission bypass vulnerability due to improper directory name validation. An unauthenticated, remote     attacker can exploit this, with a specially crafted scp server, to change the permission of a directory     on the client. (CVE-2018-20685)\\n\\n  - Multiple arbitrary file downloads due to improper validation of object name and stderr output. An unauthenticated     remote attacker can exploit this, with a specially crafted scp server, to include additional hidden     files in the transfer. (CVE-2019-6109, CVE-2019-6110)\\n\\n  - An arbitrary file write vulnerability due to improper object name validation. An unauthenticated, remote     attacker can exploit this, with a specially crafted scp server, to overwrite arbitrary files in the     client directory. (CVE-2019-6111)\\n\\nNote that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.\",\n                        \"solution\": \"Upgrade to OpenSSH version 8.0 or later.\",\n                        \"severity\": 2,\n                        \"cvssBaseScore\": \"5.8\",\n                        \"cvss3BaseScore\": \"6.8\",\n                        \"exploitAvailable\": true,\n                        \"cve\": \"CVE-2018-20685, CVE-2019-6109, CVE-2019-6110, CVE-2019-6111\",\n                        \"riskLevel\": \"Moderate\",\n                        \"vulnerabilityPublicationDate\": 1533686400000,\n                        \"patchPublicationDate\": 1555459200000,\n                        \"findingDate\": 1715212800000,\n                        \"seeAlso\": [\n                            \"https://sintonen.fi/advisories/scp-client-multiple-vulnerabilities.txt\",\n                            \"https://www.openssh.com/txt/release-8.0\"\n                        ]\n                    }\n                ]\n            }\n        ]\n    }\n]"}],"_postman_id":"0d890b4c-8086-43a9-91f3-08901a21d5b3"},{"name":"Get Infrastructure Informational Findings","id":"37bb6a0f-a105-4954-8428-8df9642b99b3","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[{"key":"Authorization","value":"ApiKey {{api_key}}","type":"text"}],"url":"https://api.{{region}}.fortifydata.com/api/v1/vulnerability/infrastructure/info/id/{{companyId}}?page=1","description":"<p>Retrieves the paged (100 per page) list of <strong>Infrastructure Informational findings</strong> for the specified <strong>Company ID</strong>.</p>\n<ul>\n<li>If a <strong>Portfolio ID</strong> is provided instead, the response includes aggregated infrastructure informational findings for all companies in the portfolio.</li>\n</ul>\n<h3 id=\"requirements\"><strong>Requirements</strong></h3>\n<ul>\n<li>Requires the <strong>Infrastructure Vulnerabilities</strong> permission.</li>\n</ul>\n<h3 id=\"responses\"><strong>Responses</strong></h3>\n<ul>\n<li><p><strong>200 OK</strong> – Returns infrastructure vulnerability data.</p>\n</li>\n<li><p><strong>404 Not Found</strong> – Invalid company ID.</p>\n</li>\n<li><p><strong>403 Forbidden</strong> – Not authorized.</p>\n</li>\n</ul>\n","urlObject":{"protocol":"https","path":["api","v1","vulnerability","infrastructure","info","id","{{companyId}}"],"host":["api","{{region}}","fortifydata","com"],"query":[{"key":"page","value":"1"}],"variable":[]}},"response":[{"id":"1e16d42d-57ca-4d03-9fd0-9e093f838078","name":"Successful Response","originalRequest":{"method":"GET","header":[{"key":"Authorization","value":"ApiKey {{api_key}}","type":"text"}],"url":{"raw":"https://api.{{region}}.fortifydata.com/api/v1/vulnerability/infrastructure/info/id/{{companyId}}?page=1","protocol":"https","host":["api","{{region}}","fortifydata","com"],"path":["api","v1","vulnerability","infrastructure","info","id","{{companyId}}"],"query":[{"key":"page","value":"1"}]}},"status":"OK","code":200,"_postman_previewlanguage":"json","header":[{"key":"Date","value":"Mon, 10 Nov 2025 18:28:39 GMT"},{"key":"Content-Type","value":"application/json;charset=UTF-8"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Connection","value":"keep-alive"},{"key":"X-Rate-Limit-Remaining","value":"4"},{"key":"X-Content-Type-Options","value":"nosniff"},{"key":"X-XSS-Protection","value":"1; mode=block"},{"key":"Cache-Control","value":"no-cache, no-store, max-age=0, must-revalidate"},{"key":"Pragma","value":"no-cache"},{"key":"Expires","value":"0"},{"key":"Strict-Transport-Security","value":"max-age=31536000 ; includeSubDomains"},{"key":"X-Frame-Options","value":"DENY"}],"cookie":[],"responseTime":null,"body":"{\n    \"total\": 414,\n    \"page\": 1,\n    \"findings\": [\n        {\n            \"id\": 1539316336,\n            \"assetId\": 144,\n            \"target\": \"fortifydata.com\",\n            \"pluginName\": \"FTP Server Detection\",\n            \"pluginFamily\": \"Service detection\",\n            \"synopsis\": \"An FTP server is listening on a remote port.\",\n            \"description\": \"It is possible to obtain the banner of the remote FTP server by connecting to a remote port.\",\n            \"solution\": null,\n            \"severity\": 0,\n            \"cvssBaseScore\": null,\n            \"cvss3BaseScore\": null,\n            \"exploitAvailable\": false,\n            \"cve\": \"\",\n            \"riskLevel\": \"Very Low\",\n            \"vulnerabilityPublicationDate\": null,\n            \"patchPublicationDate\": null,\n            \"findingDate\": 1761955200000,\n            \"seeAlso\": [],\n            \"uniqueReferenceId\": \"xb5obDSRo_bVb_HU6gGKJkifJ9HGNEidoSieYi9NIJQoN2mwQguZV_Sp128IYKZK\",\n            \"warning\": false\n        },\n        {\n            \"id\": 1539316381,\n            \"assetId\": 144,\n            \"target\": \"fortifydata.com\",\n            \"pluginName\": \"POP Server Detection\",\n            \"pluginFamily\": \"Service detection\",\n            \"synopsis\": \"A POP server is listening on the remote port.\",\n            \"description\": \"The remote host is running a server that understands the Post Office Protocol (POP), used by email clients to retrieve messages from a server, possibly across a network link.\",\n            \"solution\": \"Disable this service if you do not use it.\",\n            \"severity\": 0,\n            \"cvssBaseScore\": null,\n            \"cvss3BaseScore\": null,\n            \"exploitAvailable\": false,\n            \"cve\": null,\n            \"riskLevel\": \"Very Low\",\n            \"vulnerabilityPublicationDate\": null,\n            \"patchPublicationDate\": null,\n            \"findingDate\": 1761955200000,\n            \"seeAlso\": [\n                \"https://en.wikipedia.org/wiki/Post_Office_Protocol\"\n            ],\n            \"uniqueReferenceId\": \"xb5obDSRpAv8r5d7xQCPUov3ClRREsQh6jH4aHBg8S3V8m3jkjgjMwezD8ARjC7x\",\n            \"warning\": false\n        },\n        {\n            \"id\": 1539316394,\n            \"assetId\": 144,\n            \"target\": \"fortifydata.com\",\n            \"pluginName\": \"SSH Server Type and Version Information\",\n            \"pluginFamily\": \"Service detection\",\n            \"synopsis\": \"An SSH server is listening on this port.\",\n            \"description\": \"It is possible to obtain information about the remote SSH server by sending an empty authentication request.\",\n            \"solution\": null,\n            \"severity\": 0,\n            \"cvssBaseScore\": null,\n            \"cvss3BaseScore\": null,\n            \"exploitAvailable\": false,\n            \"cve\": \"\",\n            \"riskLevel\": \"Very Low\",\n            \"vulnerabilityPublicationDate\": null,\n            \"patchPublicationDate\": null,\n            \"findingDate\": 1761955200000,\n            \"seeAlso\": [],\n            \"uniqueReferenceId\": \"37JXHbSmUh9ebROG3T5v4RNAgFLdWhQYX1DpSaGO14cGKsl9crhiYl5S3DFk47lkopsCm34mWqIoopONW5MGpG1WTA\",\n            \"warning\": false\n        },\n        {\n            \"id\": 1539316615,\n            \"assetId\": 569262,\n            \"target\": \"scanner-9.fortifydata.com\",\n            \"pluginName\": \"SSH Server Type and Version Information\",\n            \"pluginFamily\": \"Service detection\",\n            \"synopsis\": \"An SSH server is listening on this port.\",\n            \"description\": \"It is possible to obtain information about the remote SSH server by sending an empty authentication request.\",\n            \"solution\": null,\n            \"severity\": 0,\n            \"cvssBaseScore\": null,\n            \"cvss3BaseScore\": null,\n            \"exploitAvailable\": false,\n            \"cve\": \"\",\n            \"riskLevel\": \"Very Low\",\n            \"vulnerabilityPublicationDate\": null,\n            \"patchPublicationDate\": null,\n            \"findingDate\": 1761955200000,\n            \"seeAlso\": [],\n            \"uniqueReferenceId\": \"3BA_0MKUI1XrWeoZZejSObpK7_rjkmm9O2ekijypfQAAwru0Vb1Li0MC9EdFz9YJErCF7e4T57TE4NPHjYwgJe6lm1HPf9\",\n            \"warning\": false\n        },\n        {\n            \"id\": 1539316065,\n            \"assetId\": 10017409,\n            \"target\": \"info.fortifydata.com\",\n            \"pluginName\": \"Traceroute Information\",\n            \"pluginFamily\": \"General\",\n            \"synopsis\": \"It was possible to obtain traceroute information.\",\n            \"description\": \"Makes a traceroute to the remote host.\",\n            \"solution\": null,\n            \"severity\": 0,\n            \"cvssBaseScore\": null,\n            \"cvss3BaseScore\": null,\n            \"exploitAvailable\": false,\n            \"cve\": null,\n            \"riskLevel\": \"Very Low\",\n            \"vulnerabilityPublicationDate\": null,\n            \"patchPublicationDate\": null,\n            \"findingDate\": 1761955200000,\n            \"seeAlso\": [],\n            \"uniqueReferenceId\": \"v8S8olE15rD8a_3YO1iVM83fushbjJQCHzmuZgQqGvLEGlSFukaEOF7KFxCg\",\n            \"warning\": false\n        },\n        {\n            \"id\": 1539316089,\n            \"assetId\": 16811,\n            \"target\": \"teamcity.test.fortifydata.com\",\n            \"pluginName\": \"Traceroute Information\",\n            \"pluginFamily\": \"General\",\n            \"synopsis\": \"It was possible to obtain traceroute information.\",\n            \"description\": \"Makes a traceroute to the remote host.\",\n            \"solution\": null,\n            \"severity\": 0,\n            \"cvssBaseScore\": null,\n            \"cvss3BaseScore\": null,\n            \"exploitAvailable\": false,\n            \"cve\": null,\n            \"riskLevel\": \"Very Low\",\n            \"vulnerabilityPublicationDate\": null,\n            \"patchPublicationDate\": null,\n            \"findingDate\": 1761955200000,\n            \"seeAlso\": [],\n            \"uniqueReferenceId\": \"tfZ4mhKHgeHL4XgAMLSDnFYD52OX3KlkIZVSlFt1XNKtafN85me6JVWL\",\n            \"warning\": false\n        },\n        {\n            \"id\": 1539316137,\n            \"assetId\": 27969,\n            \"target\": \"scanner-3.fortifydata.com\",\n            \"pluginName\": \"Traceroute Information\",\n            \"pluginFamily\": \"General\",\n            \"synopsis\": \"It was possible to obtain traceroute information.\",\n            \"description\": \"Makes a traceroute to the remote host.\",\n            \"solution\": null,\n            \"severity\": 0,\n            \"cvssBaseScore\": null,\n            \"cvss3BaseScore\": null,\n            \"exploitAvailable\": false,\n            \"cve\": null,\n            \"riskLevel\": \"Very Low\",\n            \"vulnerabilityPublicationDate\": null,\n            \"patchPublicationDate\": null,\n            \"findingDate\": 1761955200000,\n            \"seeAlso\": [],\n            \"uniqueReferenceId\": \"tRzFlaZTTA19ZFaT2WTBUWCNKHBu4rniz7ZiISCEpJsx8aP2FHWy7tfS\",\n            \"warning\": false\n        },\n        {\n            \"id\": 1539316165,\n            \"assetId\": 603644,\n            \"target\": \"status.fortifydata.com\",\n            \"pluginName\": \"Traceroute Information\",\n            \"pluginFamily\": \"General\",\n            \"synopsis\": \"It was possible to obtain traceroute information.\",\n            \"description\": \"Makes a traceroute to the remote host.\",\n            \"solution\": null,\n            \"severity\": 0,\n            \"cvssBaseScore\": null,\n            \"cvss3BaseScore\": null,\n            \"exploitAvailable\": false,\n            \"cve\": null,\n            \"riskLevel\": \"Very Low\",\n            \"vulnerabilityPublicationDate\": null,\n            \"patchPublicationDate\": null,\n            \"findingDate\": 1761955200000,\n            \"seeAlso\": [],\n            \"uniqueReferenceId\": \"24UcpwC0WwrZT7E9KW7Bdo7DThWu7bLsvhix6_Lh7kEGfZiIt9RJ791mW5\",\n            \"warning\": false\n        },\n        {\n            \"id\": 1539316175,\n            \"assetId\": 11989498,\n            \"target\": \"m.fortifydata.cc\",\n            \"pluginName\": \"Traceroute Information\",\n            \"pluginFamily\": \"General\",\n            \"synopsis\": \"It was possible to obtain traceroute information.\",\n            \"description\": \"Makes a traceroute to the remote host.\",\n            \"solution\": null,\n            \"severity\": 0,\n            \"cvssBaseScore\": null,\n            \"cvss3BaseScore\": null,\n            \"exploitAvailable\": false,\n            \"cve\": null,\n            \"riskLevel\": \"Very Low\",\n            \"vulnerabilityPublicationDate\": null,\n            \"patchPublicationDate\": null,\n            \"findingDate\": 1761955200000,\n            \"seeAlso\": [],\n            \"uniqueReferenceId\": \"v91izm1z_eR2eeta3cgr62keKOXGKrNJQKL_sdVWrbLcxwSPBtoWD1iVYMcB\",\n            \"warning\": false\n        },\n        {\n            \"id\": 1539316205,\n            \"assetId\": 1815105,\n            \"target\": \"academy.fortifydata.com\",\n            \"pluginName\": \"Traceroute Information\",\n            \"pluginFamily\": \"General\",\n            \"synopsis\": \"It was possible to obtain traceroute information.\",\n            \"description\": \"Makes a traceroute to the remote host.\",\n            \"solution\": null,\n            \"severity\": 0,\n            \"cvssBaseScore\": null,\n            \"cvss3BaseScore\": null,\n            \"exploitAvailable\": false,\n            \"cve\": null,\n            \"riskLevel\": \"Very Low\",\n            \"vulnerabilityPublicationDate\": null,\n            \"patchPublicationDate\": null,\n            \"findingDate\": 1761955200000,\n            \"seeAlso\": [],\n            \"uniqueReferenceId\": \"7G6Po5y3kJRg8XWYgp6gb6frQDZE27f_ZSJHtEJVaVQ1nlePRLM4y1DWkIA\",\n            \"warning\": false\n        },\n        {\n            \"id\": 1539316232,\n            \"assetId\": 15539,\n            \"target\": \"teamcity.api.eu.fortifydata.com\",\n            \"pluginName\": \"Traceroute Information\",\n            \"pluginFamily\": \"General\",\n            \"synopsis\": \"It was possible to obtain traceroute information.\",\n            \"description\": \"Makes a traceroute to the remote host.\",\n            \"solution\": null,\n            \"severity\": 0,\n            \"cvssBaseScore\": null,\n            \"cvss3BaseScore\": null,\n            \"exploitAvailable\": false,\n            \"cve\": null,\n            \"riskLevel\": \"Very Low\",\n            \"vulnerabilityPublicationDate\": null,\n            \"patchPublicationDate\": null,\n            \"findingDate\": 1761955200000,\n            \"seeAlso\": [],\n            \"uniqueReferenceId\": \"tfPKXSe75puFHMrt49MGshNI3_WDp4iAdPwyDw9BduvYhEe4hs5eKyoF\",\n            \"warning\": false\n        },\n        {\n            \"id\": 1539316258,\n            \"assetId\": 10017408,\n            \"target\": \"dev.status.fortifydata.com\",\n            \"pluginName\": \"Traceroute Information\",\n            \"pluginFamily\": \"General\",\n            \"synopsis\": \"It was possible to obtain traceroute information.\",\n            \"description\": \"Makes a traceroute to the remote host.\",\n            \"solution\": null,\n            \"severity\": 0,\n            \"cvssBaseScore\": null,\n            \"cvss3BaseScore\": null,\n            \"exploitAvailable\": false,\n            \"cve\": null,\n            \"riskLevel\": \"Very Low\",\n            \"vulnerabilityPublicationDate\": null,\n            \"patchPublicationDate\": null,\n            \"findingDate\": 1761955200000,\n            \"seeAlso\": [],\n            \"uniqueReferenceId\": \"v8S8olE15ruu0fnqURfkpsN7ztlQAyhEBoYGhoq0pxYbJmEf4VsXT9iIHPvc\",\n            \"warning\": false\n        },\n        {\n            \"id\": 1539316283,\n            \"assetId\": 11361746,\n            \"target\": \"66.249.69.42\",\n            \"pluginName\": \"Traceroute Information\",\n            \"pluginFamily\": \"General\",\n            \"synopsis\": \"It was possible to obtain traceroute information.\",\n            \"description\": \"Makes a traceroute to the remote host.\",\n            \"solution\": null,\n            \"severity\": 0,\n            \"cvssBaseScore\": null,\n            \"cvss3BaseScore\": null,\n            \"exploitAvailable\": false,\n            \"cve\": null,\n            \"riskLevel\": \"Very Low\",\n            \"vulnerabilityPublicationDate\": null,\n            \"patchPublicationDate\": null,\n            \"findingDate\": 1761955200000,\n            \"seeAlso\": [],\n            \"uniqueReferenceId\": \"v9143590bH0shdCdSDtpeYP_tpiWDS0NpM1vwOmRi_weBC8L3EPL6nBg3yf8\",\n            \"warning\": false\n        },\n        {\n            \"id\": 1539316290,\n            \"assetId\": 1744760,\n            \"target\": \"fortifydata.io\",\n            \"pluginName\": \"Traceroute Information\",\n            \"pluginFamily\": \"General\",\n            \"synopsis\": \"It was possible to obtain traceroute information.\",\n            \"description\": \"Makes a traceroute to the remote host.\",\n            \"solution\": null,\n            \"severity\": 0,\n            \"cvssBaseScore\": null,\n            \"cvss3BaseScore\": null,\n            \"exploitAvailable\": false,\n            \"cve\": null,\n            \"riskLevel\": \"Very Low\",\n            \"vulnerabilityPublicationDate\": null,\n            \"patchPublicationDate\": null,\n            \"findingDate\": 1761955200000,\n            \"seeAlso\": [],\n            \"uniqueReferenceId\": \"7G4q_9_Qz0rWdcRp6Tia4FHyJjPbLTJVF36ShoGDyLnCR52KX5dCTKQEWdz\",\n            \"warning\": false\n        },\n        {\n            \"id\": 1539316306,\n            \"assetId\": 140,\n            \"target\": \"app.fortifydata.com\",\n            \"pluginName\": \"Traceroute Information\",\n            \"pluginFamily\": \"General\",\n            \"synopsis\": \"It was possible to obtain traceroute information.\",\n            \"description\": \"Makes a traceroute to the remote host.\",\n            \"solution\": null,\n            \"severity\": 0,\n            \"cvssBaseScore\": null,\n            \"cvss3BaseScore\": null,\n            \"exploitAvailable\": false,\n            \"cve\": null,\n            \"riskLevel\": \"Very Low\",\n            \"vulnerabilityPublicationDate\": null,\n            \"patchPublicationDate\": null,\n            \"findingDate\": 1761955200000,\n            \"seeAlso\": [],\n            \"uniqueReferenceId\": \"1MBzbI5a77l3ibwG7SMxC6KIPagEoA2U8jKVFXD3JUApBbj_MUrBbt\",\n            \"warning\": false\n        },\n        {\n            \"id\": 1539316307,\n            \"assetId\": 1744761,\n            \"target\": \"fortifydata.us\",\n            \"pluginName\": \"Traceroute Information\",\n            \"pluginFamily\": \"General\",\n            \"synopsis\": \"It was possible to obtain traceroute information.\",\n            \"description\": \"Makes a traceroute to the remote host.\",\n            \"solution\": null,\n            \"severity\": 0,\n            \"cvssBaseScore\": null,\n            \"cvss3BaseScore\": null,\n            \"exploitAvailable\": false,\n            \"cve\": null,\n            \"riskLevel\": \"Very Low\",\n            \"vulnerabilityPublicationDate\": null,\n            \"patchPublicationDate\": null,\n            \"findingDate\": 1761955200000,\n            \"seeAlso\": [],\n            \"uniqueReferenceId\": \"7G4q_9_Qz965XUoihWTwKWPtIf9VXrI0PrWz9P5UwyQzQjt9lNVyozSCEkD\",\n            \"warning\": false\n        },\n        {\n            \"id\": 1539316320,\n            \"assetId\": 1005,\n            \"target\": \"eu.fortifydata.com\",\n            \"pluginName\": \"Traceroute Information\",\n            \"pluginFamily\": \"General\",\n            \"synopsis\": \"It was possible to obtain traceroute information.\",\n            \"description\": \"Makes a traceroute to the remote host.\",\n            \"solution\": null,\n            \"severity\": 0,\n            \"cvssBaseScore\": null,\n            \"cvss3BaseScore\": null,\n            \"exploitAvailable\": false,\n            \"cve\": null,\n            \"riskLevel\": \"Very Low\",\n            \"vulnerabilityPublicationDate\": null,\n            \"patchPublicationDate\": null,\n            \"findingDate\": 1761955200000,\n            \"seeAlso\": [],\n            \"uniqueReferenceId\": \"7ckyls9MG0XEDbt3aCxuNZvcMphkk5T3il8UtPZidFug02Or_kneB2S\",\n            \"warning\": false\n        },\n        {\n            \"id\": 1539316331,\n            \"assetId\": 5661409,\n            \"target\": \"www.fortifydata.io\",\n            \"pluginName\": \"Traceroute Information\",\n            \"pluginFamily\": \"General\",\n            \"synopsis\": \"It was possible to obtain traceroute information.\",\n            \"description\": \"Makes a traceroute to the remote host.\",\n            \"solution\": null,\n            \"severity\": 0,\n            \"cvssBaseScore\": null,\n            \"cvss3BaseScore\": null,\n            \"exploitAvailable\": false,\n            \"cve\": null,\n            \"riskLevel\": \"Very Low\",\n            \"vulnerabilityPublicationDate\": null,\n            \"patchPublicationDate\": null,\n            \"findingDate\": 1761955200000,\n            \"seeAlso\": [],\n            \"uniqueReferenceId\": \"8iiv_oPAE4_XDuIgl6MdygQF5RzFUBbnSmQN_nKHY1rKwmrO7lTaDqqW4t7\",\n            \"warning\": false\n        },\n        {\n            \"id\": 1539316370,\n            \"assetId\": 8126,\n            \"target\": \"api.eu.fortifydata.com\",\n            \"pluginName\": \"Traceroute Information\",\n            \"pluginFamily\": \"General\",\n            \"synopsis\": \"It was possible to obtain traceroute information.\",\n            \"description\": \"Makes a traceroute to the remote host.\",\n            \"solution\": null,\n            \"severity\": 0,\n            \"cvssBaseScore\": null,\n            \"cvss3BaseScore\": null,\n            \"exploitAvailable\": false,\n            \"cve\": null,\n            \"riskLevel\": \"Very Low\",\n            \"vulnerabilityPublicationDate\": null,\n            \"patchPublicationDate\": null,\n            \"findingDate\": 1761955200000,\n            \"seeAlso\": [],\n            \"uniqueReferenceId\": \"8dT9CLM0MKJyhUjW4fvi2CmaxajnEtb2rmq83c3LRgK5hXV27C12OXU\",\n            \"warning\": false\n        },\n        {\n            \"id\": 1539316391,\n            \"assetId\": 144,\n            \"target\": \"fortifydata.com\",\n            \"pluginName\": \"Traceroute Information\",\n            \"pluginFamily\": \"General\",\n            \"synopsis\": \"It was possible to obtain traceroute information.\",\n            \"description\": \"Makes a traceroute to the remote host.\",\n            \"solution\": null,\n            \"severity\": 0,\n            \"cvssBaseScore\": null,\n            \"cvss3BaseScore\": null,\n            \"exploitAvailable\": false,\n            \"cve\": null,\n            \"riskLevel\": \"Very Low\",\n            \"vulnerabilityPublicationDate\": null,\n            \"patchPublicationDate\": null,\n            \"findingDate\": 1761955200000,\n            \"seeAlso\": [],\n            \"uniqueReferenceId\": \"1MBzKjM7TgULwyYmdnstjuGs22FiYRQpOZPMSNr0EAc2qZ2151isDJ\",\n            \"warning\": false\n        },\n        {\n            \"id\": 1539316439,\n            \"assetId\": 676,\n            \"target\": \"vpn.fortifydata.com\",\n            \"pluginName\": \"Traceroute Information\",\n            \"pluginFamily\": \"General\",\n            \"synopsis\": \"It was possible to obtain traceroute information.\",\n            \"description\": \"Makes a traceroute to the remote host.\",\n            \"solution\": null,\n            \"severity\": 0,\n            \"cvssBaseScore\": null,\n            \"cvss3BaseScore\": null,\n            \"exploitAvailable\": false,\n            \"cve\": null,\n            \"riskLevel\": \"Very Low\",\n            \"vulnerabilityPublicationDate\": null,\n            \"patchPublicationDate\": null,\n            \"findingDate\": 1761955200000,\n            \"seeAlso\": [],\n            \"uniqueReferenceId\": \"1XYGHmyHIftvFSXf187LlGxKReLdSa9AuId1nN8Lv_3dlFi3b0185H\",\n            \"warning\": false\n        },\n        {\n            \"id\": 1539316513,\n            \"assetId\": 2068504,\n            \"target\": \"3.144.29.222\",\n            \"pluginName\": \"Traceroute Information\",\n            \"pluginFamily\": \"General\",\n            \"synopsis\": \"It was possible to obtain traceroute information.\",\n            \"description\": \"Makes a traceroute to the remote host.\",\n            \"solution\": null,\n            \"severity\": 0,\n            \"cvssBaseScore\": null,\n            \"cvss3BaseScore\": null,\n            \"exploitAvailable\": false,\n            \"cve\": null,\n            \"riskLevel\": \"Very Low\",\n            \"vulnerabilityPublicationDate\": null,\n            \"patchPublicationDate\": null,\n            \"findingDate\": 1761955200000,\n            \"seeAlso\": [],\n            \"uniqueReferenceId\": \"7PCVcqvkrPSqJG6TkigATXqCNLCtK3ghiX79cJL3xWhT3oxlm9_inis1s5Z\",\n            \"warning\": false\n        },\n        {\n            \"id\": 1539316522,\n            \"assetId\": 1744758,\n            \"target\": \"fortifydata.co.uk\",\n            \"pluginName\": \"Traceroute Information\",\n            \"pluginFamily\": \"General\",\n            \"synopsis\": \"It was possible to obtain traceroute information.\",\n            \"description\": \"Makes a traceroute to the remote host.\",\n            \"solution\": null,\n            \"severity\": 0,\n            \"cvssBaseScore\": null,\n            \"cvss3BaseScore\": null,\n            \"exploitAvailable\": false,\n            \"cve\": null,\n            \"riskLevel\": \"Very Low\",\n            \"vulnerabilityPublicationDate\": null,\n            \"patchPublicationDate\": null,\n            \"findingDate\": 1761955200000,\n            \"seeAlso\": [],\n            \"uniqueReferenceId\": \"7G4q_9_Q0XnEpPrgAKdVGfwiXEgohedEKlC87pgRd7ptTk6JK8ijBW6ElpP\",\n            \"warning\": false\n        },\n        {\n            \"id\": 1539316529,\n            \"assetId\": 11370767,\n            \"target\": \"66.249.69.242\",\n            \"pluginName\": \"Traceroute Information\",\n            \"pluginFamily\": \"General\",\n            \"synopsis\": \"It was possible to obtain traceroute information.\",\n            \"description\": \"Makes a traceroute to the remote host.\",\n            \"solution\": null,\n            \"severity\": 0,\n            \"cvssBaseScore\": null,\n            \"cvss3BaseScore\": null,\n            \"exploitAvailable\": false,\n            \"cve\": null,\n            \"riskLevel\": \"Very Low\",\n            \"vulnerabilityPublicationDate\": null,\n            \"patchPublicationDate\": null,\n            \"findingDate\": 1761955200000,\n            \"seeAlso\": [],\n            \"uniqueReferenceId\": \"v9143Gs7Ed6fCEUOB3rPRkLQGfEI8AZXezr4eQmvwo6_UjCQACELL4blU_6U\",\n            \"warning\": false\n        },\n        {\n            \"id\": 1539316536,\n            \"assetId\": 454,\n            \"target\": \"demo.fortifydata.com\",\n            \"pluginName\": \"Traceroute Information\",\n            \"pluginFamily\": \"General\",\n            \"synopsis\": \"It was possible to obtain traceroute information.\",\n            \"description\": \"Makes a traceroute to the remote host.\",\n            \"solution\": null,\n            \"severity\": 0,\n            \"cvssBaseScore\": null,\n            \"cvss3BaseScore\": null,\n            \"exploitAvailable\": false,\n            \"cve\": null,\n            \"riskLevel\": \"Very Low\",\n            \"vulnerabilityPublicationDate\": null,\n            \"patchPublicationDate\": null,\n            \"findingDate\": 1761955200000,\n            \"seeAlso\": [],\n            \"uniqueReferenceId\": \"1TpNpVVBpQz33APt683L9xN2Ab9FXp96eVN7bjInPi1GDlunpooXP1\",\n            \"warning\": false\n        },\n        {\n            \"id\": 1539316568,\n            \"assetId\": 5661407,\n            \"target\": \"www.fortifydata.co.uk\",\n            \"pluginName\": \"Traceroute Information\",\n            \"pluginFamily\": \"General\",\n            \"synopsis\": \"It was possible to obtain traceroute information.\",\n            \"description\": \"Makes a traceroute to the remote host.\",\n            \"solution\": null,\n            \"severity\": 0,\n            \"cvssBaseScore\": null,\n            \"cvss3BaseScore\": null,\n            \"exploitAvailable\": false,\n            \"cve\": null,\n            \"riskLevel\": \"Very Low\",\n            \"vulnerabilityPublicationDate\": null,\n            \"patchPublicationDate\": null,\n            \"findingDate\": 1761955200000,\n            \"seeAlso\": [],\n            \"uniqueReferenceId\": \"8iiv_oPADOHC96DtZ_AvcJAP7_TcxufbxAcpexVa1qwQxUB_iWujCMm_Ee_\",\n            \"warning\": false\n        },\n        {\n            \"id\": 1539316612,\n            \"assetId\": 569262,\n            \"target\": \"scanner-9.fortifydata.com\",\n            \"pluginName\": \"Traceroute Information\",\n            \"pluginFamily\": \"General\",\n            \"synopsis\": \"It was possible to obtain traceroute information.\",\n            \"description\": \"Makes a traceroute to the remote host.\",\n            \"solution\": null,\n            \"severity\": 0,\n            \"cvssBaseScore\": null,\n            \"cvss3BaseScore\": null,\n            \"exploitAvailable\": false,\n            \"cve\": null,\n            \"riskLevel\": \"Very Low\",\n            \"vulnerabilityPublicationDate\": null,\n            \"patchPublicationDate\": null,\n            \"findingDate\": 1761955200000,\n            \"seeAlso\": [],\n            \"uniqueReferenceId\": \"22xBR89kMHV0ZUhv7APbf9XBPShvL18IbydQqDWa5K2EVUOAWPxt5Pn0qi\",\n            \"warning\": false\n        },\n        {\n            \"id\": 1539316624,\n            \"assetId\": 5661408,\n            \"target\": \"www.fortifydata.es\",\n            \"pluginName\": \"Traceroute Information\",\n            \"pluginFamily\": \"General\",\n            \"synopsis\": \"It was possible to obtain traceroute information.\",\n            \"description\": \"Makes a traceroute to the remote host.\",\n            \"solution\": null,\n            \"severity\": 0,\n            \"cvssBaseScore\": null,\n            \"cvss3BaseScore\": null,\n            \"exploitAvailable\": false,\n            \"cve\": null,\n            \"riskLevel\": \"Very Low\",\n            \"vulnerabilityPublicationDate\": null,\n            \"patchPublicationDate\": null,\n            \"findingDate\": 1761955200000,\n            \"seeAlso\": [],\n            \"uniqueReferenceId\": \"8iiv_oPADXlMTOana3aRS_IK6WdWJ2dhHZ166Ykq_dZNx81oIEbf7BoYmm3\",\n            \"warning\": false\n        },\n        {\n            \"id\": 1539316643,\n            \"assetId\": 26165,\n            \"target\": \"scanner.fortifydata.com\",\n            \"pluginName\": \"Traceroute Information\",\n            \"pluginFamily\": \"General\",\n            \"synopsis\": \"It was possible to obtain traceroute information.\",\n            \"description\": \"Makes a traceroute to the remote host.\",\n            \"solution\": null,\n            \"severity\": 0,\n            \"cvssBaseScore\": null,\n            \"cvss3BaseScore\": null,\n            \"exploitAvailable\": false,\n            \"cve\": null,\n            \"riskLevel\": \"Very Low\",\n            \"vulnerabilityPublicationDate\": null,\n            \"patchPublicationDate\": null,\n            \"findingDate\": 1761955200000,\n            \"seeAlso\": [],\n            \"uniqueReferenceId\": \"tRq9Abj1Su_rnVejTvRPJ4eyctsyorm65c2QRTQgcFFIBMSQ31SmuzQq\",\n            \"warning\": false\n        },\n        {\n            \"id\": 1539316652,\n            \"assetId\": 9967,\n            \"target\": \"autodiscover.fortifydata.com\",\n            \"pluginName\": \"Traceroute Information\",\n            \"pluginFamily\": \"General\",\n            \"synopsis\": \"It was possible to obtain traceroute information.\",\n            \"description\": \"Makes a traceroute to the remote host.\",\n            \"solution\": null,\n            \"severity\": 0,\n            \"cvssBaseScore\": null,\n            \"cvss3BaseScore\": null,\n            \"exploitAvailable\": false,\n            \"cve\": null,\n            \"riskLevel\": \"Very Low\",\n            \"vulnerabilityPublicationDate\": null,\n            \"patchPublicationDate\": null,\n            \"findingDate\": 1761955200000,\n            \"seeAlso\": [],\n            \"uniqueReferenceId\": \"8nnXQGR6ymIye4lvzPEavyPb12pZ5KbEwpBWoKF9pKsolh2OzV1FORa\",\n            \"warning\": false\n        },\n        {\n            \"id\": 1539317000,\n            \"assetId\": 26639,\n            \"target\": \"scanner-eu.fortifydata.com\",\n            \"pluginName\": \"Traceroute Information\",\n            \"pluginFamily\": \"General\",\n            \"synopsis\": \"It was possible to obtain traceroute information.\",\n            \"description\": \"Makes a traceroute to the remote host.\",\n            \"solution\": null,\n            \"severity\": 0,\n            \"cvssBaseScore\": null,\n            \"cvss3BaseScore\": null,\n            \"exploitAvailable\": false,\n            \"cve\": null,\n            \"riskLevel\": \"Very Low\",\n            \"vulnerabilityPublicationDate\": null,\n            \"patchPublicationDate\": null,\n            \"findingDate\": 1761955200000,\n            \"seeAlso\": [],\n            \"uniqueReferenceId\": \"tRqkTXyC7aIb7qTXR6FJyvCyxpN3ngTDYXuW9GHigbrdNXrTL82wPOi_\",\n            \"warning\": false\n        },\n        {\n            \"id\": 1539317012,\n            \"assetId\": 1744759,\n            \"target\": \"fortifydata.es\",\n            \"pluginName\": \"Traceroute Information\",\n            \"pluginFamily\": \"General\",\n            \"synopsis\": \"It was possible to obtain traceroute information.\",\n            \"description\": \"Makes a traceroute to the remote host.\",\n            \"solution\": null,\n            \"severity\": 0,\n            \"cvssBaseScore\": null,\n            \"cvss3BaseScore\": null,\n            \"exploitAvailable\": false,\n            \"cve\": null,\n            \"riskLevel\": \"Very Low\",\n            \"vulnerabilityPublicationDate\": null,\n            \"patchPublicationDate\": null,\n            \"findingDate\": 1761955200000,\n            \"seeAlso\": [],\n            \"uniqueReferenceId\": \"7G4q_9_Q151P9vZ9LNPhlwEdWzC7sNbKUKqP_PH7aVSqSyx88Q_f6L8C3wT\",\n            \"warning\": false\n        },\n        {\n            \"id\": 1539317022,\n            \"assetId\": 6917193,\n            \"target\": \"www.fortifydata.us\",\n            \"pluginName\": \"Traceroute Information\",\n            \"pluginFamily\": \"General\",\n            \"synopsis\": \"It was possible to obtain traceroute information.\",\n            \"description\": \"Makes a traceroute to the remote host.\",\n            \"solution\": null,\n            \"severity\": 0,\n            \"cvssBaseScore\": null,\n            \"cvss3BaseScore\": null,\n            \"exploitAvailable\": false,\n            \"cve\": null,\n            \"riskLevel\": \"Very Low\",\n            \"vulnerabilityPublicationDate\": null,\n            \"patchPublicationDate\": null,\n            \"findingDate\": 1761955200000,\n            \"seeAlso\": [],\n            \"uniqueReferenceId\": \"8se4P9R04qREpv7Ez8zWp4_qPuvp8I79wxE0u5GWNZ32ar0Xn5as97ljdxc\",\n            \"warning\": false\n        },\n        {\n            \"id\": 1539317042,\n            \"assetId\": 11684693,\n            \"target\": \"app.us.fortifydata.com\",\n            \"pluginName\": \"Traceroute Information\",\n            \"pluginFamily\": \"General\",\n            \"synopsis\": \"It was possible to obtain traceroute information.\",\n            \"description\": \"Makes a traceroute to the remote host.\",\n            \"solution\": null,\n            \"severity\": 0,\n            \"cvssBaseScore\": null,\n            \"cvss3BaseScore\": null,\n            \"exploitAvailable\": false,\n            \"cve\": null,\n            \"riskLevel\": \"Very Low\",\n            \"vulnerabilityPublicationDate\": null,\n            \"patchPublicationDate\": null,\n            \"findingDate\": 1761955200000,\n            \"seeAlso\": [],\n            \"uniqueReferenceId\": \"v91bjOTWbckOP6BVLuGEQ7v10OaYByolz26_nkoHIp7PKbo_opYBm1WVtcNX\",\n            \"warning\": false\n        },\n        {\n            \"id\": 1539317053,\n            \"assetId\": 7204,\n            \"target\": \"test.fortifydata.com\",\n            \"pluginName\": \"Traceroute Information\",\n            \"pluginFamily\": \"General\",\n            \"synopsis\": \"It was possible to obtain traceroute information.\",\n            \"description\": \"Makes a traceroute to the remote host.\",\n            \"solution\": null,\n            \"severity\": 0,\n            \"cvssBaseScore\": null,\n            \"cvss3BaseScore\": null,\n            \"exploitAvailable\": false,\n            \"cve\": null,\n            \"riskLevel\": \"Very Low\",\n            \"vulnerabilityPublicationDate\": null,\n            \"patchPublicationDate\": null,\n            \"findingDate\": 1761955200000,\n            \"seeAlso\": [],\n            \"uniqueReferenceId\": \"84HNuzyyX7bm7GZrstjHPbo4Hgn7TSVnlPS_HJXuxurEgTGXV163gNd\",\n            \"warning\": false\n        },\n        {\n            \"id\": 1539317091,\n            \"assetId\": 11766647,\n            \"target\": \"app.fortifydata.cc\",\n            \"pluginName\": \"Traceroute Information\",\n            \"pluginFamily\": \"General\",\n            \"synopsis\": \"It was possible to obtain traceroute information.\",\n            \"description\": \"Makes a traceroute to the remote host.\",\n            \"solution\": null,\n            \"severity\": 0,\n            \"cvssBaseScore\": null,\n            \"cvss3BaseScore\": null,\n            \"exploitAvailable\": false,\n            \"cve\": null,\n            \"riskLevel\": \"Very Low\",\n            \"vulnerabilityPublicationDate\": null,\n            \"patchPublicationDate\": null,\n            \"findingDate\": 1761955200000,\n            \"seeAlso\": [],\n            \"uniqueReferenceId\": \"v91dIOqeH2Bc9Hus5FqSmvDDHcpvR4q2jwwnzNm6dpRiwsA18EoyheWWdLVz\",\n            \"warning\": false\n        },\n        {\n            \"id\": 1540091261,\n            \"assetId\": 15576773,\n            \"target\": \"fortifydata.cc\",\n            \"pluginName\": \"Traceroute Information\",\n            \"pluginFamily\": \"General\",\n            \"synopsis\": \"It was possible to obtain traceroute information.\",\n            \"description\": \"Makes a traceroute to the remote host.\",\n            \"solution\": null,\n            \"severity\": 0,\n            \"cvssBaseScore\": null,\n            \"cvss3BaseScore\": null,\n            \"exploitAvailable\": false,\n            \"cve\": null,\n            \"riskLevel\": \"Very Low\",\n            \"vulnerabilityPublicationDate\": null,\n            \"patchPublicationDate\": null,\n            \"findingDate\": 1761955200000,\n            \"seeAlso\": [],\n            \"uniqueReferenceId\": \"v9Epn2vYYC9fVl4KjjjVEkg_9nifilVShnQInuvznDiSAHe6nOHsH57pDbPz\",\n            \"warning\": false\n        },\n        {\n            \"id\": 1539316067,\n            \"assetId\": 10017409,\n            \"target\": \"info.fortifydata.com\",\n            \"pluginName\": \"Microsoft Windows SMB2 and SMB3 Dialects Supported (remote check)\",\n            \"pluginFamily\": \"Windows\",\n            \"synopsis\": \"It was possible to obtain information about the dialects of SMB2 and SMB3 available on the remote host.\",\n            \"description\": \"Nessus was able to obtain the set of SMB2 and SMB3 dialects running on the remote host by sending an authentication request to port 139 or 445.\",\n            \"solution\": null,\n            \"severity\": 0,\n            \"cvssBaseScore\": null,\n            \"cvss3BaseScore\": null,\n            \"exploitAvailable\": false,\n            \"cve\": null,\n            \"riskLevel\": \"Very Low\",\n            \"vulnerabilityPublicationDate\": null,\n            \"patchPublicationDate\": null,\n            \"findingDate\": 1761955200000,\n            \"seeAlso\": [],\n            \"uniqueReferenceId\": \"jJ2dImbCf4ZFLfXiSE4JYHVWkD5PZWy1JAmy67hYi0HWh_zcjwIhsIkeH11Om0fJvkhPtn_vq0qQSonjQ2F2Q_e7e3ichmiqshkhtXdupD8QEG5fiZhwNFV\",\n            \"warning\": false\n        },\n        {\n            \"id\": 1539316167,\n            \"assetId\": 603644,\n            \"target\": \"status.fortifydata.com\",\n            \"pluginName\": \"Microsoft Windows SMB2 and SMB3 Dialects Supported (remote check)\",\n            \"pluginFamily\": \"Windows\",\n            \"synopsis\": \"It was possible to obtain information about the dialects of SMB2 and SMB3 available on the remote host.\",\n            \"description\": \"Nessus was able to obtain the set of SMB2 and SMB3 dialects running on the remote host by sending an authentication request to port 139 or 445.\",\n            \"solution\": null,\n            \"severity\": 0,\n            \"cvssBaseScore\": null,\n            \"cvss3BaseScore\": null,\n            \"exploitAvailable\": false,\n            \"cve\": null,\n            \"riskLevel\": \"Very Low\",\n            \"vulnerabilityPublicationDate\": null,\n            \"patchPublicationDate\": null,\n            \"findingDate\": 1761955200000,\n            \"seeAlso\": [],\n            \"uniqueReferenceId\": \"1jSBiOArUrCpLKSgPKir0DoP6swHXcLVQnjJvP1dO2GLfwnxXLxxP9Z3iwMDwPZ_c6DiF_rkO9wqyKWWWibI60C6ZVoYv7Y3bwLmCbWPA2UTz_1wCWcG7\",\n            \"warning\": false\n        },\n        {\n            \"id\": 1539316209,\n            \"assetId\": 1815105,\n            \"target\": \"academy.fortifydata.com\",\n            \"pluginName\": \"Microsoft Windows SMB2 and SMB3 Dialects Supported (remote check)\",\n            \"pluginFamily\": \"Windows\",\n            \"synopsis\": \"It was possible to obtain information about the dialects of SMB2 and SMB3 available on the remote host.\",\n            \"description\": \"Nessus was able to obtain the set of SMB2 and SMB3 dialects running on the remote host by sending an authentication request to port 139 or 445.\",\n            \"solution\": null,\n            \"severity\": 0,\n            \"cvssBaseScore\": null,\n            \"cvss3BaseScore\": null,\n            \"exploitAvailable\": false,\n            \"cve\": null,\n            \"riskLevel\": \"Very Low\",\n            \"vulnerabilityPublicationDate\": null,\n            \"patchPublicationDate\": null,\n            \"findingDate\": 1761955200000,\n            \"seeAlso\": [],\n            \"uniqueReferenceId\": \"4RRE972s2FUcGVgyvhHKrCJ3jPNNzkvRmji_RReZcAvBL82s0gfd5Hx64OdhfFVoQIkTg55wqFVeJHTh9iOZeRrBRHvVvkFcDt5fh7FenNQEB9gHsbNLS_\",\n            \"warning\": false\n        },\n        {\n            \"id\": 1539316260,\n            \"assetId\": 10017408,\n            \"target\": \"dev.status.fortifydata.com\",\n            \"pluginName\": \"Microsoft Windows SMB2 and SMB3 Dialects Supported (remote check)\",\n            \"pluginFamily\": \"Windows\",\n            \"synopsis\": \"It was possible to obtain information about the dialects of SMB2 and SMB3 available on the remote host.\",\n            \"description\": \"Nessus was able to obtain the set of SMB2 and SMB3 dialects running on the remote host by sending an authentication request to port 139 or 445.\",\n            \"solution\": null,\n            \"severity\": 0,\n            \"cvssBaseScore\": null,\n            \"cvss3BaseScore\": null,\n            \"exploitAvailable\": false,\n            \"cve\": null,\n            \"riskLevel\": \"Very Low\",\n            \"vulnerabilityPublicationDate\": null,\n            \"patchPublicationDate\": null,\n            \"findingDate\": 1761955200000,\n            \"seeAlso\": [],\n            \"uniqueReferenceId\": \"jJ2dImbCf4UbChuVpgXqPuMB8fSzqbmm1WEkuMoPS0KuPLq0yQ7qXXIOo1QhN4ZwW0up5Edb9fWpJwoWbQzjf40icpQYCjG2rMuC6R353zzFuYhwUVPv2XU\",\n            \"warning\": false\n        },\n        {\n            \"id\": 1539316291,\n            \"assetId\": 1744760,\n            \"target\": \"fortifydata.io\",\n            \"pluginName\": \"Microsoft Windows SMB2 and SMB3 Dialects Supported (remote check)\",\n            \"pluginFamily\": \"Windows\",\n            \"synopsis\": \"It was possible to obtain information about the dialects of SMB2 and SMB3 available on the remote host.\",\n            \"description\": \"Nessus was able to obtain the set of SMB2 and SMB3 dialects running on the remote host by sending an authentication request to port 139 or 445.\",\n            \"solution\": null,\n            \"severity\": 0,\n            \"cvssBaseScore\": null,\n            \"cvss3BaseScore\": null,\n            \"exploitAvailable\": false,\n            \"cve\": null,\n            \"riskLevel\": \"Very Low\",\n            \"vulnerabilityPublicationDate\": null,\n            \"patchPublicationDate\": null,\n            \"findingDate\": 1761955200000,\n            \"seeAlso\": [],\n            \"uniqueReferenceId\": \"4RQ7WD5yty5u9dv8y54lnTNw5E73bzoBeLOe0_YLsGL1TUAcN8Iis6PjgrqlFnjAvF6tzi7esHoSbWak8qHYRekf5a3TA9bxnxPrgLjS2O9EGPa9PRFCgK\",\n            \"warning\": false\n        },\n        {\n            \"id\": 1539316309,\n            \"assetId\": 1744761,\n            \"target\": \"fortifydata.us\",\n            \"pluginName\": \"Microsoft Windows SMB2 and SMB3 Dialects Supported (remote check)\",\n            \"pluginFamily\": \"Windows\",\n            \"synopsis\": \"It was possible to obtain information about the dialects of SMB2 and SMB3 available on the remote host.\",\n            \"description\": \"Nessus was able to obtain the set of SMB2 and SMB3 dialects running on the remote host by sending an authentication request to port 139 or 445.\",\n            \"solution\": null,\n            \"severity\": 0,\n            \"cvssBaseScore\": null,\n            \"cvss3BaseScore\": null,\n            \"exploitAvailable\": false,\n            \"cve\": null,\n            \"riskLevel\": \"Very Low\",\n            \"vulnerabilityPublicationDate\": null,\n            \"patchPublicationDate\": null,\n            \"findingDate\": 1761955200000,\n            \"seeAlso\": [],\n            \"uniqueReferenceId\": \"4RQ7WD5ytDzD7FTBVdnuB27IsSnCWL4hTu0QmU6bsEbv82LYtJyOcJfCfDWVAEw9PswRj4rvdbQ03UyYlwrzMs9gJCiyCMzxTnuOmVJd6nkOoCTyTjHlZL\",\n            \"warning\": false\n        },\n        {\n            \"id\": 1539316310,\n            \"assetId\": 140,\n            \"target\": \"app.fortifydata.com\",\n            \"pluginName\": \"Microsoft Windows SMB2 and SMB3 Dialects Supported (remote check)\",\n            \"pluginFamily\": \"Windows\",\n            \"synopsis\": \"It was possible to obtain information about the dialects of SMB2 and SMB3 available on the remote host.\",\n            \"description\": \"Nessus was able to obtain the set of SMB2 and SMB3 dialects running on the remote host by sending an authentication request to port 139 or 445.\",\n            \"solution\": null,\n            \"severity\": 0,\n            \"cvssBaseScore\": null,\n            \"cvss3BaseScore\": null,\n            \"exploitAvailable\": false,\n            \"cve\": null,\n            \"riskLevel\": \"Very Low\",\n            \"vulnerabilityPublicationDate\": null,\n            \"patchPublicationDate\": null,\n            \"findingDate\": 1761955200000,\n            \"seeAlso\": [],\n            \"uniqueReferenceId\": \"17EZUn6ykGMg5jDz0kV9ZewnfOsmHs09KBkRe_eIoJU6eZau0XN2lipSKPVG67X6sNHdImL42esgZuV4hE23io8eaDkdsPegY6ooP2gopz0hzbymd\",\n            \"warning\": false\n        },\n        {\n            \"id\": 1539316322,\n            \"assetId\": 1005,\n            \"target\": \"eu.fortifydata.com\",\n            \"pluginName\": \"Microsoft Windows SMB2 and SMB3 Dialects Supported (remote check)\",\n            \"pluginFamily\": \"Windows\",\n            \"synopsis\": \"It was possible to obtain information about the dialects of SMB2 and SMB3 available on the remote host.\",\n            \"description\": \"Nessus was able to obtain the set of SMB2 and SMB3 dialects running on the remote host by sending an authentication request to port 139 or 445.\",\n            \"solution\": null,\n            \"severity\": 0,\n            \"cvssBaseScore\": null,\n            \"cvss3BaseScore\": null,\n            \"exploitAvailable\": false,\n            \"cve\": null,\n            \"riskLevel\": \"Very Low\",\n            \"vulnerabilityPublicationDate\": null,\n            \"patchPublicationDate\": null,\n            \"findingDate\": 1761955200000,\n            \"seeAlso\": [],\n            \"uniqueReferenceId\": \"4y_NCuuQ0K0KcMbv9_y4OvL984b2br4KQaaxL9QeJWsHOX9pjBQ1Zqv7vmh7GlLROrJ9MnqPtZa3eHf41noy3W2QWzvuGA9I7JMnVlzs9GcJILi1qz\",\n            \"warning\": false\n        },\n        {\n            \"id\": 1539316332,\n            \"assetId\": 5661409,\n            \"target\": \"www.fortifydata.io\",\n            \"pluginName\": \"Microsoft Windows SMB2 and SMB3 Dialects Supported (remote check)\",\n            \"pluginFamily\": \"Windows\",\n            \"synopsis\": \"It was possible to obtain information about the dialects of SMB2 and SMB3 available on the remote host.\",\n            \"description\": \"Nessus was able to obtain the set of SMB2 and SMB3 dialects running on the remote host by sending an authentication request to port 139 or 445.\",\n            \"solution\": null,\n            \"severity\": 0,\n            \"cvssBaseScore\": null,\n            \"cvss3BaseScore\": null,\n            \"exploitAvailable\": false,\n            \"cve\": null,\n            \"riskLevel\": \"Very Low\",\n            \"vulnerabilityPublicationDate\": null,\n            \"patchPublicationDate\": null,\n            \"findingDate\": 1761955200000,\n            \"seeAlso\": [],\n            \"uniqueReferenceId\": \"5fFyg2kckOxU8ss6PFlVnIcTNBTTayW3Rt7UwV8JpEbVlsW3xjXP9R2GtKphHfiMrfrfBe2cjAf3_ZRLTcy_j9VX5tOkMIaFHJUvd_vCngO89wBfmZ9qMD\",\n            \"warning\": false\n        },\n        {\n            \"id\": 1539316523,\n            \"assetId\": 1744758,\n            \"target\": \"fortifydata.co.uk\",\n            \"pluginName\": \"Microsoft Windows SMB2 and SMB3 Dialects Supported (remote check)\",\n            \"pluginFamily\": \"Windows\",\n            \"synopsis\": \"It was possible to obtain information about the dialects of SMB2 and SMB3 available on the remote host.\",\n            \"description\": \"Nessus was able to obtain the set of SMB2 and SMB3 dialects running on the remote host by sending an authentication request to port 139 or 445.\",\n            \"solution\": null,\n            \"severity\": 0,\n            \"cvssBaseScore\": null,\n            \"cvss3BaseScore\": null,\n            \"exploitAvailable\": false,\n            \"cve\": null,\n            \"riskLevel\": \"Very Low\",\n            \"vulnerabilityPublicationDate\": null,\n            \"patchPublicationDate\": null,\n            \"findingDate\": 1761955200000,\n            \"seeAlso\": [],\n            \"uniqueReferenceId\": \"4RQ7WD5y7Zr9ftbxuoI5D8lPFuUkrBkMXMegR1NtCMDWgKitd55i1PlzqacWgFODzbh0p8lhtYyWNgb2BQfGFOwMS1kof7Gy3c2v_Ox1Zofqj9sxcAOJ3O\",\n            \"warning\": false\n        },\n        {\n            \"id\": 1539316538,\n            \"assetId\": 454,\n            \"target\": \"demo.fortifydata.com\",\n            \"pluginName\": \"Microsoft Windows SMB2 and SMB3 Dialects Supported (remote check)\",\n            \"pluginFamily\": \"Windows\",\n            \"synopsis\": \"It was possible to obtain information about the dialects of SMB2 and SMB3 available on the remote host.\",\n            \"description\": \"Nessus was able to obtain the set of SMB2 and SMB3 dialects running on the remote host by sending an authentication request to port 139 or 445.\",\n            \"solution\": null,\n            \"severity\": 0,\n            \"cvssBaseScore\": null,\n            \"cvss3BaseScore\": null,\n            \"exploitAvailable\": false,\n            \"cve\": null,\n            \"riskLevel\": \"Very Low\",\n            \"vulnerabilityPublicationDate\": null,\n            \"patchPublicationDate\": null,\n            \"findingDate\": 1761955200000,\n            \"seeAlso\": [],\n            \"uniqueReferenceId\": \"1bYJsefSMFVASYOdnvE4bF5nF3kHI5C8AVjFQmgIz5y67dfBZKW0xFXyFK2oSUTqeAW0usG9lWlwXtzppjc_I9GmG1rp7QtAfnev4vFjEjTLJbhY6\",\n            \"warning\": false\n        },\n        {\n            \"id\": 1539316569,\n            \"assetId\": 5661407,\n            \"target\": \"www.fortifydata.co.uk\",\n            \"pluginName\": \"Microsoft Windows SMB2 and SMB3 Dialects Supported (remote check)\",\n            \"pluginFamily\": \"Windows\",\n            \"synopsis\": \"It was possible to obtain information about the dialects of SMB2 and SMB3 available on the remote host.\",\n            \"description\": \"Nessus was able to obtain the set of SMB2 and SMB3 dialects running on the remote host by sending an authentication request to port 139 or 445.\",\n            \"solution\": null,\n            \"severity\": 0,\n            \"cvssBaseScore\": null,\n            \"cvss3BaseScore\": null,\n            \"exploitAvailable\": false,\n            \"cve\": null,\n            \"riskLevel\": \"Very Low\",\n            \"vulnerabilityPublicationDate\": null,\n            \"patchPublicationDate\": null,\n            \"findingDate\": 1761955200000,\n            \"seeAlso\": [],\n            \"uniqueReferenceId\": \"5fFyg2kckDACbyGb5oKCYpxv39mKGbzGz1HGQ7SSpJjZSayy99fOEDb4vln8QHUCOEBv6FoFOAnNg24ut14NsJgTOAk_HspEH3yM1FHVg7rPJV9sg35XlB\",\n            \"warning\": false\n        },\n        {\n            \"id\": 1539316625,\n            \"assetId\": 5661408,\n            \"target\": \"www.fortifydata.es\",\n            \"pluginName\": \"Microsoft Windows SMB2 and SMB3 Dialects Supported (remote check)\",\n            \"pluginFamily\": \"Windows\",\n            \"synopsis\": \"It was possible to obtain information about the dialects of SMB2 and SMB3 available on the remote host.\",\n            \"description\": \"Nessus was able to obtain the set of SMB2 and SMB3 dialects running on the remote host by sending an authentication request to port 139 or 445.\",\n            \"solution\": null,\n            \"severity\": 0,\n            \"cvssBaseScore\": null,\n            \"cvss3BaseScore\": null,\n            \"exploitAvailable\": false,\n            \"cve\": null,\n            \"riskLevel\": \"Very Low\",\n            \"vulnerabilityPublicationDate\": null,\n            \"patchPublicationDate\": null,\n            \"findingDate\": 1761955200000,\n            \"seeAlso\": [],\n            \"uniqueReferenceId\": \"5fFyg2kckJ3La03Esx2MaySHqnDjqnfncKVib10ipGLs6jKiQK6jpeCnuxTILZ6c7s0SRrIWz4OW80t7G6PonX5Vs1zFK4NFbUe87Q6gjHCZrISRjw7H3C\",\n            \"warning\": false\n        },\n        {\n            \"id\": 1539316655,\n            \"assetId\": 9967,\n            \"target\": \"autodiscover.fortifydata.com\",\n            \"pluginName\": \"Microsoft Windows SMB2 and SMB3 Dialects Supported (remote check)\",\n            \"pluginFamily\": \"Windows\",\n            \"synopsis\": \"It was possible to obtain information about the dialects of SMB2 and SMB3 available on the remote host.\",\n            \"description\": \"Nessus was able to obtain the set of SMB2 and SMB3 dialects running on the remote host by sending an authentication request to port 139 or 445.\",\n            \"solution\": null,\n            \"severity\": 0,\n            \"cvssBaseScore\": null,\n            \"cvss3BaseScore\": null,\n            \"exploitAvailable\": false,\n            \"cve\": null,\n            \"riskLevel\": \"Very Low\",\n            \"vulnerabilityPublicationDate\": null,\n            \"patchPublicationDate\": null,\n            \"findingDate\": 1761955200000,\n            \"seeAlso\": [],\n            \"uniqueReferenceId\": \"5iTp_Jtp3QEdBI467q6gXFVCFCVgRCdpAJts6RpAhfqXp2OvrjHyYUCelLoVjd87BDDyO8pNbT37fh2TxEPSUf6eRkfJSAh0gawnagbmdFNHKDZS4o\",\n            \"warning\": false\n        },\n        {\n            \"id\": 1539317013,\n            \"assetId\": 1744759,\n            \"target\": \"fortifydata.es\",\n            \"pluginName\": \"Microsoft Windows SMB2 and SMB3 Dialects Supported (remote check)\",\n            \"pluginFamily\": \"Windows\",\n            \"synopsis\": \"It was possible to obtain information about the dialects of SMB2 and SMB3 available on the remote host.\",\n            \"description\": \"Nessus was able to obtain the set of SMB2 and SMB3 dialects running on the remote host by sending an authentication request to port 139 or 445.\",\n            \"solution\": null,\n            \"severity\": 0,\n            \"cvssBaseScore\": null,\n            \"cvss3BaseScore\": null,\n            \"exploitAvailable\": false,\n            \"cve\": null,\n            \"riskLevel\": \"Very Low\",\n            \"vulnerabilityPublicationDate\": null,\n            \"patchPublicationDate\": null,\n            \"findingDate\": 1761955200000,\n            \"seeAlso\": [],\n            \"uniqueReferenceId\": \"4RQ7WD5y83VidVz_Rx0eQhH11J9UbN0tBurTbVVUCK4ovTudUFWNNqMSpmJvbX0cSZHo8VFyes_4FezGOV_hB1lOvtz3hL3yz1IT5YWo1YqA0YaWg2QsMP\",\n            \"warning\": false\n        },\n        {\n            \"id\": 1539317023,\n            \"assetId\": 6917193,\n            \"target\": \"www.fortifydata.us\",\n            \"pluginName\": \"Microsoft Windows SMB2 and SMB3 Dialects Supported (remote check)\",\n            \"pluginFamily\": \"Windows\",\n            \"synopsis\": \"It was possible to obtain information about the dialects of SMB2 and SMB3 available on the remote host.\",\n            \"description\": \"Nessus was able to obtain the set of SMB2 and SMB3 dialects running on the remote host by sending an authentication request to port 139 or 445.\",\n            \"solution\": null,\n            \"severity\": 0,\n            \"cvssBaseScore\": null,\n            \"cvss3BaseScore\": null,\n            \"exploitAvailable\": false,\n            \"cve\": null,\n            \"riskLevel\": \"Very Low\",\n            \"vulnerabilityPublicationDate\": null,\n            \"patchPublicationDate\": null,\n            \"findingDate\": 1761955200000,\n            \"seeAlso\": [],\n            \"uniqueReferenceId\": \"5lXATQoWTuo7gFqdCr7P735gVWvqKPPQTnVK8TSxW1tZ1Vwkt7XLmcZ1ugXyUP9KDthbqledgFBSAcdL1TX8Njvp73y6eH5GxbJa0KwdrkdXDxSN9WASsU\",\n            \"warning\": false\n        },\n        {\n            \"id\": 1539317055,\n            \"assetId\": 7204,\n            \"target\": \"test.fortifydata.com\",\n            \"pluginName\": \"Microsoft Windows SMB2 and SMB3 Dialects Supported (remote check)\",\n            \"pluginFamily\": \"Windows\",\n            \"synopsis\": \"It was possible to obtain information about the dialects of SMB2 and SMB3 available on the remote host.\",\n            \"description\": \"Nessus was able to obtain the set of SMB2 and SMB3 dialects running on the remote host by sending an authentication request to port 139 or 445.\",\n            \"solution\": null,\n            \"severity\": 0,\n            \"cvssBaseScore\": null,\n            \"cvss3BaseScore\": null,\n            \"exploitAvailable\": false,\n            \"cve\": null,\n            \"riskLevel\": \"Very Low\",\n            \"vulnerabilityPublicationDate\": null,\n            \"patchPublicationDate\": null,\n            \"findingDate\": 1761955200000,\n            \"seeAlso\": [],\n            \"uniqueReferenceId\": \"573a7CcHyTmqPe3BJElUmHS4KuHbE4sdtNqPndMvtl9MgozfAHopnTsr2ztQHXDHXTRsu6QiGnyweAEza234m7vUCVMs3YkSnSayyyHab_PJfUxqg9\",\n            \"warning\": false\n        },\n        {\n            \"id\": 1539316383,\n            \"assetId\": 144,\n            \"target\": \"fortifydata.com\",\n            \"pluginName\": \"MySQL Server Detection\",\n            \"pluginFamily\": \"Databases\",\n            \"synopsis\": \"A database server is listening on the remote port.\",\n            \"description\": \"The remote host is running MySQL, an open source database server.\",\n            \"solution\": null,\n            \"severity\": 0,\n            \"cvssBaseScore\": null,\n            \"cvss3BaseScore\": null,\n            \"exploitAvailable\": false,\n            \"cve\": \"\",\n            \"riskLevel\": \"Very Low\",\n            \"vulnerabilityPublicationDate\": null,\n            \"patchPublicationDate\": null,\n            \"findingDate\": 1761955200000,\n            \"seeAlso\": [],\n            \"uniqueReferenceId\": \"tfGvsD1tiZdDNomSlNCl6TWeBPXR3XrhIkqiuJfrBdKGsvQ2U6QjR_WD\",\n            \"warning\": false\n        },\n        {\n            \"id\": 1539316171,\n            \"assetId\": 603644,\n            \"target\": \"status.fortifydata.com\",\n            \"pluginName\": \"SSL Certificate Information\",\n            \"pluginFamily\": \"General\",\n            \"synopsis\": \"This plugin displays the SSL certificate.\",\n            \"description\": \"This plugin connects to every SSL-related port and attempts to extract and dump the X.509 certificate.\",\n            \"solution\": null,\n            \"severity\": 0,\n            \"cvssBaseScore\": null,\n            \"cvss3BaseScore\": null,\n            \"exploitAvailable\": false,\n            \"cve\": null,\n            \"riskLevel\": \"Very Low\",\n            \"vulnerabilityPublicationDate\": null,\n            \"patchPublicationDate\": null,\n            \"findingDate\": 1761955200000,\n            \"seeAlso\": [],\n            \"uniqueReferenceId\": \"AxP6hGD75h9VJ7IFWoexTZa2jbhPSAZ43BNXuYO71FA5gWInh5P99Mv6A2u_9459\",\n            \"warning\": false\n        },\n        {\n            \"id\": 1539316213,\n            \"assetId\": 1815105,\n            \"target\": \"academy.fortifydata.com\",\n            \"pluginName\": \"SSL Certificate Information\",\n            \"pluginFamily\": \"General\",\n            \"synopsis\": \"This plugin displays the SSL certificate.\",\n            \"description\": \"This plugin connects to every SSL-related port and attempts to extract and dump the X.509 certificate.\",\n            \"solution\": null,\n            \"severity\": 0,\n            \"cvssBaseScore\": null,\n            \"cvss3BaseScore\": null,\n            \"exploitAvailable\": false,\n            \"cve\": null,\n            \"riskLevel\": \"Very Low\",\n            \"vulnerabilityPublicationDate\": null,\n            \"patchPublicationDate\": null,\n            \"findingDate\": 1761955200000,\n            \"seeAlso\": [],\n            \"uniqueReferenceId\": \"28RKgFBW0_Kyai_KWAtQ3AFTnaWBCydQT3vJUfaZOQ8CVCTnbXD6sD7wnDnLJHf0U1\",\n            \"warning\": false\n        },\n        {\n            \"id\": 1539316261,\n            \"assetId\": 10017408,\n            \"target\": \"dev.status.fortifydata.com\",\n            \"pluginName\": \"SSL Certificate Information\",\n            \"pluginFamily\": \"General\",\n            \"synopsis\": \"This plugin displays the SSL certificate.\",\n            \"description\": \"This plugin connects to every SSL-related port and attempts to extract and dump the X.509 certificate.\",\n            \"solution\": null,\n            \"severity\": 0,\n            \"cvssBaseScore\": null,\n            \"cvss3BaseScore\": null,\n            \"exploitAvailable\": false,\n            \"cve\": null,\n            \"riskLevel\": \"Very Low\",\n            \"vulnerabilityPublicationDate\": null,\n            \"patchPublicationDate\": null,\n            \"findingDate\": 1761955200000,\n            \"seeAlso\": [],\n            \"uniqueReferenceId\": \"8HDqrzQ60Ejr_0E7oRvZqLtL3SKwvtEVG74X3V1GfIOwY5WA5g_sRPvzQp93LTGB0VW\",\n            \"warning\": false\n        },\n        {\n            \"id\": 1539316374,\n            \"assetId\": 8126,\n            \"target\": \"api.eu.fortifydata.com\",\n            \"pluginName\": \"SSL Certificate Information\",\n            \"pluginFamily\": \"General\",\n            \"synopsis\": \"This plugin displays the SSL certificate.\",\n            \"description\": \"This plugin connects to every SSL-related port and attempts to extract and dump the X.509 certificate.\",\n            \"solution\": null,\n            \"severity\": 0,\n            \"cvssBaseScore\": null,\n            \"cvss3BaseScore\": null,\n            \"exploitAvailable\": false,\n            \"cve\": null,\n            \"riskLevel\": \"Very Low\",\n            \"vulnerabilityPublicationDate\": null,\n            \"patchPublicationDate\": null,\n            \"findingDate\": 1761955200000,\n            \"seeAlso\": [],\n            \"uniqueReferenceId\": \"2iz8BBnOnntfC__vi0aGO5UuSnwdpl81FILwaAsQFpEYKGMLYCgGXk4_Fqaeg6\",\n            \"warning\": false\n        },\n        {\n            \"id\": 1539316397,\n            \"assetId\": 144,\n            \"target\": \"fortifydata.com\",\n            \"pluginName\": \"SSL Certificate Information\",\n            \"pluginFamily\": \"General\",\n            \"synopsis\": \"This plugin displays the SSL certificate.\",\n            \"description\": \"This plugin connects to every SSL-related port and attempts to extract and dump the X.509 certificate.\",\n            \"solution\": null,\n            \"severity\": 0,\n            \"cvssBaseScore\": null,\n            \"cvss3BaseScore\": null,\n            \"exploitAvailable\": false,\n            \"cve\": null,\n            \"riskLevel\": \"Very Low\",\n            \"vulnerabilityPublicationDate\": null,\n            \"patchPublicationDate\": null,\n            \"findingDate\": 1761955200000,\n            \"seeAlso\": [],\n            \"uniqueReferenceId\": \"v9uyYnUBffEmwCRsq6fSA2VUSoDmznLaOUh0XLX_Ba_QB2qnsbNR8VgVoVnj\",\n            \"warning\": false\n        },\n        {\n            \"id\": 1539316446,\n            \"assetId\": 676,\n            \"target\": \"vpn.fortifydata.com\",\n            \"pluginName\": \"SSL Certificate Information\",\n            \"pluginFamily\": \"General\",\n            \"synopsis\": \"This plugin displays the SSL certificate.\",\n            \"description\": \"This plugin connects to every SSL-related port and attempts to extract and dump the X.509 certificate.\",\n            \"solution\": null,\n            \"severity\": 0,\n            \"cvssBaseScore\": null,\n            \"cvss3BaseScore\": null,\n            \"exploitAvailable\": false,\n            \"cve\": null,\n            \"riskLevel\": \"Very Low\",\n            \"vulnerabilityPublicationDate\": null,\n            \"patchPublicationDate\": null,\n            \"findingDate\": 1761955200000,\n            \"seeAlso\": [],\n            \"uniqueReferenceId\": \"yknMh2cqedR4PWc60N1gY0lZc2CBxyRS7L96KnV2u2CGF0cQ5Rw8M4PsUdGO\",\n            \"warning\": false\n        },\n        {\n            \"id\": 1539316616,\n            \"assetId\": 569262,\n            \"target\": \"scanner-9.fortifydata.com\",\n            \"pluginName\": \"SSL Certificate Information\",\n            \"pluginFamily\": \"General\",\n            \"synopsis\": \"This plugin displays the SSL certificate.\",\n            \"description\": \"This plugin connects to every SSL-related port and attempts to extract and dump the X.509 certificate.\",\n            \"solution\": null,\n            \"severity\": 0,\n            \"cvssBaseScore\": null,\n            \"cvss3BaseScore\": null,\n            \"exploitAvailable\": false,\n            \"cve\": null,\n            \"riskLevel\": \"Very Low\",\n            \"vulnerabilityPublicationDate\": null,\n            \"patchPublicationDate\": null,\n            \"findingDate\": 1761955200000,\n            \"seeAlso\": [],\n            \"uniqueReferenceId\": \"zTkXRDNpyuSa129rDw3DxRbNxrCF2qpUerdYUdAqv5xu10mj_zbpzEYD7jw1gqPs\",\n            \"warning\": false\n        },\n        {\n            \"id\": 1539317046,\n            \"assetId\": 11684693,\n            \"target\": \"app.us.fortifydata.com\",\n            \"pluginName\": \"SSL Certificate Information\",\n            \"pluginFamily\": \"General\",\n            \"synopsis\": \"This plugin displays the SSL certificate.\",\n            \"description\": \"This plugin connects to every SSL-related port and attempts to extract and dump the X.509 certificate.\",\n            \"solution\": null,\n            \"severity\": 0,\n            \"cvssBaseScore\": null,\n            \"cvss3BaseScore\": null,\n            \"exploitAvailable\": false,\n            \"cve\": null,\n            \"riskLevel\": \"Very Low\",\n            \"vulnerabilityPublicationDate\": null,\n            \"patchPublicationDate\": null,\n            \"findingDate\": 1761955200000,\n            \"seeAlso\": [],\n            \"uniqueReferenceId\": \"8HGe6Z8PF0NRdOCpW91l89UlRD0wgFmPNQ8J19rZ1FpWpqSNBW44y8PuusFyDku2OiS\",\n            \"warning\": false\n        },\n        {\n            \"id\": 1539317097,\n            \"assetId\": 11766647,\n            \"target\": \"app.fortifydata.cc\",\n            \"pluginName\": \"SSL Certificate Information\",\n            \"pluginFamily\": \"General\",\n            \"synopsis\": \"This plugin displays the SSL certificate.\",\n            \"description\": \"This plugin connects to every SSL-related port and attempts to extract and dump the X.509 certificate.\",\n            \"solution\": null,\n            \"severity\": 0,\n            \"cvssBaseScore\": null,\n            \"cvss3BaseScore\": null,\n            \"exploitAvailable\": false,\n            \"cve\": null,\n            \"riskLevel\": \"Very Low\",\n            \"vulnerabilityPublicationDate\": null,\n            \"patchPublicationDate\": null,\n            \"findingDate\": 1761955200000,\n            \"seeAlso\": [],\n            \"uniqueReferenceId\": \"8HGeN7r5Icf4YQdgnGDUZgWQxwmHb_iibNGlvjbUKEPvbnLcutspwAn3TFqEHvcLUFM\",\n            \"warning\": false\n        },\n        {\n            \"id\": 1539316392,\n            \"assetId\": 144,\n            \"target\": \"fortifydata.com\",\n            \"pluginName\": \"SSH Protocol Versions Supported\",\n            \"pluginFamily\": \"General\",\n            \"synopsis\": \"A SSH server is running on the remote host.\",\n            \"description\": \"This plugin determines the versions of the SSH protocol supported by the remote SSH daemon.\",\n            \"solution\": null,\n            \"severity\": 0,\n            \"cvssBaseScore\": null,\n            \"cvss3BaseScore\": null,\n            \"exploitAvailable\": false,\n            \"cve\": null,\n            \"riskLevel\": \"Very Low\",\n            \"vulnerabilityPublicationDate\": null,\n            \"patchPublicationDate\": null,\n            \"findingDate\": 1761955200000,\n            \"seeAlso\": [],\n            \"uniqueReferenceId\": \"28P2Thh0ThRwTdym72iTBp9yhF2DSGr0Tg1N5vsuDrH0lFK7eVFjQuwKgv0wvj_7lZ\",\n            \"warning\": false\n        },\n        {\n            \"id\": 1539316613,\n            \"assetId\": 569262,\n            \"target\": \"scanner-9.fortifydata.com\",\n            \"pluginName\": \"SSH Protocol Versions Supported\",\n            \"pluginFamily\": \"General\",\n            \"synopsis\": \"A SSH server is running on the remote host.\",\n            \"description\": \"This plugin determines the versions of the SSH protocol supported by the remote SSH daemon.\",\n            \"solution\": null,\n            \"severity\": 0,\n            \"cvssBaseScore\": null,\n            \"cvss3BaseScore\": null,\n            \"exploitAvailable\": false,\n            \"cve\": null,\n            \"riskLevel\": \"Very Low\",\n            \"vulnerabilityPublicationDate\": null,\n            \"patchPublicationDate\": null,\n            \"findingDate\": 1761955200000,\n            \"seeAlso\": [],\n            \"uniqueReferenceId\": \"2th2ygHZXLxzzOdD_QJZJDsg40u_kE3LD75Wg6vjWSZOlyJiFUPxIoKGlOi3KmeZmokP_y\",\n            \"warning\": false\n        },\n        {\n            \"id\": 1539316140,\n            \"assetId\": 603644,\n            \"target\": \"status.fortifydata.com\",\n            \"pluginName\": \"Open Port Re-check\",\n            \"pluginFamily\": \"General\",\n            \"synopsis\": \"Previously open ports are now closed.\",\n            \"description\": \"One of several ports that were previously open are now closed or unresponsive.\\n\\nThere are several possible reasons for this :\\n\\n  - The scan may have caused a service to freeze or stop     running.\\n\\n  - An administrator may have stopped a particular service     during the scanning process.\\n\\nThis might be an availability problem related to the following :\\n\\n  - A network outage has been experienced during the scan,     and the remote network cannot be reached anymore by the     scanner.\\n\\n  - This scanner may has been blacklisted by the system     administrator or by an automatic intrusion detection /     prevention system that detected the scan.\\n\\n  - The remote host is now down, either because a user     turned it off during the scan or because a select denial     of service was effective.\\n\\nIn any case, the audit of the remote host might be incomplete and may need to be done again.\",\n            \"solution\": \"Steps to resolve this issue include :\\n\\n- Increase checks_read_timeout and/or reduce max_checks.\\n\\n- Disable any IPS during the Nessus scan\",\n            \"severity\": 0,\n            \"cvssBaseScore\": null,\n            \"cvss3BaseScore\": null,\n            \"exploitAvailable\": false,\n            \"cve\": \"\",\n            \"riskLevel\": \"Very Low\",\n            \"vulnerabilityPublicationDate\": null,\n            \"patchPublicationDate\": null,\n            \"findingDate\": 1761955200000,\n            \"seeAlso\": [],\n            \"uniqueReferenceId\": \"ufs59FafDH51UKMUUgVa__UJxaJyb_SykJXfgZ0lsgnLiR6GaWhP\",\n            \"warning\": false\n        },\n        {\n            \"id\": 1539316248,\n            \"assetId\": 10017408,\n            \"target\": \"dev.status.fortifydata.com\",\n            \"pluginName\": \"Open Port Re-check\",\n            \"pluginFamily\": \"General\",\n            \"synopsis\": \"Previously open ports are now closed.\",\n            \"description\": \"One of several ports that were previously open are now closed or unresponsive.\\n\\nThere are several possible reasons for this :\\n\\n  - The scan may have caused a service to freeze or stop     running.\\n\\n  - An administrator may have stopped a particular service     during the scanning process.\\n\\nThis might be an availability problem related to the following :\\n\\n  - A network outage has been experienced during the scan,     and the remote network cannot be reached anymore by the     scanner.\\n\\n  - This scanner may has been blacklisted by the system     administrator or by an automatic intrusion detection /     prevention system that detected the scan.\\n\\n  - The remote host is now down, either because a user     turned it off during the scan or because a select denial     of service was effective.\\n\\nIn any case, the audit of the remote host might be incomplete and may need to be done again.\",\n            \"solution\": \"Steps to resolve this issue include :\\n\\n- Increase checks_read_timeout and/or reduce max_checks.\\n\\n- Disable any IPS during the Nessus scan\",\n            \"severity\": 0,\n            \"cvssBaseScore\": null,\n            \"cvss3BaseScore\": null,\n            \"exploitAvailable\": false,\n            \"cve\": \"\",\n            \"riskLevel\": \"Very Low\",\n            \"vulnerabilityPublicationDate\": null,\n            \"patchPublicationDate\": null,\n            \"findingDate\": 1761955200000,\n            \"seeAlso\": [],\n            \"uniqueReferenceId\": \"7ckykTbWLq7K1OWCDTv7PgIvvVFWVUqeStg7yrQ0eZu_Z6orahRsuNB\",\n            \"warning\": false\n        },\n        {\n            \"id\": 1539316339,\n            \"assetId\": 8126,\n            \"target\": \"api.eu.fortifydata.com\",\n            \"pluginName\": \"Open Port Re-check\",\n            \"pluginFamily\": \"General\",\n            \"synopsis\": \"Previously open ports are now closed.\",\n            \"description\": \"One of several ports that were previously open are now closed or unresponsive.\\n\\nThere are several possible reasons for this :\\n\\n  - The scan may have caused a service to freeze or stop     running.\\n\\n  - An administrator may have stopped a particular service     during the scanning process.\\n\\nThis might be an availability problem related to the following :\\n\\n  - A network outage has been experienced during the scan,     and the remote network cannot be reached anymore by the     scanner.\\n\\n  - This scanner may has been blacklisted by the system     administrator or by an automatic intrusion detection /     prevention system that detected the scan.\\n\\n  - The remote host is now down, either because a user     turned it off during the scan or because a select denial     of service was effective.\\n\\nIn any case, the audit of the remote host might be incomplete and may need to be done again.\",\n            \"solution\": \"Steps to resolve this issue include :\\n\\n- Increase checks_read_timeout and/or reduce max_checks.\\n\\n- Disable any IPS during the Nessus scan\",\n            \"severity\": 0,\n            \"cvssBaseScore\": null,\n            \"cvss3BaseScore\": null,\n            \"exploitAvailable\": false,\n            \"cve\": \"\",\n            \"riskLevel\": \"Very Low\",\n            \"vulnerabilityPublicationDate\": null,\n            \"patchPublicationDate\": null,\n            \"findingDate\": 1761955200000,\n            \"seeAlso\": [],\n            \"uniqueReferenceId\": \"1UFVxWN9HdrE7RHJR3Xv4xu0BP9uWtze65NWSwiDCVUi5c9i1M\",\n            \"warning\": false\n        },\n        {\n            \"id\": 1539316520,\n            \"assetId\": 1744758,\n            \"target\": \"fortifydata.co.uk\",\n            \"pluginName\": \"Open Port Re-check\",\n            \"pluginFamily\": \"General\",\n            \"synopsis\": \"Previously open ports are now closed.\",\n            \"description\": \"One of several ports that were previously open are now closed or unresponsive.\\n\\nThere are several possible reasons for this :\\n\\n  - The scan may have caused a service to freeze or stop     running.\\n\\n  - An administrator may have stopped a particular service     during the scanning process.\\n\\nThis might be an availability problem related to the following :\\n\\n  - A network outage has been experienced during the scan,     and the remote network cannot be reached anymore by the     scanner.\\n\\n  - This scanner may has been blacklisted by the system     administrator or by an automatic intrusion detection /     prevention system that detected the scan.\\n\\n  - The remote host is now down, either because a user     turned it off during the scan or because a select denial     of service was effective.\\n\\nIn any case, the audit of the remote host might be incomplete and may need to be done again.\",\n            \"solution\": \"Steps to resolve this issue include :\\n\\n- Increase checks_read_timeout and/or reduce max_checks.\\n\\n- Disable any IPS during the Nessus scan\",\n            \"severity\": 0,\n            \"cvssBaseScore\": null,\n            \"cvss3BaseScore\": null,\n            \"exploitAvailable\": false,\n            \"cve\": \"\",\n            \"riskLevel\": \"Very Low\",\n            \"vulnerabilityPublicationDate\": null,\n            \"patchPublicationDate\": null,\n            \"findingDate\": 1761955200000,\n            \"seeAlso\": [],\n            \"uniqueReferenceId\": \"1MDfcLbsG53sdMjBGFP4LgYF77eJe61l74XMxlTqPgjJ_Vnyqz32_v\",\n            \"warning\": false\n        },\n        {\n            \"id\": 1539316566,\n            \"assetId\": 5661407,\n            \"target\": \"www.fortifydata.co.uk\",\n            \"pluginName\": \"Open Port Re-check\",\n            \"pluginFamily\": \"General\",\n            \"synopsis\": \"Previously open ports are now closed.\",\n            \"description\": \"One of several ports that were previously open are now closed or unresponsive.\\n\\nThere are several possible reasons for this :\\n\\n  - The scan may have caused a service to freeze or stop     running.\\n\\n  - An administrator may have stopped a particular service     during the scanning process.\\n\\nThis might be an availability problem related to the following :\\n\\n  - A network outage has been experienced during the scan,     and the remote network cannot be reached anymore by the     scanner.\\n\\n  - This scanner may has been blacklisted by the system     administrator or by an automatic intrusion detection /     prevention system that detected the scan.\\n\\n  - The remote host is now down, either because a user     turned it off during the scan or because a select denial     of service was effective.\\n\\nIn any case, the audit of the remote host might be incomplete and may need to be done again.\",\n            \"solution\": \"Steps to resolve this issue include :\\n\\n- Increase checks_read_timeout and/or reduce max_checks.\\n\\n- Disable any IPS during the Nessus scan\",\n            \"severity\": 0,\n            \"cvssBaseScore\": null,\n            \"cvss3BaseScore\": null,\n            \"exploitAvailable\": false,\n            \"cve\": \"\",\n            \"riskLevel\": \"Very Low\",\n            \"vulnerabilityPublicationDate\": null,\n            \"patchPublicationDate\": null,\n            \"findingDate\": 1761955200000,\n            \"seeAlso\": [],\n            \"uniqueReferenceId\": \"1VHeFKtsMZ9FbF4W64WbpV9eDSOYASvfhLNpu7JMGZAMaemGM6Q_ui\",\n            \"warning\": false\n        },\n        {\n            \"id\": 1539316622,\n            \"assetId\": 5661408,\n            \"target\": \"www.fortifydata.es\",\n            \"pluginName\": \"Open Port Re-check\",\n            \"pluginFamily\": \"General\",\n            \"synopsis\": \"Previously open ports are now closed.\",\n            \"description\": \"One of several ports that were previously open are now closed or unresponsive.\\n\\nThere are several possible reasons for this :\\n\\n  - The scan may have caused a service to freeze or stop     running.\\n\\n  - An administrator may have stopped a particular service     during the scanning process.\\n\\nThis might be an availability problem related to the following :\\n\\n  - A network outage has been experienced during the scan,     and the remote network cannot be reached anymore by the     scanner.\\n\\n  - This scanner may has been blacklisted by the system     administrator or by an automatic intrusion detection /     prevention system that detected the scan.\\n\\n  - The remote host is now down, either because a user     turned it off during the scan or because a select denial     of service was effective.\\n\\nIn any case, the audit of the remote host might be incomplete and may need to be done again.\",\n            \"solution\": \"Steps to resolve this issue include :\\n\\n- Increase checks_read_timeout and/or reduce max_checks.\\n\\n- Disable any IPS during the Nessus scan\",\n            \"severity\": 0,\n            \"cvssBaseScore\": null,\n            \"cvss3BaseScore\": null,\n            \"exploitAvailable\": false,\n            \"cve\": \"\",\n            \"riskLevel\": \"Very Low\",\n            \"vulnerabilityPublicationDate\": null,\n            \"patchPublicationDate\": null,\n            \"findingDate\": 1761955200000,\n            \"seeAlso\": [],\n            \"uniqueReferenceId\": \"1VHeFKtsN09DrV6M5pXHc813dU9DaQGpGiEZrXY2Dp18iOfifej1bj\",\n            \"warning\": false\n        },\n        {\n            \"id\": 1539316366,\n            \"assetId\": 8126,\n            \"target\": \"api.eu.fortifydata.com\",\n            \"pluginName\": \"DNS Server Detection\",\n            \"pluginFamily\": \"DNS\",\n            \"synopsis\": \"A DNS server is listening on the remote host.\",\n            \"description\": \"The remote service is a Domain Name System (DNS) server, which provides a mapping between hostnames and IP addresses.\",\n            \"solution\": \"Disable this service if it is not needed or restrict access to internal hosts only if the service is available externally.\",\n            \"severity\": 0,\n            \"cvssBaseScore\": null,\n            \"cvss3BaseScore\": null,\n            \"exploitAvailable\": false,\n            \"cve\": null,\n            \"riskLevel\": \"Very Low\",\n            \"vulnerabilityPublicationDate\": null,\n            \"patchPublicationDate\": null,\n            \"findingDate\": 1761955200000,\n            \"seeAlso\": [\n                \"https://en.wikipedia.org/wiki/Domain_Name_System\"\n            ],\n            \"uniqueReferenceId\": \"7fA4Y3_vdQmgrRaJvPCuOxZGx31KpeVlEkFtOXQLBFHpRaQ\",\n            \"warning\": false\n        },\n        {\n            \"id\": 1539316287,\n            \"assetId\": 1744760,\n            \"target\": \"fortifydata.io\",\n            \"pluginName\": \"Service Detection (HELP Request)\",\n            \"pluginFamily\": \"Service detection\",\n            \"synopsis\": \"The remote service could be identified.\",\n            \"description\": \"It was possible to identify the remote service by its banner or by looking at the error message it sends when it receives a 'HELP' request.\",\n            \"solution\": null,\n            \"severity\": 0,\n            \"cvssBaseScore\": null,\n            \"cvss3BaseScore\": null,\n            \"exploitAvailable\": false,\n            \"cve\": null,\n            \"riskLevel\": \"Very Low\",\n            \"vulnerabilityPublicationDate\": null,\n            \"patchPublicationDate\": null,\n            \"findingDate\": 1761955200000,\n            \"seeAlso\": [],\n            \"uniqueReferenceId\": \"2WM404dY1Fnd5ebQPwZcdNUobURGGff3CNYRJYC3EjVEdDXkctTuJf7j4V1pKEGRhaMfyWZZVuKrkmkCPiyYu_\",\n            \"warning\": false\n        },\n        {\n            \"id\": 1539316300,\n            \"assetId\": 1744761,\n            \"target\": \"fortifydata.us\",\n            \"pluginName\": \"Service Detection (HELP Request)\",\n            \"pluginFamily\": \"Service detection\",\n            \"synopsis\": \"The remote service could be identified.\",\n            \"description\": \"It was possible to identify the remote service by its banner or by looking at the error message it sends when it receives a 'HELP' request.\",\n            \"solution\": null,\n            \"severity\": 0,\n            \"cvssBaseScore\": null,\n            \"cvss3BaseScore\": null,\n            \"exploitAvailable\": false,\n            \"cve\": null,\n            \"riskLevel\": \"Very Low\",\n            \"vulnerabilityPublicationDate\": null,\n            \"patchPublicationDate\": null,\n            \"findingDate\": 1761955200000,\n            \"seeAlso\": [],\n            \"uniqueReferenceId\": \"2WM404dY1IGJwkK19UwJ0JcB2Y7iFAntZqmncjri3trlhLXMQ9HYLWzTG7XXmFEe4eIkidA8Gk_3NiYrMI9dI0\",\n            \"warning\": false\n        },\n        {\n            \"id\": 1539316301,\n            \"assetId\": 140,\n            \"target\": \"app.fortifydata.com\",\n            \"pluginName\": \"Service Detection (HELP Request)\",\n            \"pluginFamily\": \"Service detection\",\n            \"synopsis\": \"The remote service could be identified.\",\n            \"description\": \"It was possible to identify the remote service by its banner or by looking at the error message it sends when it receives a 'HELP' request.\",\n            \"solution\": null,\n            \"severity\": 0,\n            \"cvssBaseScore\": null,\n            \"cvss3BaseScore\": null,\n            \"exploitAvailable\": false,\n            \"cve\": null,\n            \"riskLevel\": \"Very Low\",\n            \"vulnerabilityPublicationDate\": null,\n            \"patchPublicationDate\": null,\n            \"findingDate\": 1761955200000,\n            \"seeAlso\": [],\n            \"uniqueReferenceId\": \"GH1mUnWf2_uGZfiOpy8N0uvHL6zkW6hLnQPHYDLsC8SPMKXA_Jz5kBvPVKSFuHeC3qJ4gbV36JIFrylt\",\n            \"warning\": false\n        },\n        {\n            \"id\": 1539316317,\n            \"assetId\": 1005,\n            \"target\": \"eu.fortifydata.com\",\n            \"pluginName\": \"Service Detection (HELP Request)\",\n            \"pluginFamily\": \"Service detection\",\n            \"synopsis\": \"The remote service could be identified.\",\n            \"description\": \"It was possible to identify the remote service by its banner or by looking at the error message it sends when it receives a 'HELP' request.\",\n            \"solution\": null,\n            \"severity\": 0,\n            \"cvssBaseScore\": null,\n            \"cvss3BaseScore\": null,\n            \"exploitAvailable\": false,\n            \"cve\": null,\n            \"riskLevel\": \"Very Low\",\n            \"vulnerabilityPublicationDate\": null,\n            \"patchPublicationDate\": null,\n            \"findingDate\": 1761955200000,\n            \"seeAlso\": [],\n            \"uniqueReferenceId\": \"2LolUTrpuG2ZsnI0uIVrOnMuGc3O0dNptrWjVmnJXpmP1rCGT02FvWRzMP0w0n4SfmUvKWEqtyedSV4ceP\",\n            \"warning\": false\n        },\n        {\n            \"id\": 1539316328,\n            \"assetId\": 5661409,\n            \"target\": \"www.fortifydata.io\",\n            \"pluginName\": \"Service Detection (HELP Request)\",\n            \"pluginFamily\": \"Service detection\",\n            \"synopsis\": \"The remote service could be identified.\",\n            \"description\": \"It was possible to identify the remote service by its banner or by looking at the error message it sends when it receives a 'HELP' request.\",\n            \"solution\": null,\n            \"severity\": 0,\n            \"cvssBaseScore\": null,\n            \"cvss3BaseScore\": null,\n            \"exploitAvailable\": false,\n            \"cve\": null,\n            \"riskLevel\": \"Very Low\",\n            \"vulnerabilityPublicationDate\": null,\n            \"patchPublicationDate\": null,\n            \"findingDate\": 1761955200000,\n            \"seeAlso\": [],\n            \"uniqueReferenceId\": \"3aMc8PjmvlpxgDTDQkto6scl71TCw_ljIPfo8EOylthJ3xtubeyhsW6doLVleXA32EgR7Uvu6I2afHBSMJ1VyT\",\n            \"warning\": false\n        },\n        {\n            \"id\": 1539316533,\n            \"assetId\": 454,\n            \"target\": \"demo.fortifydata.com\",\n            \"pluginName\": \"Service Detection (HELP Request)\",\n            \"pluginFamily\": \"Service detection\",\n            \"synopsis\": \"The remote service could be identified.\",\n            \"description\": \"It was possible to identify the remote service by its banner or by looking at the error message it sends when it receives a 'HELP' request.\",\n            \"solution\": null,\n            \"severity\": 0,\n            \"cvssBaseScore\": null,\n            \"cvss3BaseScore\": null,\n            \"exploitAvailable\": false,\n            \"cve\": null,\n            \"riskLevel\": \"Very Low\",\n            \"vulnerabilityPublicationDate\": null,\n            \"patchPublicationDate\": null,\n            \"findingDate\": 1761955200000,\n            \"seeAlso\": [],\n            \"uniqueReferenceId\": \"Jib_ndrXIXaoL3RV4g1MabSWjsS_CaP2Cq5E7su6HckugQ5sQXl_s8IEvmDxMLBF1CGgQEDS0ipUcnvm\",\n            \"warning\": false\n        },\n        {\n            \"id\": 1539316396,\n            \"assetId\": 144,\n            \"target\": \"fortifydata.com\",\n            \"pluginName\": \"IMAP Service Banner Retrieval\",\n            \"pluginFamily\": \"Service detection\",\n            \"synopsis\": \"An IMAP server is running on the remote host.\",\n            \"description\": \"An IMAP (Internet Message Access Protocol) server is installed and running on the remote host.\",\n            \"solution\": null,\n            \"severity\": 0,\n            \"cvssBaseScore\": null,\n            \"cvss3BaseScore\": null,\n            \"exploitAvailable\": false,\n            \"cve\": null,\n            \"riskLevel\": \"Very Low\",\n            \"vulnerabilityPublicationDate\": null,\n            \"patchPublicationDate\": null,\n            \"findingDate\": 1761955200000,\n            \"seeAlso\": [],\n            \"uniqueReferenceId\": \"E4S7y_2gvjlD7qCDU0hYL4PdT8J6rbaIgnrVRcWeATXzpBrTqvPKkfjcGXTooxUXkzUoGkWiF6l1\",\n            \"warning\": false\n        },\n        {\n            \"id\": 1539316062,\n            \"assetId\": 10017409,\n            \"target\": \"info.fortifydata.com\",\n            \"pluginName\": \"OS Identification\",\n            \"pluginFamily\": \"General\",\n            \"synopsis\": \"It is possible to guess the remote operating system.\",\n            \"description\": \"Using a combination of remote probes (e.g., TCP/IP, SMB, HTTP, NTP, SNMP, etc.), it is possible to guess the name of the remote operating system in use. It is also possible sometimes to guess the version of the operating system.\",\n            \"solution\": null,\n            \"severity\": 0,\n            \"cvssBaseScore\": null,\n            \"cvss3BaseScore\": null,\n            \"exploitAvailable\": false,\n            \"cve\": null,\n            \"riskLevel\": \"Very Low\",\n            \"vulnerabilityPublicationDate\": null,\n            \"patchPublicationDate\": null,\n            \"findingDate\": 1761955200000,\n            \"seeAlso\": [],\n            \"uniqueReferenceId\": \"1MzkvYAUy3ZsNZkOozYfZogHA362RbLIlqftEB2U7lTJc_AImtSLr6\",\n            \"warning\": false\n        },\n        {\n            \"id\": 1539316131,\n            \"assetId\": 27969,\n            \"target\": \"scanner-3.fortifydata.com\",\n            \"pluginName\": \"OS Identification\",\n            \"pluginFamily\": \"General\",\n            \"synopsis\": \"It is possible to guess the remote operating system.\",\n            \"description\": \"Using a combination of remote probes (e.g., TCP/IP, SMB, HTTP, NTP, SNMP, etc.), it is possible to guess the name of the remote operating system in use. It is also possible sometimes to guess the version of the operating system.\",\n            \"solution\": null,\n            \"severity\": 0,\n            \"cvssBaseScore\": null,\n            \"cvss3BaseScore\": null,\n            \"exploitAvailable\": false,\n            \"cve\": null,\n            \"riskLevel\": \"Very Low\",\n            \"vulnerabilityPublicationDate\": null,\n            \"patchPublicationDate\": null,\n            \"findingDate\": 1761955200000,\n            \"seeAlso\": [],\n            \"uniqueReferenceId\": \"1HX5Vddnaf3MSjDiefI_gvlZoYG4Qhp_unsyHvYdZLkXxc9_7w\",\n            \"warning\": false\n        },\n        {\n            \"id\": 1539316163,\n            \"assetId\": 603644,\n            \"target\": \"status.fortifydata.com\",\n            \"pluginName\": \"OS Identification\",\n            \"pluginFamily\": \"General\",\n            \"synopsis\": \"It is possible to guess the remote operating system.\",\n            \"description\": \"Using a combination of remote probes (e.g., TCP/IP, SMB, HTTP, NTP, SNMP, etc.), it is possible to guess the name of the remote operating system in use. It is also possible sometimes to guess the version of the operating system.\",\n            \"solution\": null,\n            \"severity\": 0,\n            \"cvssBaseScore\": null,\n            \"cvss3BaseScore\": null,\n            \"exploitAvailable\": false,\n            \"cve\": null,\n            \"riskLevel\": \"Very Low\",\n            \"vulnerabilityPublicationDate\": null,\n            \"patchPublicationDate\": null,\n            \"findingDate\": 1761955200000,\n            \"seeAlso\": [],\n            \"uniqueReferenceId\": \"7rVRHejLa0LLHk7qY_Q8ucMojZ7CyfgQtyzIZU5_Cyc5cDxZIAp\",\n            \"warning\": false\n        },\n        {\n            \"id\": 1539316164,\n            \"assetId\": 11989498,\n            \"target\": \"m.fortifydata.cc\",\n            \"pluginName\": \"OS Identification\",\n            \"pluginFamily\": \"General\",\n            \"synopsis\": \"It is possible to guess the remote operating system.\",\n            \"description\": \"Using a combination of remote probes (e.g., TCP/IP, SMB, HTTP, NTP, SNMP, etc.), it is possible to guess the name of the remote operating system in use. It is also possible sometimes to guess the version of the operating system.\",\n            \"solution\": null,\n            \"severity\": 0,\n            \"cvssBaseScore\": null,\n            \"cvss3BaseScore\": null,\n            \"exploitAvailable\": false,\n            \"cve\": null,\n            \"riskLevel\": \"Very Low\",\n            \"vulnerabilityPublicationDate\": null,\n            \"patchPublicationDate\": null,\n            \"findingDate\": 1761955200000,\n            \"seeAlso\": [],\n            \"uniqueReferenceId\": \"1MzUVnHuD47qlfcUxjb_W5m2CEfXwJFlqbnTpg6Myt_DB1JcbtZqtr\",\n            \"warning\": false\n        },\n        {\n            \"id\": 1539316202,\n            \"assetId\": 1815105,\n            \"target\": \"academy.fortifydata.com\",\n            \"pluginName\": \"OS Identification\",\n            \"pluginFamily\": \"General\",\n            \"synopsis\": \"It is possible to guess the remote operating system.\",\n            \"description\": \"Using a combination of remote probes (e.g., TCP/IP, SMB, HTTP, NTP, SNMP, etc.), it is possible to guess the name of the remote operating system in use. It is also possible sometimes to guess the version of the operating system.\",\n            \"solution\": null,\n            \"severity\": 0,\n            \"cvssBaseScore\": null,\n            \"cvss3BaseScore\": null,\n            \"exploitAvailable\": false,\n            \"cve\": null,\n            \"riskLevel\": \"Very Low\",\n            \"vulnerabilityPublicationDate\": null,\n            \"patchPublicationDate\": null,\n            \"findingDate\": 1761955200000,\n            \"seeAlso\": [],\n            \"uniqueReferenceId\": \"rtJM15a6elxJ7aSCu2aAUt3d6zbqyOvJjRjWdvzQiC2IMsbDeGXn\",\n            \"warning\": false\n        },\n        {\n            \"id\": 1539316257,\n            \"assetId\": 10017408,\n            \"target\": \"dev.status.fortifydata.com\",\n            \"pluginName\": \"OS Identification\",\n            \"pluginFamily\": \"General\",\n            \"synopsis\": \"It is possible to guess the remote operating system.\",\n            \"description\": \"Using a combination of remote probes (e.g., TCP/IP, SMB, HTTP, NTP, SNMP, etc.), it is possible to guess the name of the remote operating system in use. It is also possible sometimes to guess the version of the operating system.\",\n            \"solution\": null,\n            \"severity\": 0,\n            \"cvssBaseScore\": null,\n            \"cvss3BaseScore\": null,\n            \"exploitAvailable\": false,\n            \"cve\": null,\n            \"riskLevel\": \"Very Low\",\n            \"vulnerabilityPublicationDate\": null,\n            \"patchPublicationDate\": null,\n            \"findingDate\": 1761955200000,\n            \"seeAlso\": [],\n            \"uniqueReferenceId\": \"1MzkvYAUy3YYNVkNX1G2jRvfjVeA9utsj6GkEBAyElicTi9aKtQVLR\",\n            \"warning\": false\n        },\n        {\n            \"id\": 1539316286,\n            \"assetId\": 1744760,\n            \"target\": \"fortifydata.io\",\n            \"pluginName\": \"OS Identification\",\n            \"pluginFamily\": \"General\",\n            \"synopsis\": \"It is possible to guess the remote operating system.\",\n            \"description\": \"Using a combination of remote probes (e.g., TCP/IP, SMB, HTTP, NTP, SNMP, etc.), it is possible to guess the name of the remote operating system in use. It is also possible sometimes to guess the version of the operating system.\",\n            \"solution\": null,\n            \"severity\": 0,\n            \"cvssBaseScore\": null,\n            \"cvss3BaseScore\": null,\n            \"exploitAvailable\": false,\n            \"cve\": null,\n            \"riskLevel\": \"Very Low\",\n            \"vulnerabilityPublicationDate\": null,\n            \"patchPublicationDate\": null,\n            \"findingDate\": 1761955200000,\n            \"seeAlso\": [],\n            \"uniqueReferenceId\": \"rtBdek2UQE_OGbWAm0rxRsFyxaGVVc9zKVLD5jmjwZP0SqcWF4qj\",\n            \"warning\": false\n        },\n        {\n            \"id\": 1539316298,\n            \"assetId\": 1744761,\n            \"target\": \"fortifydata.us\",\n            \"pluginName\": \"OS Identification\",\n            \"pluginFamily\": \"General\",\n            \"synopsis\": \"It is possible to guess the remote operating system.\",\n            \"description\": \"Using a combination of remote probes (e.g., TCP/IP, SMB, HTTP, NTP, SNMP, etc.), it is possible to guess the name of the remote operating system in use. It is also possible sometimes to guess the version of the operating system.\",\n            \"solution\": null,\n            \"severity\": 0,\n            \"cvssBaseScore\": null,\n            \"cvss3BaseScore\": null,\n            \"exploitAvailable\": false,\n            \"cve\": null,\n            \"riskLevel\": \"Very Low\",\n            \"vulnerabilityPublicationDate\": null,\n            \"patchPublicationDate\": null,\n            \"findingDate\": 1761955200000,\n            \"seeAlso\": [],\n            \"uniqueReferenceId\": \"rtBdek2UR8_SGco7Ee64CUVHoEnDcsbTk3LCyEQk7v8JiXPWGV5z\",\n            \"warning\": false\n        },\n        {\n            \"id\": 1539316299,\n            \"assetId\": 140,\n            \"target\": \"app.fortifydata.com\",\n            \"pluginName\": \"OS Identification\",\n            \"pluginFamily\": \"General\",\n            \"synopsis\": \"It is possible to guess the remote operating system.\",\n            \"description\": \"Using a combination of remote probes (e.g., TCP/IP, SMB, HTTP, NTP, SNMP, etc.), it is possible to guess the name of the remote operating system in use. It is also possible sometimes to guess the version of the operating system.\",\n            \"solution\": null,\n            \"severity\": 0,\n            \"cvssBaseScore\": null,\n            \"cvss3BaseScore\": null,\n            \"exploitAvailable\": false,\n            \"cve\": null,\n            \"riskLevel\": \"Very Low\",\n            \"vulnerabilityPublicationDate\": null,\n            \"patchPublicationDate\": null,\n            \"findingDate\": 1761955200000,\n            \"seeAlso\": [],\n            \"uniqueReferenceId\": \"6lNRwr6Yb5CFZG1Y3VXERv8iREBA49aD4wAKsFKZPbTq_XW\",\n            \"warning\": false\n        },\n        {\n            \"id\": 1539316316,\n            \"assetId\": 1005,\n            \"target\": \"eu.fortifydata.com\",\n            \"pluginName\": \"OS Identification\",\n            \"pluginFamily\": \"General\",\n            \"synopsis\": \"It is possible to guess the remote operating system.\",\n            \"description\": \"Using a combination of remote probes (e.g., TCP/IP, SMB, HTTP, NTP, SNMP, etc.), it is possible to guess the name of the remote operating system in use. It is also possible sometimes to guess the version of the operating system.\",\n            \"solution\": null,\n            \"severity\": 0,\n            \"cvssBaseScore\": null,\n            \"cvss3BaseScore\": null,\n            \"exploitAvailable\": false,\n            \"cve\": null,\n            \"riskLevel\": \"Very Low\",\n            \"vulnerabilityPublicationDate\": null,\n            \"patchPublicationDate\": null,\n            \"findingDate\": 1761955200000,\n            \"seeAlso\": [],\n            \"uniqueReferenceId\": \"pN23Awu_P_O992Lrqx7sgB2FyHVCsPwvMyCyPhIFbZIx2giw\",\n            \"warning\": false\n        },\n        {\n            \"id\": 1539316327,\n            \"assetId\": 5661409,\n            \"target\": \"www.fortifydata.io\",\n            \"pluginName\": \"OS Identification\",\n            \"pluginFamily\": \"General\",\n            \"synopsis\": \"It is possible to guess the remote operating system.\",\n            \"description\": \"Using a combination of remote probes (e.g., TCP/IP, SMB, HTTP, NTP, SNMP, etc.), it is possible to guess the name of the remote operating system in use. It is also possible sometimes to guess the version of the operating system.\",\n            \"solution\": null,\n            \"severity\": 0,\n            \"cvssBaseScore\": null,\n            \"cvss3BaseScore\": null,\n            \"exploitAvailable\": false,\n            \"cve\": null,\n            \"riskLevel\": \"Very Low\",\n            \"vulnerabilityPublicationDate\": null,\n            \"patchPublicationDate\": null,\n            \"findingDate\": 1761955200000,\n            \"seeAlso\": [],\n            \"uniqueReferenceId\": \"tI6OTf7PHm37W58STNaqQg93p315dC4KbVjGfr1RmKZ1UBfPCYRx\",\n            \"warning\": false\n        },\n        {\n            \"id\": 1539316362,\n            \"assetId\": 8126,\n            \"target\": \"api.eu.fortifydata.com\",\n            \"pluginName\": \"OS Identification\",\n            \"pluginFamily\": \"General\",\n            \"synopsis\": \"It is possible to guess the remote operating system.\",\n            \"description\": \"Using a combination of remote probes (e.g., TCP/IP, SMB, HTTP, NTP, SNMP, etc.), it is possible to guess the name of the remote operating system in use. It is also possible sometimes to guess the version of the operating system.\",\n            \"solution\": null,\n            \"severity\": 0,\n            \"cvssBaseScore\": null,\n            \"cvss3BaseScore\": null,\n            \"exploitAvailable\": false,\n            \"cve\": null,\n            \"riskLevel\": \"Very Low\",\n            \"vulnerabilityPublicationDate\": null,\n            \"patchPublicationDate\": null,\n            \"findingDate\": 1761955200000,\n            \"seeAlso\": [],\n            \"uniqueReferenceId\": \"tshC84dXSdM0MAg3nZ5qWwePZquNyjQ4VFIfDWPeARlzQm1E\",\n            \"warning\": false\n        },\n        {\n            \"id\": 1539316388,\n            \"assetId\": 144,\n            \"target\": \"fortifydata.com\",\n            \"pluginName\": \"OS Identification\",\n            \"pluginFamily\": \"General\",\n            \"synopsis\": \"It is possible to guess the remote operating system.\",\n            \"description\": \"Using a combination of remote probes (e.g., TCP/IP, SMB, HTTP, NTP, SNMP, etc.), it is possible to guess the name of the remote operating system in use. It is also possible sometimes to guess the version of the operating system.\",\n            \"solution\": null,\n            \"severity\": 0,\n            \"cvssBaseScore\": null,\n            \"cvss3BaseScore\": null,\n            \"exploitAvailable\": false,\n            \"cve\": null,\n            \"riskLevel\": \"Very Low\",\n            \"vulnerabilityPublicationDate\": null,\n            \"patchPublicationDate\": null,\n            \"findingDate\": 1761955200000,\n            \"seeAlso\": [],\n            \"uniqueReferenceId\": \"6lNTurmYcUNPRjb1RXw6KgXsSNQSE98urqD7vZzJXFTylDX\",\n            \"warning\": false\n        },\n        {\n            \"id\": 1539316435,\n            \"assetId\": 676,\n            \"target\": \"vpn.fortifydata.com\",\n            \"pluginName\": \"OS Identification\",\n            \"pluginFamily\": \"General\",\n            \"synopsis\": \"It is possible to guess the remote operating system.\",\n            \"description\": \"Using a combination of remote probes (e.g., TCP/IP, SMB, HTTP, NTP, SNMP, etc.), it is possible to guess the name of the remote operating system in use. It is also possible sometimes to guess the version of the operating system.\",\n            \"solution\": null,\n            \"severity\": 0,\n            \"cvssBaseScore\": null,\n            \"cvss3BaseScore\": null,\n            \"exploitAvailable\": false,\n            \"cve\": null,\n            \"riskLevel\": \"Very Low\",\n            \"vulnerabilityPublicationDate\": null,\n            \"patchPublicationDate\": null,\n            \"findingDate\": 1761955200000,\n            \"seeAlso\": [],\n            \"uniqueReferenceId\": \"6_wk_sWsmf22v_IYlp9XBAepYA9mmWJ0asZEI9K7DgPKCmP\",\n            \"warning\": false\n        },\n        {\n            \"id\": 1539316518,\n            \"assetId\": 1744758,\n            \"target\": \"fortifydata.co.uk\",\n            \"pluginName\": \"OS Identification\",\n            \"pluginFamily\": \"General\",\n            \"synopsis\": \"It is possible to guess the remote operating system.\",\n            \"description\": \"Using a combination of remote probes (e.g., TCP/IP, SMB, HTTP, NTP, SNMP, etc.), it is possible to guess the name of the remote operating system in use. It is also possible sometimes to guess the version of the operating system.\",\n            \"solution\": null,\n            \"severity\": 0,\n            \"cvssBaseScore\": null,\n            \"cvss3BaseScore\": null,\n            \"exploitAvailable\": false,\n            \"cve\": null,\n            \"riskLevel\": \"Very Low\",\n            \"vulnerabilityPublicationDate\": null,\n            \"patchPublicationDate\": null,\n            \"findingDate\": 1761955200000,\n            \"seeAlso\": [],\n            \"uniqueReferenceId\": \"rtBdek2SUCL3EpzBEeWC8e7F6hEA343wtuNJAMdYRJj5u4GPqK5k\",\n            \"warning\": false\n        },\n        {\n            \"id\": 1539316532,\n            \"assetId\": 454,\n            \"target\": \"demo.fortifydata.com\",\n            \"pluginName\": \"OS Identification\",\n            \"pluginFamily\": \"General\",\n            \"synopsis\": \"It is possible to guess the remote operating system.\",\n            \"description\": \"Using a combination of remote probes (e.g., TCP/IP, SMB, HTTP, NTP, SNMP, etc.), it is possible to guess the name of the remote operating system in use. It is also possible sometimes to guess the version of the operating system.\",\n            \"solution\": null,\n            \"severity\": 0,\n            \"cvssBaseScore\": null,\n            \"cvss3BaseScore\": null,\n            \"exploitAvailable\": false,\n            \"cve\": null,\n            \"riskLevel\": \"Very Low\",\n            \"vulnerabilityPublicationDate\": null,\n            \"patchPublicationDate\": null,\n            \"findingDate\": 1761955200000,\n            \"seeAlso\": [],\n            \"uniqueReferenceId\": \"6KcydR1r0MqbN6uayQVvmyHKHjdZEEDFfJiaVAzxDiXS4V9\",\n            \"warning\": false\n        },\n        {\n            \"id\": 1539316564,\n            \"assetId\": 5661407,\n            \"target\": \"www.fortifydata.co.uk\",\n            \"pluginName\": \"OS Identification\",\n            \"pluginFamily\": \"General\",\n            \"synopsis\": \"It is possible to guess the remote operating system.\",\n            \"description\": \"Using a combination of remote probes (e.g., TCP/IP, SMB, HTTP, NTP, SNMP, etc.), it is possible to guess the name of the remote operating system in use. It is also possible sometimes to guess the version of the operating system.\",\n            \"solution\": null,\n            \"severity\": 0,\n            \"cvssBaseScore\": null,\n            \"cvss3BaseScore\": null,\n            \"exploitAvailable\": false,\n            \"cve\": null,\n            \"riskLevel\": \"Very Low\",\n            \"vulnerabilityPublicationDate\": null,\n            \"patchPublicationDate\": null,\n            \"findingDate\": 1761955200000,\n            \"seeAlso\": [],\n            \"uniqueReferenceId\": \"tI6OTf7PGn2_W4eNjlRmimDMG6DGE6072DjHjL4QaJjD1x0Pziw1\",\n            \"warning\": false\n        },\n        {\n            \"id\": 1539316609,\n            \"assetId\": 569262,\n            \"target\": \"scanner-9.fortifydata.com\",\n            \"pluginName\": \"OS Identification\",\n            \"pluginFamily\": \"General\",\n            \"synopsis\": \"It is possible to guess the remote operating system.\",\n            \"description\": \"Using a combination of remote probes (e.g., TCP/IP, SMB, HTTP, NTP, SNMP, etc.), it is possible to guess the name of the remote operating system in use. It is also possible sometimes to guess the version of the operating system.\",\n            \"solution\": null,\n            \"severity\": 0,\n            \"cvssBaseScore\": null,\n            \"cvss3BaseScore\": null,\n            \"exploitAvailable\": false,\n            \"cve\": null,\n            \"riskLevel\": \"Very Low\",\n            \"vulnerabilityPublicationDate\": null,\n            \"patchPublicationDate\": null,\n            \"findingDate\": 1761955200000,\n            \"seeAlso\": [],\n            \"uniqueReferenceId\": \"7jtw3LyCvx2XyUIz3A8m0ScG5K8qKnhx2x1JDBC_K6yPQZvvwNe\",\n            \"warning\": false\n        },\n        {\n            \"id\": 1539316620,\n            \"assetId\": 5661408,\n            \"target\": \"www.fortifydata.es\",\n            \"pluginName\": \"OS Identification\",\n            \"pluginFamily\": \"General\",\n            \"synopsis\": \"It is possible to guess the remote operating system.\",\n            \"description\": \"Using a combination of remote probes (e.g., TCP/IP, SMB, HTTP, NTP, SNMP, etc.), it is possible to guess the name of the remote operating system in use. It is also possible sometimes to guess the version of the operating system.\",\n            \"solution\": null,\n            \"severity\": 0,\n            \"cvssBaseScore\": null,\n            \"cvss3BaseScore\": null,\n            \"exploitAvailable\": false,\n            \"cve\": null,\n            \"riskLevel\": \"Very Low\",\n            \"vulnerabilityPublicationDate\": null,\n            \"patchPublicationDate\": null,\n            \"findingDate\": 1761955200000,\n            \"seeAlso\": [],\n            \"uniqueReferenceId\": \"tI6OTf7PGS33W4HkBzvU3OTVxAknWm2qCMjGN5yQMeEkt3DPB8bh\",\n            \"warning\": false\n        },\n        {\n            \"id\": 1539316640,\n            \"assetId\": 26165,\n            \"target\": \"scanner.fortifydata.com\",\n            \"pluginName\": \"OS Identification\",\n            \"pluginFamily\": \"General\",\n            \"synopsis\": \"It is possible to guess the remote operating system.\",\n            \"description\": \"Using a combination of remote probes (e.g., TCP/IP, SMB, HTTP, NTP, SNMP, etc.), it is possible to guess the name of the remote operating system in use. It is also possible sometimes to guess the version of the operating system.\",\n            \"solution\": null,\n            \"severity\": 0,\n            \"cvssBaseScore\": null,\n            \"cvss3BaseScore\": null,\n            \"exploitAvailable\": false,\n            \"cve\": null,\n            \"riskLevel\": \"Very Low\",\n            \"vulnerabilityPublicationDate\": null,\n            \"patchPublicationDate\": null,\n            \"findingDate\": 1761955200000,\n            \"seeAlso\": [],\n            \"uniqueReferenceId\": \"1HWyS9R91r_IPwxH4L3XalLjtzdCJFyYsPqcIF2Jzku09B1nTK\",\n            \"warning\": false\n        }\n    ]\n}"}],"_postman_id":"37bb6a0f-a105-4954-8428-8df9642b99b3"},{"name":"Get Application Vulnerabilities","id":"56578580-9694-4235-b317-b9ce6f0fa81f","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"auth":{"type":"noauth","isInherited":false},"method":"GET","header":[{"key":"Authorization","value":"ApiKey {{api_key}}","type":"text"}],"url":"https://api.{{region}}.fortifydata.com/api/v1/vulnerability/application/id/{{companyId}}","description":"<p>Retrieves a list of <strong>application vulnerabilities</strong> for the specified <strong>Company ID</strong>.</p>\n<ul>\n<li>If a <strong>Portfolio ID</strong> is provided instead, the response includes aggregated application vulnerability data for all companies in the portfolio.</li>\n</ul>\n<h3 id=\"requirements\"><strong>Requirements</strong></h3>\n<ul>\n<li>Requires the <strong>Application Vulnerabilities</strong> permission.</li>\n</ul>\n<h3 id=\"responses\"><strong>Responses</strong></h3>\n<ul>\n<li><p><strong>200 OK</strong> – Returns application vulnerability data.</p>\n</li>\n<li><p><strong>404 Not Found</strong> – Invalid company ID.</p>\n</li>\n<li><p><strong>403 Forbidden</strong> – Not authorized.</p>\n</li>\n</ul>\n","urlObject":{"protocol":"https","path":["api","v1","vulnerability","application","id","{{companyId}}"],"host":["api","{{region}}","fortifydata","com"],"query":[],"variable":[]}},"response":[{"id":"88e4ea20-7173-4595-b16e-e4adf56989ed","name":"Successful Response","originalRequest":{"method":"GET","header":[{"key":"Authorization","value":"ApiKey {{api_key}}","type":"text"}],"url":"https://api.{{region}}.fortifydata.com/api/v1/vulnerability/application/id/{{companyId}}"},"status":"OK","code":200,"_postman_previewlanguage":"json","header":[{"key":"Server","value":"nginx/1.19.0"},{"key":"Date","value":"Wed, 30 Sep 2020 18:56:48 GMT"},{"key":"Content-Type","value":"application/json;charset=UTF-8"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Connection","value":"keep-alive"},{"key":"X-Content-Type-Options","value":"nosniff"},{"key":"X-Content-Type-Options","value":"nosniff"},{"key":"X-XSS-Protection","value":"1; mode=block"},{"key":"Cache-Control","value":"no-cache, no-store, max-age=0, must-revalidate"},{"key":"Pragma","value":"no-cache"},{"key":"Expires","value":"0"},{"key":"X-Frame-Options","value":"DENY"},{"key":"X-Frame-Options","value":"DENY"},{"key":"Strict-Transport-Security","value":"max-age=31536000;"},{"key":"Content-Security-Policy-Report-Only","value":"default-src https:; script-src https: 'unsafe-eval' 'unsafe-inline'; style-src https: 'unsafe-inline'; img-src https: data:; font-src https: data:; report-uri /csp-report"}],"cookie":[],"responseTime":null,"body":"[\n    {\n        \"asset\": {\n            \"id\": 284572,\n            \"target\": \"open.org\",\n            \"companyId\": 0,\n            \"ip\": \"74.220.199.6\",\n            \"city\": null,\n            \"country\": null,\n            \"countryCode\": null,\n            \"latitude\": 0.0,\n            \"longitude\": 0.0,\n            \"os\": null,\n            \"fqdn\": null,\n            \"score\": 0,\n            \"classification\": \"LOW\"\n        },\n        \"vulnerabilities\": [\n            {\n                \"id\": 18684907,\n                \"assetId\": 284572,\n                \"target\": \"open.org\",\n                \"pluginName\": \"HTTP TRACE / TRACK Methods Allowed\",\n                \"pluginFamily\": \"Web Servers\",\n                \"synopsis\": \"Debugging functions are enabled on the remote web server.\",\n                \"description\": \"The remote web server supports the TRACE and/or TRACK methods. TRACE and TRACK are HTTP methods that are used to debug web server connections.\",\n                \"solution\": \"Disable these HTTP methods. Refer to the plugin output for more information.\",\n                \"severity\": 2,\n                \"cvssBaseScore\": \"5.0\",\n                \"cvss3BaseScore\": \"5.3\",\n                \"exploitAvailable\": false,\n                \"cve\": \"CVE-2003-1567, CVE-2004-2320, CVE-2010-0386\",\n                \"riskLevel\": \"Low\",\n                \"vulnerabilityPublicationDate\": 1043020800000,\n                \"patchPublicationDate\": null,\n                \"findingDate\": 1715299200000,\n                \"seeAlso\": [\n                    \"http://www.nessus.org/u?e979b5cb\",\n                    \"http://www.apacheweek.com/issues/03-01-24\",\n                    \"https://download.oracle.com/sunalerts/1000718.1.html\"\n                ]\n            }\n        ]\n    }\n]"}],"_postman_id":"56578580-9694-4235-b317-b9ce6f0fa81f"},{"name":"Get Application Informational Findings","id":"7c66557b-7e4c-4ce3-b53b-b694fba20f2c","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[{"key":"Authorization","value":"ApiKey {{api_key}}","type":"text"}],"url":"https://api.{{region}}.fortifydata.com/api/v1/vulnerability/application/info/id/{{companyId}}?page=1","description":"<p>Retrieves the paged (100 per page) list of <strong>Application Informational findings</strong> for the specified <strong>Company ID</strong>.</p>\n<ul>\n<li>If a <strong>Portfolio ID</strong> is provided instead, the response includes aggregated application informational findings for all companies in the portfolio.</li>\n</ul>\n<h3 id=\"requirements\"><strong>Requirements</strong></h3>\n<ul>\n<li>Requires the <strong>Application Vulnerabilities</strong> permission.</li>\n</ul>\n<h3 id=\"responses\"><strong>Responses</strong></h3>\n<ul>\n<li><p><strong>200 OK</strong> – Returns application vulnerability data.</p>\n</li>\n<li><p><strong>404 Not Found</strong> – Invalid company ID.</p>\n</li>\n<li><p><strong>403 Forbidden</strong> – Not authorized.</p>\n</li>\n</ul>\n","urlObject":{"protocol":"https","path":["api","v1","vulnerability","application","info","id","{{companyId}}"],"host":["api","{{region}}","fortifydata","com"],"query":[{"key":"page","value":"1"}],"variable":[]}},"response":[{"id":"d433606d-ad98-41e5-9f66-a47c696e9822","name":"Successful Response","originalRequest":{"method":"GET","header":[{"key":"Authorization","value":"ApiKey {{api_key}}","type":"text"}],"url":{"raw":"https://api.{{region}}.fortifydata.com/api/v1/vulnerability/application/info/id/{{companyId}}?page=1","protocol":"https","host":["api","{{region}}","fortifydata","com"],"path":["api","v1","vulnerability","application","info","id","{{companyId}}"],"query":[{"key":"page","value":"1","type":"text"}]}},"status":"OK","code":200,"_postman_previewlanguage":"json","header":[{"key":"Date","value":"Mon, 10 Nov 2025 18:27:54 GMT"},{"key":"Content-Type","value":"application/json;charset=UTF-8"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Connection","value":"keep-alive"},{"key":"X-Rate-Limit-Remaining","value":"4"},{"key":"X-Content-Type-Options","value":"nosniff"},{"key":"X-XSS-Protection","value":"1; mode=block"},{"key":"Cache-Control","value":"no-cache, no-store, max-age=0, must-revalidate"},{"key":"Pragma","value":"no-cache"},{"key":"Expires","value":"0"},{"key":"Strict-Transport-Security","value":"max-age=31536000 ; includeSubDomains"},{"key":"X-Frame-Options","value":"DENY"}],"cookie":[],"responseTime":null,"body":"{\n    \"total\": 370,\n    \"page\": 1,\n    \"findings\": [\n        {\n            \"id\": 1539315951,\n            \"assetId\": 454,\n            \"target\": \"demo.fortifydata.com\",\n            \"pluginName\": \"HTTP Server Type and Version\",\n            \"pluginFamily\": \"Web Servers\",\n            \"synopsis\": \"A web server is running on the remote host.\",\n            \"description\": \"This plugin attempts to determine the type and the version of the   remote web server.\",\n            \"solution\": null,\n            \"severity\": 0,\n            \"cvssBaseScore\": null,\n            \"cvss3BaseScore\": null,\n            \"exploitAvailable\": false,\n            \"cve\": \"\",\n            \"riskLevel\": \"Very Low\",\n            \"vulnerabilityPublicationDate\": null,\n            \"patchPublicationDate\": null,\n            \"findingDate\": 1761955200000,\n            \"seeAlso\": [],\n            \"uniqueReferenceId\": \"9efm6hoFR2PRTK4ZKU9x_IwnetaSuwPl5JUYxZre_o42iKpbtNIUWz2t5pH6f6pyEV5\",\n            \"warning\": false\n        },\n        {\n            \"id\": 1539315981,\n            \"assetId\": 2862,\n            \"target\": \"api.fortifydata.com\",\n            \"pluginName\": \"HTTP Server Type and Version\",\n            \"pluginFamily\": \"Web Servers\",\n            \"synopsis\": \"A web server is running on the remote host.\",\n            \"description\": \"This plugin attempts to determine the type and the version of the   remote web server.\",\n            \"solution\": null,\n            \"severity\": 0,\n            \"cvssBaseScore\": null,\n            \"cvss3BaseScore\": null,\n            \"exploitAvailable\": false,\n            \"cve\": \"\",\n            \"riskLevel\": \"Very Low\",\n            \"vulnerabilityPublicationDate\": null,\n            \"patchPublicationDate\": null,\n            \"findingDate\": 1761955200000,\n            \"seeAlso\": [],\n            \"uniqueReferenceId\": \"A3WDmI_d5xrug1phLbj9h9tQ9wG2srrKjGEO_vOQeVACkFhzKJZJ7NAmej953GxtDAey\",\n            \"warning\": false\n        },\n        {\n            \"id\": 1539315997,\n            \"assetId\": 7204,\n            \"target\": \"test.fortifydata.com\",\n            \"pluginName\": \"HTTP Server Type and Version\",\n            \"pluginFamily\": \"Web Servers\",\n            \"synopsis\": \"A web server is running on the remote host.\",\n            \"description\": \"This plugin attempts to determine the type and the version of the   remote web server.\",\n            \"solution\": null,\n            \"severity\": 0,\n            \"cvssBaseScore\": null,\n            \"cvss3BaseScore\": null,\n            \"exploitAvailable\": false,\n            \"cve\": \"\",\n            \"riskLevel\": \"Very Low\",\n            \"vulnerabilityPublicationDate\": null,\n            \"patchPublicationDate\": null,\n            \"findingDate\": 1761955200000,\n            \"seeAlso\": [],\n            \"uniqueReferenceId\": \"DE498MK07G2c74sYHSYJQiKkP85VpN3l_y6R85V83kQwtqmm13tt2bRL7fvzbX79BRHR\",\n            \"warning\": false\n        },\n        {\n            \"id\": 1539316053,\n            \"assetId\": 9967,\n            \"target\": \"autodiscover.fortifydata.com\",\n            \"pluginName\": \"HTTP Server Type and Version\",\n            \"pluginFamily\": \"Web Servers\",\n            \"synopsis\": \"A web server is running on the remote host.\",\n            \"description\": \"This plugin attempts to determine the type and the version of the   remote web server.\",\n            \"solution\": null,\n            \"severity\": 0,\n            \"cvssBaseScore\": null,\n            \"cvss3BaseScore\": null,\n            \"exploitAvailable\": false,\n            \"cve\": \"\",\n            \"riskLevel\": \"Very Low\",\n            \"vulnerabilityPublicationDate\": null,\n            \"patchPublicationDate\": null,\n            \"findingDate\": 1761955200000,\n            \"seeAlso\": [],\n            \"uniqueReferenceId\": \"F5NA0zCMlN3_pr7wic9ExIiA5glVgBaNVZ32ECXsmhNgOoqbDTlKcnYyBwTbhkJYgqtF\",\n            \"warning\": false\n        },\n        {\n            \"id\": 1539316073,\n            \"assetId\": 1005,\n            \"target\": \"eu.fortifydata.com\",\n            \"pluginName\": \"HTTP Server Type and Version\",\n            \"pluginFamily\": \"Web Servers\",\n            \"synopsis\": \"A web server is running on the remote host.\",\n            \"description\": \"This plugin attempts to determine the type and the version of the   remote web server.\",\n            \"solution\": null,\n            \"severity\": 0,\n            \"cvssBaseScore\": null,\n            \"cvss3BaseScore\": null,\n            \"exploitAvailable\": false,\n            \"cve\": \"\",\n            \"riskLevel\": \"Very Low\",\n            \"vulnerabilityPublicationDate\": null,\n            \"patchPublicationDate\": null,\n            \"findingDate\": 1761955200000,\n            \"seeAlso\": [],\n            \"uniqueReferenceId\": \"zkhbtQ8aPLjNSec22lcqABPWyMAGbFeH4w9YDMeNvFt4Zdg53CnnSahpCoCf_rKA0WBs\",\n            \"warning\": false\n        },\n        {\n            \"id\": 1539316353,\n            \"assetId\": 8128,\n            \"target\": \"api.us.fortifydata.com\",\n            \"pluginName\": \"HTTP Server Type and Version\",\n            \"pluginFamily\": \"Web Servers\",\n            \"synopsis\": \"A web server is running on the remote host.\",\n            \"description\": \"This plugin attempts to determine the type and the version of the   remote web server.\",\n            \"solution\": null,\n            \"severity\": 0,\n            \"cvssBaseScore\": null,\n            \"cvss3BaseScore\": null,\n            \"exploitAvailable\": false,\n            \"cve\": \"\",\n            \"riskLevel\": \"Very Low\",\n            \"vulnerabilityPublicationDate\": null,\n            \"patchPublicationDate\": null,\n            \"findingDate\": 1761955200000,\n            \"seeAlso\": [],\n            \"uniqueReferenceId\": \"Em8dAyyE00xYk1ueY_TDaG5KWXgy9J1sXdLcnM2yxTrnKhzqPNiXaDUIzMnjxyPJVOn5\",\n            \"warning\": false\n        },\n        {\n            \"id\": 1539316497,\n            \"assetId\": 140,\n            \"target\": \"app.fortifydata.com\",\n            \"pluginName\": \"HTTP Server Type and Version\",\n            \"pluginFamily\": \"Web Servers\",\n            \"synopsis\": \"A web server is running on the remote host.\",\n            \"description\": \"This plugin attempts to determine the type and the version of the   remote web server.\",\n            \"solution\": null,\n            \"severity\": 0,\n            \"cvssBaseScore\": null,\n            \"cvss3BaseScore\": null,\n            \"exploitAvailable\": false,\n            \"cve\": \"\",\n            \"riskLevel\": \"Very Low\",\n            \"vulnerabilityPublicationDate\": null,\n            \"patchPublicationDate\": null,\n            \"findingDate\": 1761955200000,\n            \"seeAlso\": [],\n            \"uniqueReferenceId\": \"8HOn_HJ1VMjdFrx2QCgnufpfyY515WjbNFiHhMDf_VwPcYcG37z0j0V_obJ3YxoBevS\",\n            \"warning\": false\n        },\n        {\n            \"id\": 1539316983,\n            \"assetId\": 569262,\n            \"target\": \"scanner-9.fortifydata.com\",\n            \"pluginName\": \"HTTP Server Type and Version\",\n            \"pluginFamily\": \"Web Servers\",\n            \"synopsis\": \"A web server is running on the remote host.\",\n            \"description\": \"This plugin attempts to determine the type and the version of the   remote web server.\",\n            \"solution\": null,\n            \"severity\": 0,\n            \"cvssBaseScore\": null,\n            \"cvss3BaseScore\": null,\n            \"exploitAvailable\": false,\n            \"cve\": \"\",\n            \"riskLevel\": \"Very Low\",\n            \"vulnerabilityPublicationDate\": null,\n            \"patchPublicationDate\": null,\n            \"findingDate\": 1761955200000,\n            \"seeAlso\": [],\n            \"uniqueReferenceId\": \"a0XfleRJJP9own2yWRsLF6ncdiCS9kF9_BPMSl5kpFjTnXY3Re4o1m09nk7gcEg9Tu3DFna\",\n            \"warning\": false\n        },\n        {\n            \"id\": 1539317598,\n            \"assetId\": 26165,\n            \"target\": \"scanner.fortifydata.com\",\n            \"pluginName\": \"HTTP Server Type and Version\",\n            \"pluginFamily\": \"Web Servers\",\n            \"synopsis\": \"A web server is running on the remote host.\",\n            \"description\": \"This plugin attempts to determine the type and the version of the   remote web server.\",\n            \"solution\": null,\n            \"severity\": 0,\n            \"cvssBaseScore\": null,\n            \"cvss3BaseScore\": null,\n            \"exploitAvailable\": false,\n            \"cve\": \"\",\n            \"riskLevel\": \"Very Low\",\n            \"vulnerabilityPublicationDate\": null,\n            \"patchPublicationDate\": null,\n            \"findingDate\": 1761955200000,\n            \"seeAlso\": [],\n            \"uniqueReferenceId\": \"2kwwSdcO9W3THVvsnmVK1n5UUAUTtSrJfWLjJECgvdDE6M40du_Yg6TSrBeDWu7O3t05DG\",\n            \"warning\": false\n        },\n        {\n            \"id\": 1539317617,\n            \"assetId\": 603644,\n            \"target\": \"status.fortifydata.com\",\n            \"pluginName\": \"HTTP Server Type and Version\",\n            \"pluginFamily\": \"Web Servers\",\n            \"synopsis\": \"A web server is running on the remote host.\",\n            \"description\": \"This plugin attempts to determine the type and the version of the   remote web server.\",\n            \"solution\": null,\n            \"severity\": 0,\n            \"cvssBaseScore\": null,\n            \"cvss3BaseScore\": null,\n            \"exploitAvailable\": false,\n            \"cve\": \"\",\n            \"riskLevel\": \"Very Low\",\n            \"vulnerabilityPublicationDate\": null,\n            \"patchPublicationDate\": null,\n            \"findingDate\": 1761955200000,\n            \"seeAlso\": [],\n            \"uniqueReferenceId\": \"acwG4xSAWvXaj3dnbh70tzAWq_BAZ3m3UVn56IwS7k3aA_wWjH68vnugXkLG9xEoy88dXFl\",\n            \"warning\": false\n        },\n        {\n            \"id\": 1539317631,\n            \"assetId\": 26639,\n            \"target\": \"scanner-eu.fortifydata.com\",\n            \"pluginName\": \"HTTP Server Type and Version\",\n            \"pluginFamily\": \"Web Servers\",\n            \"synopsis\": \"A web server is running on the remote host.\",\n            \"description\": \"This plugin attempts to determine the type and the version of the   remote web server.\",\n            \"solution\": null,\n            \"severity\": 0,\n            \"cvssBaseScore\": null,\n            \"cvss3BaseScore\": null,\n            \"exploitAvailable\": false,\n            \"cve\": \"\",\n            \"riskLevel\": \"Very Low\",\n            \"vulnerabilityPublicationDate\": null,\n            \"patchPublicationDate\": null,\n            \"findingDate\": 1761955200000,\n            \"seeAlso\": [],\n            \"uniqueReferenceId\": \"2kwxKL0kMLXq01pYz3ovNBr470mxnjBmXBcF_noyMAF95txHpAU04fjNCXFDwxiFlzsIdY\",\n            \"warning\": false\n        },\n        {\n            \"id\": 1539317640,\n            \"assetId\": 27969,\n            \"target\": \"scanner-3.fortifydata.com\",\n            \"pluginName\": \"HTTP Server Type and Version\",\n            \"pluginFamily\": \"Web Servers\",\n            \"synopsis\": \"A web server is running on the remote host.\",\n            \"description\": \"This plugin attempts to determine the type and the version of the   remote web server.\",\n            \"solution\": null,\n            \"severity\": 0,\n            \"cvssBaseScore\": null,\n            \"cvss3BaseScore\": null,\n            \"exploitAvailable\": false,\n            \"cve\": \"\",\n            \"riskLevel\": \"Very Low\",\n            \"vulnerabilityPublicationDate\": null,\n            \"patchPublicationDate\": null,\n            \"findingDate\": 1761955200000,\n            \"seeAlso\": [],\n            \"uniqueReferenceId\": \"2kxgwoJL7mR2JrAaen4ly1ffEDwvnn88gmhIQCQ_P6Gp5QxuKbKmxCNvMrOJEZyPvRwaqs\",\n            \"warning\": false\n        },\n        {\n            \"id\": 1539317985,\n            \"assetId\": 1744761,\n            \"target\": \"fortifydata.us\",\n            \"pluginName\": \"HTTP Server Type and Version\",\n            \"pluginFamily\": \"Web Servers\",\n            \"synopsis\": \"A web server is running on the remote host.\",\n            \"description\": \"This plugin attempts to determine the type and the version of the   remote web server.\",\n            \"solution\": null,\n            \"severity\": 0,\n            \"cvssBaseScore\": null,\n            \"cvss3BaseScore\": null,\n            \"exploitAvailable\": false,\n            \"cve\": \"\",\n            \"riskLevel\": \"Very Low\",\n            \"vulnerabilityPublicationDate\": null,\n            \"patchPublicationDate\": null,\n            \"findingDate\": 1761955200000,\n            \"seeAlso\": [],\n            \"uniqueReferenceId\": \"BEhElUKwBLTSU4Zpqpl0uGAWgSkFPT5D3CZanu1oJKNaAB25PjMSIAV_zDL3gm3xQ6YfQwlv\",\n            \"warning\": false\n        },\n        {\n            \"id\": 1539318098,\n            \"assetId\": 1744760,\n            \"target\": \"fortifydata.io\",\n            \"pluginName\": \"HTTP Server Type and Version\",\n            \"pluginFamily\": \"Web Servers\",\n            \"synopsis\": \"A web server is running on the remote host.\",\n            \"description\": \"This plugin attempts to determine the type and the version of the   remote web server.\",\n            \"solution\": null,\n            \"severity\": 0,\n            \"cvssBaseScore\": null,\n            \"cvss3BaseScore\": null,\n            \"exploitAvailable\": false,\n            \"cve\": \"\",\n            \"riskLevel\": \"Very Low\",\n            \"vulnerabilityPublicationDate\": null,\n            \"patchPublicationDate\": null,\n            \"findingDate\": 1761955200000,\n            \"seeAlso\": [],\n            \"uniqueReferenceId\": \"BEhElUKwB5pLCGhBPjZkSYFTQwUjsJhuag_Ei_QgA61UwwRDQgMu2ezcdZ_QxHM_uXEL80Bf\",\n            \"warning\": false\n        },\n        {\n            \"id\": 1539318163,\n            \"assetId\": 5661409,\n            \"target\": \"www.fortifydata.io\",\n            \"pluginName\": \"HTTP Server Type and Version\",\n            \"pluginFamily\": \"Web Servers\",\n            \"synopsis\": \"A web server is running on the remote host.\",\n            \"description\": \"This plugin attempts to determine the type and the version of the   remote web server.\",\n            \"solution\": null,\n            \"severity\": 0,\n            \"cvssBaseScore\": null,\n            \"cvss3BaseScore\": null,\n            \"exploitAvailable\": false,\n            \"cve\": \"\",\n            \"riskLevel\": \"Very Low\",\n            \"vulnerabilityPublicationDate\": null,\n            \"patchPublicationDate\": null,\n            \"findingDate\": 1761955200000,\n            \"seeAlso\": [],\n            \"uniqueReferenceId\": \"EHPBz4uGya_3G7d1Y2J0Jvomsau_5jdJ_G2LIzgeXOIWawPCvkTOdGhg9ITkmuCl8f7qrMtt\",\n            \"warning\": false\n        },\n        {\n            \"id\": 1539318176,\n            \"assetId\": 10017409,\n            \"target\": \"info.fortifydata.com\",\n            \"pluginName\": \"HTTP Server Type and Version\",\n            \"pluginFamily\": \"Web Servers\",\n            \"synopsis\": \"A web server is running on the remote host.\",\n            \"description\": \"This plugin attempts to determine the type and the version of the   remote web server.\",\n            \"solution\": null,\n            \"severity\": 0,\n            \"cvssBaseScore\": null,\n            \"cvss3BaseScore\": null,\n            \"exploitAvailable\": false,\n            \"cve\": \"\",\n            \"riskLevel\": \"Very Low\",\n            \"vulnerabilityPublicationDate\": null,\n            \"patchPublicationDate\": null,\n            \"findingDate\": 1761955200000,\n            \"seeAlso\": [],\n            \"uniqueReferenceId\": \"2qSjFnw_i4X3p9mAuj_55p5hRJwFAZLW1hoTQs1IqKHcLcTVCNy8c_2IgWGwkOmP2fu92Y9Ku2\",\n            \"warning\": false\n        },\n        {\n            \"id\": 1539318236,\n            \"assetId\": 15576774,\n            \"target\": \"www.fortifydata.cc\",\n            \"pluginName\": \"HTTP Server Type and Version\",\n            \"pluginFamily\": \"Web Servers\",\n            \"synopsis\": \"A web server is running on the remote host.\",\n            \"description\": \"This plugin attempts to determine the type and the version of the   remote web server.\",\n            \"solution\": null,\n            \"severity\": 0,\n            \"cvssBaseScore\": null,\n            \"cvss3BaseScore\": null,\n            \"exploitAvailable\": false,\n            \"cve\": \"\",\n            \"riskLevel\": \"Very Low\",\n            \"vulnerabilityPublicationDate\": null,\n            \"patchPublicationDate\": null,\n            \"findingDate\": 1761955200000,\n            \"seeAlso\": [],\n            \"uniqueReferenceId\": \"2qW9w5xwsl5dlGcclN_ac6BS8fA6_tPVMe646U13J__p_32ECtw7cZQP4WlL1vKVPykR7mCWLv\",\n            \"warning\": false\n        },\n        {\n            \"id\": 1539318245,\n            \"assetId\": 10017408,\n            \"target\": \"dev.status.fortifydata.com\",\n            \"pluginName\": \"HTTP Server Type and Version\",\n            \"pluginFamily\": \"Web Servers\",\n            \"synopsis\": \"A web server is running on the remote host.\",\n            \"description\": \"This plugin attempts to determine the type and the version of the   remote web server.\",\n            \"solution\": null,\n            \"severity\": 0,\n            \"cvssBaseScore\": null,\n            \"cvss3BaseScore\": null,\n            \"exploitAvailable\": false,\n            \"cve\": \"\",\n            \"riskLevel\": \"Very Low\",\n            \"vulnerabilityPublicationDate\": null,\n            \"patchPublicationDate\": null,\n            \"findingDate\": 1761955200000,\n            \"seeAlso\": [],\n            \"uniqueReferenceId\": \"2qSjFnw_i4WnW25aNwn_JJtzWH5k9DoMd8vxRVYeeCxy_WPRrkz5cBnlV8kSAAE9LI8ZKsseJN\",\n            \"warning\": false\n        },\n        {\n            \"id\": 1539318408,\n            \"assetId\": 11989498,\n            \"target\": \"m.fortifydata.cc\",\n            \"pluginName\": \"HTTP Server Type and Version\",\n            \"pluginFamily\": \"Web Servers\",\n            \"synopsis\": \"A web server is running on the remote host.\",\n            \"description\": \"This plugin attempts to determine the type and the version of the   remote web server.\",\n            \"solution\": null,\n            \"severity\": 0,\n            \"cvssBaseScore\": null,\n            \"cvss3BaseScore\": null,\n            \"exploitAvailable\": false,\n            \"cve\": \"\",\n            \"riskLevel\": \"Very Low\",\n            \"vulnerabilityPublicationDate\": null,\n            \"patchPublicationDate\": null,\n            \"findingDate\": 1761955200000,\n            \"seeAlso\": [],\n            \"uniqueReferenceId\": \"2qT6xR4UF8LnGTBvATXPnb9C2MxTibhbLJcViGs31QZbRYdnRQXiISrE4gFf3ZbxsKzb84Eubn\",\n            \"warning\": false\n        },\n        {\n            \"id\": 1539318442,\n            \"assetId\": 15576773,\n            \"target\": \"fortifydata.cc\",\n            \"pluginName\": \"HTTP Server Type and Version\",\n            \"pluginFamily\": \"Web Servers\",\n            \"synopsis\": \"A web server is running on the remote host.\",\n            \"description\": \"This plugin attempts to determine the type and the version of the   remote web server.\",\n            \"solution\": null,\n            \"severity\": 0,\n            \"cvssBaseScore\": null,\n            \"cvss3BaseScore\": null,\n            \"exploitAvailable\": false,\n            \"cve\": \"\",\n            \"riskLevel\": \"Very Low\",\n            \"vulnerabilityPublicationDate\": null,\n            \"patchPublicationDate\": null,\n            \"findingDate\": 1761955200000,\n            \"seeAlso\": [],\n            \"uniqueReferenceId\": \"2qW9w5xwsl4xSyVNE_o4Qq_9dd8Mz7sLY5cJ8mXAxSQMeMZAr0x4cBasJ806hi1gx__GORVr0f\",\n            \"warning\": false\n        },\n        {\n            \"id\": 1539318713,\n            \"assetId\": 6917193,\n            \"target\": \"www.fortifydata.us\",\n            \"pluginName\": \"HTTP Server Type and Version\",\n            \"pluginFamily\": \"Web Servers\",\n            \"synopsis\": \"A web server is running on the remote host.\",\n            \"description\": \"This plugin attempts to determine the type and the version of the   remote web server.\",\n            \"solution\": null,\n            \"severity\": 0,\n            \"cvssBaseScore\": null,\n            \"cvss3BaseScore\": null,\n            \"exploitAvailable\": false,\n            \"cve\": \"\",\n            \"riskLevel\": \"Very Low\",\n            \"vulnerabilityPublicationDate\": null,\n            \"patchPublicationDate\": null,\n            \"findingDate\": 1761955200000,\n            \"seeAlso\": [],\n            \"uniqueReferenceId\": \"Ftzn8IICbfsQJw2Rrke2ZPSde6_5ZZg1_AOMUZgjGi4D4o0Tlc_8OAC4KFRHH63PHNcXstRN\",\n            \"warning\": false\n        },\n        {\n            \"id\": 1539804993,\n            \"assetId\": 11684693,\n            \"target\": \"app.us.fortifydata.com\",\n            \"pluginName\": \"HTTP Server Type and Version\",\n            \"pluginFamily\": \"Web Servers\",\n            \"synopsis\": \"A web server is running on the remote host.\",\n            \"description\": \"This plugin attempts to determine the type and the version of the   remote web server.\",\n            \"solution\": null,\n            \"severity\": 0,\n            \"cvssBaseScore\": null,\n            \"cvss3BaseScore\": null,\n            \"exploitAvailable\": false,\n            \"cve\": \"\",\n            \"riskLevel\": \"Very Low\",\n            \"vulnerabilityPublicationDate\": null,\n            \"patchPublicationDate\": null,\n            \"findingDate\": 1761955200000,\n            \"seeAlso\": [],\n            \"uniqueReferenceId\": \"2qT5Zh1f43n_xHrgQ43N7yquYlfuJdIOxeoRUWhAwdkYcKMzoDqAqN1nbDOx_nS3nd7afAT0IM\",\n            \"warning\": false\n        },\n        {\n            \"id\": 1539808867,\n            \"assetId\": 11766647,\n            \"target\": \"app.fortifydata.cc\",\n            \"pluginName\": \"HTTP Server Type and Version\",\n            \"pluginFamily\": \"Web Servers\",\n            \"synopsis\": \"A web server is running on the remote host.\",\n            \"description\": \"This plugin attempts to determine the type and the version of the   remote web server.\",\n            \"solution\": null,\n            \"severity\": 0,\n            \"cvssBaseScore\": null,\n            \"cvss3BaseScore\": null,\n            \"exploitAvailable\": false,\n            \"cve\": \"\",\n            \"riskLevel\": \"Very Low\",\n            \"vulnerabilityPublicationDate\": null,\n            \"patchPublicationDate\": null,\n            \"findingDate\": 1761955200000,\n            \"seeAlso\": [],\n            \"uniqueReferenceId\": \"2qT6a2d2hdGOeyTb8SszH4HDZYhWia_uPU9tY30reYUtaRX0fUD_cPlVRlEpO_CNaxpqTEOGof\",\n            \"warning\": false\n        },\n        {\n            \"id\": 1539315963,\n            \"assetId\": 454,\n            \"target\": \"demo.fortifydata.com\",\n            \"pluginName\": \"Web Server robots.txt Information Disclosure\",\n            \"pluginFamily\": \"Web Servers\",\n            \"synopsis\": \"The remote web server contains a 'robots.txt' file.\",\n            \"description\": \"The remote host contains a file named 'robots.txt' that is intended to prevent web 'robots' from visiting certain directories in a website for maintenance or indexing purposes.  A malicious user may also be able to use the contents of this file to learn of sensitive documents or directories on the affected site and either retrieve them directly or target them for other attacks.\",\n            \"solution\": \"Review the contents of the site's robots.txt file, use Robots META tags instead of entries in the robots.txt file, and/or adjust the web server's access controls to limit access to sensitive material.\",\n            \"severity\": 0,\n            \"cvssBaseScore\": null,\n            \"cvss3BaseScore\": null,\n            \"exploitAvailable\": false,\n            \"cve\": null,\n            \"riskLevel\": \"Very Low\",\n            \"vulnerabilityPublicationDate\": null,\n            \"patchPublicationDate\": null,\n            \"findingDate\": 1761955200000,\n            \"seeAlso\": [\n                \"http://www.robotstxt.org/orig.html\"\n            ],\n            \"uniqueReferenceId\": \"PnhFLkCRLMQxwZIbk22twKzOqne0xSRJFMuRSwD23gHO_UMR6fTw_8jCHteK5locx_LVU_H7UD3FO4d9Ari6zDgh\",\n            \"warning\": false\n        },\n        {\n            \"id\": 1539316085,\n            \"assetId\": 1005,\n            \"target\": \"eu.fortifydata.com\",\n            \"pluginName\": \"Web Server robots.txt Information Disclosure\",\n            \"pluginFamily\": \"Web Servers\",\n            \"synopsis\": \"The remote web server contains a 'robots.txt' file.\",\n            \"description\": \"The remote host contains a file named 'robots.txt' that is intended to prevent web 'robots' from visiting certain directories in a website for maintenance or indexing purposes.  A malicious user may also be able to use the contents of this file to learn of sensitive documents or directories on the affected site and either retrieve them directly or target them for other attacks.\",\n            \"solution\": \"Review the contents of the site's robots.txt file, use Robots META tags instead of entries in the robots.txt file, and/or adjust the web server's access controls to limit access to sensitive material.\",\n            \"severity\": 0,\n            \"cvssBaseScore\": null,\n            \"cvss3BaseScore\": null,\n            \"exploitAvailable\": false,\n            \"cve\": null,\n            \"riskLevel\": \"Very Low\",\n            \"vulnerabilityPublicationDate\": null,\n            \"patchPublicationDate\": null,\n            \"findingDate\": 1761955200000,\n            \"seeAlso\": [\n                \"http://www.robotstxt.org/orig.html\"\n            ],\n            \"uniqueReferenceId\": \"37F_JBDtJWlQu4QZN3CmaKCeiLaidSMPRCOcQbqwsJu5JMoBM2x1LNdRU0S87VIWmK7MU93gdy4PsoY2nr7QCBreGK\",\n            \"warning\": false\n        },\n        {\n            \"id\": 1539316245,\n            \"assetId\": 676,\n            \"target\": \"vpn.fortifydata.com\",\n            \"pluginName\": \"Web Server robots.txt Information Disclosure\",\n            \"pluginFamily\": \"Web Servers\",\n            \"synopsis\": \"The remote web server contains a 'robots.txt' file.\",\n            \"description\": \"The remote host contains a file named 'robots.txt' that is intended to prevent web 'robots' from visiting certain directories in a website for maintenance or indexing purposes.  A malicious user may also be able to use the contents of this file to learn of sensitive documents or directories on the affected site and either retrieve them directly or target them for other attacks.\",\n            \"solution\": \"Review the contents of the site's robots.txt file, use Robots META tags instead of entries in the robots.txt file, and/or adjust the web server's access controls to limit access to sensitive material.\",\n            \"severity\": 0,\n            \"cvssBaseScore\": null,\n            \"cvss3BaseScore\": null,\n            \"exploitAvailable\": false,\n            \"cve\": null,\n            \"riskLevel\": \"Very Low\",\n            \"vulnerabilityPublicationDate\": null,\n            \"patchPublicationDate\": null,\n            \"findingDate\": 1761955200000,\n            \"seeAlso\": [\n                \"http://www.robotstxt.org/orig.html\"\n            ],\n            \"uniqueReferenceId\": \"RlKQnOMETZpksfDr9ao7H7Xsz7RTcrfNXTqU_6ErKEhTo5a43vlF36cB12lMzO7HQrq30STpH9nAqmrjDc9Bl2pX\",\n            \"warning\": false\n        },\n        {\n            \"id\": 1539316509,\n            \"assetId\": 140,\n            \"target\": \"app.fortifydata.com\",\n            \"pluginName\": \"Web Server robots.txt Information Disclosure\",\n            \"pluginFamily\": \"Web Servers\",\n            \"synopsis\": \"The remote web server contains a 'robots.txt' file.\",\n            \"description\": \"The remote host contains a file named 'robots.txt' that is intended to prevent web 'robots' from visiting certain directories in a website for maintenance or indexing purposes.  A malicious user may also be able to use the contents of this file to learn of sensitive documents or directories on the affected site and either retrieve them directly or target them for other attacks.\",\n            \"solution\": \"Review the contents of the site's robots.txt file, use Robots META tags instead of entries in the robots.txt file, and/or adjust the web server's access controls to limit access to sensitive material.\",\n            \"severity\": 0,\n            \"cvssBaseScore\": null,\n            \"cvss3BaseScore\": null,\n            \"exploitAvailable\": false,\n            \"cve\": null,\n            \"riskLevel\": \"Very Low\",\n            \"vulnerabilityPublicationDate\": null,\n            \"patchPublicationDate\": null,\n            \"findingDate\": 1761955200000,\n            \"seeAlso\": [\n                \"http://www.robotstxt.org/orig.html\"\n            ],\n            \"uniqueReferenceId\": \"Mq4mGZbxmcM82FM26V5VvdY5Z24KEZXufYaHZr_PDwc5hLbx6xZ8cGaGxeoem8Cy439tDPtIINfO5rQKmykC0E_o\",\n            \"warning\": false\n        },\n        {\n            \"id\": 1539317628,\n            \"assetId\": 603644,\n            \"target\": \"status.fortifydata.com\",\n            \"pluginName\": \"Web Server robots.txt Information Disclosure\",\n            \"pluginFamily\": \"Web Servers\",\n            \"synopsis\": \"The remote web server contains a 'robots.txt' file.\",\n            \"description\": \"The remote host contains a file named 'robots.txt' that is intended to prevent web 'robots' from visiting certain directories in a website for maintenance or indexing purposes.  A malicious user may also be able to use the contents of this file to learn of sensitive documents or directories on the affected site and either retrieve them directly or target them for other attacks.\",\n            \"solution\": \"Review the contents of the site's robots.txt file, use Robots META tags instead of entries in the robots.txt file, and/or adjust the web server's access controls to limit access to sensitive material.\",\n            \"severity\": 0,\n            \"cvssBaseScore\": null,\n            \"cvss3BaseScore\": null,\n            \"exploitAvailable\": false,\n            \"cve\": null,\n            \"riskLevel\": \"Very Low\",\n            \"vulnerabilityPublicationDate\": null,\n            \"patchPublicationDate\": null,\n            \"findingDate\": 1761955200000,\n            \"seeAlso\": [\n                \"http://www.robotstxt.org/orig.html\"\n            ],\n            \"uniqueReferenceId\": \"UNslUOGATjvOfnQgIaYTa2h3DSd8Ju00xgViUvMZB6COG6zUwJVQt5ffaWH9hsCwuhNiLCZcJQ85GLxYyl3Vnb6Kq9Bi\",\n            \"warning\": false\n        },\n        {\n            \"id\": 1539318184,\n            \"assetId\": 10017409,\n            \"target\": \"info.fortifydata.com\",\n            \"pluginName\": \"Web Server robots.txt Information Disclosure\",\n            \"pluginFamily\": \"Web Servers\",\n            \"synopsis\": \"The remote web server contains a 'robots.txt' file.\",\n            \"description\": \"The remote host contains a file named 'robots.txt' that is intended to prevent web 'robots' from visiting certain directories in a website for maintenance or indexing purposes.  A malicious user may also be able to use the contents of this file to learn of sensitive documents or directories on the affected site and either retrieve them directly or target them for other attacks.\",\n            \"solution\": \"Review the contents of the site's robots.txt file, use Robots META tags instead of entries in the robots.txt file, and/or adjust the web server's access controls to limit access to sensitive material.\",\n            \"severity\": 0,\n            \"cvssBaseScore\": null,\n            \"cvss3BaseScore\": null,\n            \"exploitAvailable\": false,\n            \"cve\": null,\n            \"riskLevel\": \"Very Low\",\n            \"vulnerabilityPublicationDate\": null,\n            \"patchPublicationDate\": null,\n            \"findingDate\": 1761955200000,\n            \"seeAlso\": [\n                \"http://www.robotstxt.org/orig.html\"\n            ],\n            \"uniqueReferenceId\": \"dw7bjVwLo8WuNgMVKesgPkD3FCk3TdVSBW_maxZygg3FlsC3asKXrTGx64bcIGsJZEtwHioSr4M9a7hITADXY3fsxnlrVy5\",\n            \"warning\": false\n        },\n        {\n            \"id\": 1539318259,\n            \"assetId\": 10017408,\n            \"target\": \"dev.status.fortifydata.com\",\n            \"pluginName\": \"Web Server robots.txt Information Disclosure\",\n            \"pluginFamily\": \"Web Servers\",\n            \"synopsis\": \"The remote web server contains a 'robots.txt' file.\",\n            \"description\": \"The remote host contains a file named 'robots.txt' that is intended to prevent web 'robots' from visiting certain directories in a website for maintenance or indexing purposes.  A malicious user may also be able to use the contents of this file to learn of sensitive documents or directories on the affected site and either retrieve them directly or target them for other attacks.\",\n            \"solution\": \"Review the contents of the site's robots.txt file, use Robots META tags instead of entries in the robots.txt file, and/or adjust the web server's access controls to limit access to sensitive material.\",\n            \"severity\": 0,\n            \"cvssBaseScore\": null,\n            \"cvss3BaseScore\": null,\n            \"exploitAvailable\": false,\n            \"cve\": null,\n            \"riskLevel\": \"Very Low\",\n            \"vulnerabilityPublicationDate\": null,\n            \"patchPublicationDate\": null,\n            \"findingDate\": 1761955200000,\n            \"seeAlso\": [\n                \"http://www.robotstxt.org/orig.html\"\n            ],\n            \"uniqueReferenceId\": \"dw7bjVwLo8SKh2L1mpDTBPsfft7SwMPmI7Vqe3HfXGfvDu5XCYs28gN7wSkehfnmXxtcQRuUlL8aJ3cN8CIHYs1VwRk7zd4\",\n            \"warning\": false\n        },\n        {\n            \"id\": 1539805002,\n            \"assetId\": 11684693,\n            \"target\": \"app.us.fortifydata.com\",\n            \"pluginName\": \"Web Server robots.txt Information Disclosure\",\n            \"pluginFamily\": \"Web Servers\",\n            \"synopsis\": \"The remote web server contains a 'robots.txt' file.\",\n            \"description\": \"The remote host contains a file named 'robots.txt' that is intended to prevent web 'robots' from visiting certain directories in a website for maintenance or indexing purposes.  A malicious user may also be able to use the contents of this file to learn of sensitive documents or directories on the affected site and either retrieve them directly or target them for other attacks.\",\n            \"solution\": \"Review the contents of the site's robots.txt file, use Robots META tags instead of entries in the robots.txt file, and/or adjust the web server's access controls to limit access to sensitive material.\",\n            \"severity\": 0,\n            \"cvssBaseScore\": null,\n            \"cvss3BaseScore\": null,\n            \"exploitAvailable\": false,\n            \"cve\": null,\n            \"riskLevel\": \"Very Low\",\n            \"vulnerabilityPublicationDate\": null,\n            \"patchPublicationDate\": null,\n            \"findingDate\": 1761955200000,\n            \"seeAlso\": [\n                \"http://www.robotstxt.org/orig.html\"\n            ],\n            \"uniqueReferenceId\": \"dwbxUFNz6IFOUOJagmE3zILAJqGto26ZpyENlxhsnVy2a2FGM919dJKNMAce_4nfGqSlW3HTXB9sUBi1i4AJzmqNGxU8ZP0\",\n            \"warning\": false\n        },\n        {\n            \"id\": 1539808876,\n            \"assetId\": 11766647,\n            \"target\": \"app.fortifydata.cc\",\n            \"pluginName\": \"Web Server robots.txt Information Disclosure\",\n            \"pluginFamily\": \"Web Servers\",\n            \"synopsis\": \"The remote web server contains a 'robots.txt' file.\",\n            \"description\": \"The remote host contains a file named 'robots.txt' that is intended to prevent web 'robots' from visiting certain directories in a website for maintenance or indexing purposes.  A malicious user may also be able to use the contents of this file to learn of sensitive documents or directories on the affected site and either retrieve them directly or target them for other attacks.\",\n            \"solution\": \"Review the contents of the site's robots.txt file, use Robots META tags instead of entries in the robots.txt file, and/or adjust the web server's access controls to limit access to sensitive material.\",\n            \"severity\": 0,\n            \"cvssBaseScore\": null,\n            \"cvss3BaseScore\": null,\n            \"exploitAvailable\": false,\n            \"cve\": null,\n            \"riskLevel\": \"Very Low\",\n            \"vulnerabilityPublicationDate\": null,\n            \"patchPublicationDate\": null,\n            \"findingDate\": 1761955200000,\n            \"seeAlso\": [\n                \"http://www.robotstxt.org/orig.html\"\n            ],\n            \"uniqueReferenceId\": \"dwbyXaCpPQzLyyWRNWkjs9hatsUVZhdgRxaQ3sIRprdYoCf583HsWZxoEXocfnBha6NMnxQKOFKchHWjW9CJgZF4EAU7gvV\",\n            \"warning\": false\n        },\n        {\n            \"id\": 1539315962,\n            \"assetId\": 454,\n            \"target\": \"demo.fortifydata.com\",\n            \"pluginName\": \"Web Server No 404 Error Code Check\",\n            \"pluginFamily\": \"Web Servers\",\n            \"synopsis\": \"The remote web server does not return 404 error codes.\",\n            \"description\": \"The remote web server is configured such that it does not return '404 Not Found' error codes when a nonexistent file is requested, perhaps returning instead a site map, search page or authentication page.\\n\\nNessus has enabled some counter measures for this.  However, they might be insufficient.  If a great number of security holes are produced for this port, they might not all be accurate.\",\n            \"solution\": null,\n            \"severity\": 0,\n            \"cvssBaseScore\": null,\n            \"cvss3BaseScore\": null,\n            \"exploitAvailable\": false,\n            \"cve\": null,\n            \"riskLevel\": \"Very Low\",\n            \"vulnerabilityPublicationDate\": null,\n            \"patchPublicationDate\": null,\n            \"findingDate\": 1761955200000,\n            \"seeAlso\": [],\n            \"uniqueReferenceId\": \"ath_MDSOZzgQLctPQQavzKzS8r7csuBAlNgELV9mgLPtVJE7mJ2wEC_C3Yz2_QHesqbGFpmGlVD\",\n            \"warning\": false\n        },\n        {\n            \"id\": 1539315969,\n            \"assetId\": 144,\n            \"target\": \"fortifydata.com\",\n            \"pluginName\": \"Web Server No 404 Error Code Check\",\n            \"pluginFamily\": \"Web Servers\",\n            \"synopsis\": \"The remote web server does not return 404 error codes.\",\n            \"description\": \"The remote web server is configured such that it does not return '404 Not Found' error codes when a nonexistent file is requested, perhaps returning instead a site map, search page or authentication page.\\n\\nNessus has enabled some counter measures for this.  However, they might be insufficient.  If a great number of security holes are produced for this port, they might not all be accurate.\",\n            \"solution\": null,\n            \"severity\": 0,\n            \"cvssBaseScore\": null,\n            \"cvss3BaseScore\": null,\n            \"exploitAvailable\": false,\n            \"cve\": null,\n            \"riskLevel\": \"Very Low\",\n            \"vulnerabilityPublicationDate\": null,\n            \"patchPublicationDate\": null,\n            \"findingDate\": 1761955200000,\n            \"seeAlso\": [],\n            \"uniqueReferenceId\": \"9SmbdhZkP8lROAMG7i91AjdzqJW4lWHyheKeYQDTR2Y1tzf4pgc3ZDV0aqxuFjpUKQoMrb9yYSq\",\n            \"warning\": false\n        },\n        {\n            \"id\": 1539315995,\n            \"assetId\": 2862,\n            \"target\": \"api.fortifydata.com\",\n            \"pluginName\": \"Web Server No 404 Error Code Check\",\n            \"pluginFamily\": \"Web Servers\",\n            \"synopsis\": \"The remote web server does not return 404 error codes.\",\n            \"description\": \"The remote web server is configured such that it does not return '404 Not Found' error codes when a nonexistent file is requested, perhaps returning instead a site map, search page or authentication page.\\n\\nNessus has enabled some counter measures for this.  However, they might be insufficient.  If a great number of security holes are produced for this port, they might not all be accurate.\",\n            \"solution\": null,\n            \"severity\": 0,\n            \"cvssBaseScore\": null,\n            \"cvss3BaseScore\": null,\n            \"exploitAvailable\": false,\n            \"cve\": null,\n            \"riskLevel\": \"Very Low\",\n            \"vulnerabilityPublicationDate\": null,\n            \"patchPublicationDate\": null,\n            \"findingDate\": 1761955200000,\n            \"seeAlso\": [],\n            \"uniqueReferenceId\": \"EUZwuTwtKxgIev0EiP16yg5K9VHEpVD6jCtMnDQZauSiCkp_5hK6oL8z1AiIPnwCIhboSBUo1LW5\",\n            \"warning\": false\n        },\n        {\n            \"id\": 1539316059,\n            \"assetId\": 9967,\n            \"target\": \"autodiscover.fortifydata.com\",\n            \"pluginName\": \"Web Server No 404 Error Code Check\",\n            \"pluginFamily\": \"Web Servers\",\n            \"synopsis\": \"The remote web server does not return 404 error codes.\",\n            \"description\": \"The remote web server is configured such that it does not return '404 Not Found' error codes when a nonexistent file is requested, perhaps returning instead a site map, search page or authentication page.\\n\\nNessus has enabled some counter measures for this.  However, they might be insufficient.  If a great number of security holes are produced for this port, they might not all be accurate.\",\n            \"solution\": null,\n            \"severity\": 0,\n            \"cvssBaseScore\": null,\n            \"cvss3BaseScore\": null,\n            \"exploitAvailable\": false,\n            \"cve\": null,\n            \"riskLevel\": \"Very Low\",\n            \"vulnerabilityPublicationDate\": null,\n            \"patchPublicationDate\": null,\n            \"findingDate\": 1761955200000,\n            \"seeAlso\": [],\n            \"uniqueReferenceId\": \"KCnH_XYUqYEWlRSPuj1vy9msC4L8p63LZ8E3J_NdikwaXryQlC4Whic5jVKSTzfgHEcNiA1OmE3c\",\n            \"warning\": false\n        },\n        {\n            \"id\": 1539316084,\n            \"assetId\": 1005,\n            \"target\": \"eu.fortifydata.com\",\n            \"pluginName\": \"Web Server No 404 Error Code Check\",\n            \"pluginFamily\": \"Web Servers\",\n            \"synopsis\": \"The remote web server does not return 404 error codes.\",\n            \"description\": \"The remote web server is configured such that it does not return '404 Not Found' error codes when a nonexistent file is requested, perhaps returning instead a site map, search page or authentication page.\\n\\nNessus has enabled some counter measures for this.  However, they might be insufficient.  If a great number of security holes are produced for this port, they might not all be accurate.\",\n            \"solution\": null,\n            \"severity\": 0,\n            \"cvssBaseScore\": null,\n            \"cvss3BaseScore\": null,\n            \"exploitAvailable\": false,\n            \"cve\": null,\n            \"riskLevel\": \"Very Low\",\n            \"vulnerabilityPublicationDate\": null,\n            \"patchPublicationDate\": null,\n            \"findingDate\": 1761955200000,\n            \"seeAlso\": [],\n            \"uniqueReferenceId\": \"E43pla5qhrInBb1j1EgGpzgeXF2dr7BmQ7ii9RS5HlU1dY24dBPWSr6Vqvur3lNFDFgBN3Kd6mw_\",\n            \"warning\": false\n        },\n        {\n            \"id\": 1539316243,\n            \"assetId\": 676,\n            \"target\": \"vpn.fortifydata.com\",\n            \"pluginName\": \"Web Server No 404 Error Code Check\",\n            \"pluginFamily\": \"Web Servers\",\n            \"synopsis\": \"The remote web server does not return 404 error codes.\",\n            \"description\": \"The remote web server is configured such that it does not return '404 Not Found' error codes when a nonexistent file is requested, perhaps returning instead a site map, search page or authentication page.\\n\\nNessus has enabled some counter measures for this.  However, they might be insufficient.  If a great number of security holes are produced for this port, they might not all be accurate.\",\n            \"solution\": null,\n            \"severity\": 0,\n            \"cvssBaseScore\": null,\n            \"cvss3BaseScore\": null,\n            \"exploitAvailable\": false,\n            \"cve\": null,\n            \"riskLevel\": \"Very Low\",\n            \"vulnerabilityPublicationDate\": null,\n            \"patchPublicationDate\": null,\n            \"findingDate\": 1761955200000,\n            \"seeAlso\": [],\n            \"uniqueReferenceId\": \"aSEnJuQtvXsWGplRsOlX45BFgbNILhEzDlv9xckhXEvJDYWchyn2CBd7XD84dT15T0mpvhjqD2i\",\n            \"warning\": false\n        },\n        {\n            \"id\": 1539316508,\n            \"assetId\": 140,\n            \"target\": \"app.fortifydata.com\",\n            \"pluginName\": \"Web Server No 404 Error Code Check\",\n            \"pluginFamily\": \"Web Servers\",\n            \"synopsis\": \"The remote web server does not return 404 error codes.\",\n            \"description\": \"The remote web server is configured such that it does not return '404 Not Found' error codes when a nonexistent file is requested, perhaps returning instead a site map, search page or authentication page.\\n\\nNessus has enabled some counter measures for this.  However, they might be insufficient.  If a great number of security holes are produced for this port, they might not all be accurate.\",\n            \"solution\": null,\n            \"severity\": 0,\n            \"cvssBaseScore\": null,\n            \"cvss3BaseScore\": null,\n            \"exploitAvailable\": false,\n            \"cve\": null,\n            \"riskLevel\": \"Very Low\",\n            \"vulnerabilityPublicationDate\": null,\n            \"patchPublicationDate\": null,\n            \"findingDate\": 1761955200000,\n            \"seeAlso\": [],\n            \"uniqueReferenceId\": \"9Sm89zfW7p26obYZ8pU7JRbgTuNtJCWw63sYj4n_7fD1vXmTDfjXBL_wv8d14furMlaYHVYIvKp\",\n            \"warning\": false\n        },\n        {\n            \"id\": 1539317627,\n            \"assetId\": 603644,\n            \"target\": \"status.fortifydata.com\",\n            \"pluginName\": \"Web Server No 404 Error Code Check\",\n            \"pluginFamily\": \"Web Servers\",\n            \"synopsis\": \"The remote web server does not return 404 error codes.\",\n            \"description\": \"The remote web server is configured such that it does not return '404 Not Found' error codes when a nonexistent file is requested, perhaps returning instead a site map, search page or authentication page.\\n\\nNessus has enabled some counter measures for this.  However, they might be insufficient.  If a great number of security holes are produced for this port, they might not all be accurate.\",\n            \"solution\": null,\n            \"severity\": 0,\n            \"cvssBaseScore\": null,\n            \"cvss3BaseScore\": null,\n            \"exploitAvailable\": false,\n            \"cve\": null,\n            \"riskLevel\": \"Very Low\",\n            \"vulnerabilityPublicationDate\": null,\n            \"patchPublicationDate\": null,\n            \"findingDate\": 1761955200000,\n            \"seeAlso\": [],\n            \"uniqueReferenceId\": \"bzNDxUzfHAsJMnynB2NKEE3xO0vdl2tyvu3woWRkrCUQDboozSbKMBr50b8XHny0ZQDAeHos1qzXLHT\",\n            \"warning\": false\n        },\n        {\n            \"id\": 1539317706,\n            \"assetId\": 5661407,\n            \"target\": \"www.fortifydata.co.uk\",\n            \"pluginName\": \"Web Server No 404 Error Code Check\",\n            \"pluginFamily\": \"Web Servers\",\n            \"synopsis\": \"The remote web server does not return 404 error codes.\",\n            \"description\": \"The remote web server is configured such that it does not return '404 Not Found' error codes when a nonexistent file is requested, perhaps returning instead a site map, search page or authentication page.\\n\\nNessus has enabled some counter measures for this.  However, they might be insufficient.  If a great number of security holes are produced for this port, they might not all be accurate.\",\n            \"solution\": null,\n            \"severity\": 0,\n            \"cvssBaseScore\": null,\n            \"cvss3BaseScore\": null,\n            \"exploitAvailable\": false,\n            \"cve\": null,\n            \"riskLevel\": \"Very Low\",\n            \"vulnerabilityPublicationDate\": null,\n            \"patchPublicationDate\": null,\n            \"findingDate\": 1761955200000,\n            \"seeAlso\": [],\n            \"uniqueReferenceId\": \"Ka3x0et_2ggVPSTVO6oKhFa7Kw9Zq6dA7glm8bnEOZ_I4VssAyTCDZ4TQO4hzpqnboj8o2SvpdITFoYv\",\n            \"warning\": false\n        },\n        {\n            \"id\": 1539317739,\n            \"assetId\": 1744758,\n            \"target\": \"fortifydata.co.uk\",\n            \"pluginName\": \"Web Server No 404 Error Code Check\",\n            \"pluginFamily\": \"Web Servers\",\n            \"synopsis\": \"The remote web server does not return 404 error codes.\",\n            \"description\": \"The remote web server is configured such that it does not return '404 Not Found' error codes when a nonexistent file is requested, perhaps returning instead a site map, search page or authentication page.\\n\\nNessus has enabled some counter measures for this.  However, they might be insufficient.  If a great number of security holes are produced for this port, they might not all be accurate.\",\n            \"solution\": null,\n            \"severity\": 0,\n            \"cvssBaseScore\": null,\n            \"cvss3BaseScore\": null,\n            \"exploitAvailable\": false,\n            \"cve\": null,\n            \"riskLevel\": \"Very Low\",\n            \"vulnerabilityPublicationDate\": null,\n            \"patchPublicationDate\": null,\n            \"findingDate\": 1761955200000,\n            \"seeAlso\": [],\n            \"uniqueReferenceId\": \"GHFVtMLgAhOV1SJC4fmjgnzjqrB5QHJ1uwGS3R1T247Zd1TnRyrQb8GJXAc0YEcJ_hfjTGaog7WdAYZO\",\n            \"warning\": false\n        },\n        {\n            \"id\": 1539317942,\n            \"assetId\": 5661408,\n            \"target\": \"www.fortifydata.es\",\n            \"pluginName\": \"Web Server No 404 Error Code Check\",\n            \"pluginFamily\": \"Web Servers\",\n            \"synopsis\": \"The remote web server does not return 404 error codes.\",\n            \"description\": \"The remote web server is configured such that it does not return '404 Not Found' error codes when a nonexistent file is requested, perhaps returning instead a site map, search page or authentication page.\\n\\nNessus has enabled some counter measures for this.  However, they might be insufficient.  If a great number of security holes are produced for this port, they might not all be accurate.\",\n            \"solution\": null,\n            \"severity\": 0,\n            \"cvssBaseScore\": null,\n            \"cvss3BaseScore\": null,\n            \"exploitAvailable\": false,\n            \"cve\": null,\n            \"riskLevel\": \"Very Low\",\n            \"vulnerabilityPublicationDate\": null,\n            \"patchPublicationDate\": null,\n            \"findingDate\": 1761955200000,\n            \"seeAlso\": [],\n            \"uniqueReferenceId\": \"Ka3x0et_31slWiz_Kc_rsETrte1uuKhmwqay8JGdDEX0OBpi52NAGVAC7oxLH4uXOhPCL2uOBUMWD0KL\",\n            \"warning\": false\n        },\n        {\n            \"id\": 1539318048,\n            \"assetId\": 1744759,\n            \"target\": \"fortifydata.es\",\n            \"pluginName\": \"Web Server No 404 Error Code Check\",\n            \"pluginFamily\": \"Web Servers\",\n            \"synopsis\": \"The remote web server does not return 404 error codes.\",\n            \"description\": \"The remote web server is configured such that it does not return '404 Not Found' error codes when a nonexistent file is requested, perhaps returning instead a site map, search page or authentication page.\\n\\nNessus has enabled some counter measures for this.  However, they might be insufficient.  If a great number of security holes are produced for this port, they might not all be accurate.\",\n            \"solution\": null,\n            \"severity\": 0,\n            \"cvssBaseScore\": null,\n            \"cvss3BaseScore\": null,\n            \"exploitAvailable\": false,\n            \"cve\": null,\n            \"riskLevel\": \"Very Low\",\n            \"vulnerabilityPublicationDate\": null,\n            \"patchPublicationDate\": null,\n            \"findingDate\": 1761955200000,\n            \"seeAlso\": [],\n            \"uniqueReferenceId\": \"GHFVtMLgB2_l8ipH0lY0rnhD99sBVkMOTGw34okrRK4hWIQdm2lOe5bseaFv5jhjCaLOfFNHsO_gyAM3\",\n            \"warning\": false\n        },\n        {\n            \"id\": 1539318102,\n            \"assetId\": 1744760,\n            \"target\": \"fortifydata.io\",\n            \"pluginName\": \"Web Server No 404 Error Code Check\",\n            \"pluginFamily\": \"Web Servers\",\n            \"synopsis\": \"The remote web server does not return 404 error codes.\",\n            \"description\": \"The remote web server is configured such that it does not return '404 Not Found' error codes when a nonexistent file is requested, perhaps returning instead a site map, search page or authentication page.\\n\\nNessus has enabled some counter measures for this.  However, they might be insufficient.  If a great number of security holes are produced for this port, they might not all be accurate.\",\n            \"solution\": null,\n            \"severity\": 0,\n            \"cvssBaseScore\": null,\n            \"cvss3BaseScore\": null,\n            \"exploitAvailable\": false,\n            \"cve\": null,\n            \"riskLevel\": \"Very Low\",\n            \"vulnerabilityPublicationDate\": null,\n            \"patchPublicationDate\": null,\n            \"findingDate\": 1761955200000,\n            \"seeAlso\": [],\n            \"uniqueReferenceId\": \"GHFVtMLjAXOBjVj2KdMcygWYn3am5oCuwd88cR7TqaCD26q2PcI8MnxZd4eB9geT6L6RpbTZbERTcDSN\",\n            \"warning\": false\n        },\n        {\n            \"id\": 1539318175,\n            \"assetId\": 10017407,\n            \"target\": \"changelog.fortifydata.com\",\n            \"pluginName\": \"Web Server No 404 Error Code Check\",\n            \"pluginFamily\": \"Web Servers\",\n            \"synopsis\": \"The remote web server does not return 404 error codes.\",\n            \"description\": \"The remote web server is configured such that it does not return '404 Not Found' error codes when a nonexistent file is requested, perhaps returning instead a site map, search page or authentication page.\\n\\nNessus has enabled some counter measures for this.  However, they might be insufficient.  If a great number of security holes are produced for this port, they might not all be accurate.\",\n            \"solution\": null,\n            \"severity\": 0,\n            \"cvssBaseScore\": null,\n            \"cvss3BaseScore\": null,\n            \"exploitAvailable\": false,\n            \"cve\": null,\n            \"riskLevel\": \"Very Low\",\n            \"vulnerabilityPublicationDate\": null,\n            \"patchPublicationDate\": null,\n            \"findingDate\": 1761955200000,\n            \"seeAlso\": [],\n            \"uniqueReferenceId\": \"2LolUFGMOmfQSi0SALcFGZD4fVsZUyyDioB0jHYn0EwB6zeCWCuGV9LTzE7sFB3wIZydE6SHFIZOMLnry4\",\n            \"warning\": false\n        },\n        {\n            \"id\": 1539318258,\n            \"assetId\": 10017408,\n            \"target\": \"dev.status.fortifydata.com\",\n            \"pluginName\": \"Web Server No 404 Error Code Check\",\n            \"pluginFamily\": \"Web Servers\",\n            \"synopsis\": \"The remote web server does not return 404 error codes.\",\n            \"description\": \"The remote web server is configured such that it does not return '404 Not Found' error codes when a nonexistent file is requested, perhaps returning instead a site map, search page or authentication page.\\n\\nNessus has enabled some counter measures for this.  However, they might be insufficient.  If a great number of security holes are produced for this port, they might not all be accurate.\",\n            \"solution\": null,\n            \"severity\": 0,\n            \"cvssBaseScore\": null,\n            \"cvss3BaseScore\": null,\n            \"exploitAvailable\": false,\n            \"cve\": null,\n            \"riskLevel\": \"Very Low\",\n            \"vulnerabilityPublicationDate\": null,\n            \"patchPublicationDate\": null,\n            \"findingDate\": 1761955200000,\n            \"seeAlso\": [],\n            \"uniqueReferenceId\": \"2LolUFGMOmgC2J7igQ8MhGO3ZebHM3Dgma_a8TYVjdlg2SYiTr_aP7OQ4mp384bbNza79BeHi1buQOl3kk\",\n            \"warning\": false\n        },\n        {\n            \"id\": 1539318417,\n            \"assetId\": 11989498,\n            \"target\": \"m.fortifydata.cc\",\n            \"pluginName\": \"Web Server No 404 Error Code Check\",\n            \"pluginFamily\": \"Web Servers\",\n            \"synopsis\": \"The remote web server does not return 404 error codes.\",\n            \"description\": \"The remote web server is configured such that it does not return '404 Not Found' error codes when a nonexistent file is requested, perhaps returning instead a site map, search page or authentication page.\\n\\nNessus has enabled some counter measures for this.  However, they might be insufficient.  If a great number of security holes are produced for this port, they might not all be accurate.\",\n            \"solution\": null,\n            \"severity\": 0,\n            \"cvssBaseScore\": null,\n            \"cvss3BaseScore\": null,\n            \"exploitAvailable\": false,\n            \"cve\": null,\n            \"riskLevel\": \"Very Low\",\n            \"vulnerabilityPublicationDate\": null,\n            \"patchPublicationDate\": null,\n            \"findingDate\": 1761955200000,\n            \"seeAlso\": [],\n            \"uniqueReferenceId\": \"2Lpfu3SHzhT92UKxz885KeiHy6MV3VEC8UD87Xd2cjsq6pU32_ZtHzvLMUOC208kvJlTNfKU0iI92n5ntV\",\n            \"warning\": false\n        },\n        {\n            \"id\": 1539804997,\n            \"assetId\": 11684693,\n            \"target\": \"app.us.fortifydata.com\",\n            \"pluginName\": \"Web Server No 404 Error Code Check\",\n            \"pluginFamily\": \"Web Servers\",\n            \"synopsis\": \"The remote web server does not return 404 error codes.\",\n            \"description\": \"The remote web server is configured such that it does not return '404 Not Found' error codes when a nonexistent file is requested, perhaps returning instead a site map, search page or authentication page.\\n\\nNessus has enabled some counter measures for this.  However, they might be insufficient.  If a great number of security holes are produced for this port, they might not all be accurate.\",\n            \"solution\": null,\n            \"severity\": 0,\n            \"cvssBaseScore\": null,\n            \"cvss3BaseScore\": null,\n            \"exploitAvailable\": false,\n            \"cve\": null,\n            \"riskLevel\": \"Very Low\",\n            \"vulnerabilityPublicationDate\": null,\n            \"patchPublicationDate\": null,\n            \"findingDate\": 1761955200000,\n            \"seeAlso\": [],\n            \"uniqueReferenceId\": \"2LpeQIVhZPnqJzV3e6zVGAUv7SDGPkQgLpnMBPRd0efbXs2PuFlhamMKbLRoBRtQek21ONalGM6nR5Egbj\",\n            \"warning\": false\n        },\n        {\n            \"id\": 1539808871,\n            \"assetId\": 11766647,\n            \"target\": \"app.fortifydata.cc\",\n            \"pluginName\": \"Web Server No 404 Error Code Check\",\n            \"pluginFamily\": \"Web Servers\",\n            \"synopsis\": \"The remote web server does not return 404 error codes.\",\n            \"description\": \"The remote web server is configured such that it does not return '404 Not Found' error codes when a nonexistent file is requested, perhaps returning instead a site map, search page or authentication page.\\n\\nNessus has enabled some counter measures for this.  However, they might be insufficient.  If a great number of security holes are produced for this port, they might not all be accurate.\",\n            \"solution\": null,\n            \"severity\": 0,\n            \"cvssBaseScore\": null,\n            \"cvss3BaseScore\": null,\n            \"exploitAvailable\": false,\n            \"cve\": null,\n            \"riskLevel\": \"Very Low\",\n            \"vulnerabilityPublicationDate\": null,\n            \"patchPublicationDate\": null,\n            \"findingDate\": 1761955200000,\n            \"seeAlso\": [],\n            \"uniqueReferenceId\": \"2Lpf33CFTxF5aZhNigKVja66LttzUOOswwZdcsLqKRRW2rjZMfnZ4c83S2Vr6kHpryckhSsG0jJ0YdpEFN\",\n            \"warning\": false\n        },\n        {\n            \"id\": 1539315956,\n            \"assetId\": 454,\n            \"target\": \"demo.fortifydata.com\",\n            \"pluginName\": \"nginx HTTP Server Detection\",\n            \"pluginFamily\": \"Web Servers\",\n            \"synopsis\": \"The nginx HTTP server was detected on the remote host.\",\n            \"description\": \"Nessus was able to detect the nginx HTTP server by looking at the HTTP banner on the remote host.\",\n            \"solution\": null,\n            \"severity\": 0,\n            \"cvssBaseScore\": null,\n            \"cvss3BaseScore\": null,\n            \"exploitAvailable\": false,\n            \"cve\": \"\",\n            \"riskLevel\": \"Very Low\",\n            \"vulnerabilityPublicationDate\": null,\n            \"patchPublicationDate\": null,\n            \"findingDate\": 1761955200000,\n            \"seeAlso\": [\n                \"https://nginx.org/\"\n            ],\n            \"uniqueReferenceId\": \"9efm6hoFRQ0XzENVTbtV8ayJXZlt7hezAt_o9hoG6K6FYiCAjTJlxQJYmro4c5yX049\",\n            \"warning\": false\n        },\n        {\n            \"id\": 1539315991,\n            \"assetId\": 2862,\n            \"target\": \"api.fortifydata.com\",\n            \"pluginName\": \"nginx HTTP Server Detection\",\n            \"pluginFamily\": \"Web Servers\",\n            \"synopsis\": \"The nginx HTTP server was detected on the remote host.\",\n            \"description\": \"Nessus was able to detect the nginx HTTP server by looking at the HTTP banner on the remote host.\",\n            \"solution\": null,\n            \"severity\": 0,\n            \"cvssBaseScore\": null,\n            \"cvss3BaseScore\": null,\n            \"exploitAvailable\": false,\n            \"cve\": \"\",\n            \"riskLevel\": \"Very Low\",\n            \"vulnerabilityPublicationDate\": null,\n            \"patchPublicationDate\": null,\n            \"findingDate\": 1761955200000,\n            \"seeAlso\": [\n                \"https://nginx.org/\"\n            ],\n            \"uniqueReferenceId\": \"A3WDmI_d5ydGlIj_HjBtEhWSwfbd34c9yaoUq76NG1WEYjQN8A4JzoS2JAaN1DwD0WoC\",\n            \"warning\": false\n        },\n        {\n            \"id\": 1539316078,\n            \"assetId\": 1005,\n            \"target\": \"eu.fortifydata.com\",\n            \"pluginName\": \"nginx HTTP Server Detection\",\n            \"pluginFamily\": \"Web Servers\",\n            \"synopsis\": \"The nginx HTTP server was detected on the remote host.\",\n            \"description\": \"Nessus was able to detect the nginx HTTP server by looking at the HTTP banner on the remote host.\",\n            \"solution\": null,\n            \"severity\": 0,\n            \"cvssBaseScore\": null,\n            \"cvss3BaseScore\": null,\n            \"exploitAvailable\": false,\n            \"cve\": \"\",\n            \"riskLevel\": \"Very Low\",\n            \"vulnerabilityPublicationDate\": null,\n            \"patchPublicationDate\": null,\n            \"findingDate\": 1761955200000,\n            \"seeAlso\": [\n                \"https://nginx.org/\"\n            ],\n            \"uniqueReferenceId\": \"zkhbtQ8aPM5ZXV6KZtuKXKhYVv5QNh_6i_V33nxKWMP7BSPisstoiMz66FDXYoJJphLw\",\n            \"warning\": false\n        },\n        {\n            \"id\": 1539316502,\n            \"assetId\": 140,\n            \"target\": \"app.fortifydata.com\",\n            \"pluginName\": \"nginx HTTP Server Detection\",\n            \"pluginFamily\": \"Web Servers\",\n            \"synopsis\": \"The nginx HTTP server was detected on the remote host.\",\n            \"description\": \"Nessus was able to detect the nginx HTTP server by looking at the HTTP banner on the remote host.\",\n            \"solution\": null,\n            \"severity\": 0,\n            \"cvssBaseScore\": null,\n            \"cvss3BaseScore\": null,\n            \"exploitAvailable\": false,\n            \"cve\": \"\",\n            \"riskLevel\": \"Very Low\",\n            \"vulnerabilityPublicationDate\": null,\n            \"patchPublicationDate\": null,\n            \"findingDate\": 1761955200000,\n            \"seeAlso\": [\n                \"https://nginx.org/\"\n            ],\n            \"uniqueReferenceId\": \"8HOn_HJ1WyvjlmeZYUAKCIrChtfCJGJqhpo6U4AH7gzrSwq3UdzrViCuFdq1VwxZAFW\",\n            \"warning\": false\n        },\n        {\n            \"id\": 1539804996,\n            \"assetId\": 11684693,\n            \"target\": \"app.us.fortifydata.com\",\n            \"pluginName\": \"nginx HTTP Server Detection\",\n            \"pluginFamily\": \"Web Servers\",\n            \"synopsis\": \"The nginx HTTP server was detected on the remote host.\",\n            \"description\": \"Nessus was able to detect the nginx HTTP server by looking at the HTTP banner on the remote host.\",\n            \"solution\": null,\n            \"severity\": 0,\n            \"cvssBaseScore\": null,\n            \"cvss3BaseScore\": null,\n            \"exploitAvailable\": false,\n            \"cve\": \"\",\n            \"riskLevel\": \"Very Low\",\n            \"vulnerabilityPublicationDate\": null,\n            \"patchPublicationDate\": null,\n            \"findingDate\": 1761955200000,\n            \"seeAlso\": [\n                \"https://nginx.org/\"\n            ],\n            \"uniqueReferenceId\": \"2qT5Zh1f43n_xHrhCg9t2gmDfFCDbg4x2o_uFlw4giLzvIcGKG3eZ_qdhEf9h4mkoV57eKgmSQ\",\n            \"warning\": false\n        },\n        {\n            \"id\": 1539808870,\n            \"assetId\": 11766647,\n            \"target\": \"app.fortifydata.cc\",\n            \"pluginName\": \"nginx HTTP Server Detection\",\n            \"pluginFamily\": \"Web Servers\",\n            \"synopsis\": \"The nginx HTTP server was detected on the remote host.\",\n            \"description\": \"Nessus was able to detect the nginx HTTP server by looking at the HTTP banner on the remote host.\",\n            \"solution\": null,\n            \"severity\": 0,\n            \"cvssBaseScore\": null,\n            \"cvss3BaseScore\": null,\n            \"exploitAvailable\": false,\n            \"cve\": \"\",\n            \"riskLevel\": \"Very Low\",\n            \"vulnerabilityPublicationDate\": null,\n            \"patchPublicationDate\": null,\n            \"findingDate\": 1761955200000,\n            \"seeAlso\": [\n                \"https://nginx.org/\"\n            ],\n            \"uniqueReferenceId\": \"2qT6a2d2hdGOeyTbW3yfBNDMhhF3Ldmdl3L6IteV_3k4tPn7BXgEM1KLXm515H73cennSOc1yj\",\n            \"warning\": false\n        },\n        {\n            \"id\": 1539315960,\n            \"assetId\": 454,\n            \"target\": \"demo.fortifydata.com\",\n            \"pluginName\": \"Web mirroring\",\n            \"pluginFamily\": \"Web Servers\",\n            \"synopsis\": \"Nessus can crawl the remote website.\",\n            \"description\": \"This plugin makes a mirror of the remote website(s) and extracts the list of CGIs that are used by the remote host. \\n\\nIt is suggested that you change the number of pages to mirror in the 'Options' section of the client.\",\n            \"solution\": null,\n            \"severity\": 0,\n            \"cvssBaseScore\": null,\n            \"cvss3BaseScore\": null,\n            \"exploitAvailable\": false,\n            \"cve\": null,\n            \"riskLevel\": \"Very Low\",\n            \"vulnerabilityPublicationDate\": null,\n            \"patchPublicationDate\": null,\n            \"findingDate\": 1761955200000,\n            \"seeAlso\": [],\n            \"uniqueReferenceId\": \"6KcydR1qykboj8WgFKXD9bfIfknhaj9I0X_DLYlRdTbCsBm\",\n            \"warning\": false\n        },\n        {\n            \"id\": 1539315979,\n            \"assetId\": 144,\n            \"target\": \"fortifydata.com\",\n            \"pluginName\": \"Web mirroring\",\n            \"pluginFamily\": \"Web Servers\",\n            \"synopsis\": \"Nessus can crawl the remote website.\",\n            \"description\": \"This plugin makes a mirror of the remote website(s) and extracts the list of CGIs that are used by the remote host. \\n\\nIt is suggested that you change the number of pages to mirror in the 'Options' section of the client.\",\n            \"solution\": null,\n            \"severity\": 0,\n            \"cvssBaseScore\": null,\n            \"cvss3BaseScore\": null,\n            \"exploitAvailable\": false,\n            \"cve\": null,\n            \"riskLevel\": \"Very Low\",\n            \"vulnerabilityPublicationDate\": null,\n            \"patchPublicationDate\": null,\n            \"findingDate\": 1761955200000,\n            \"seeAlso\": [],\n            \"uniqueReferenceId\": \"6lNTurmXKsz1nlD7YRyewUvqqO_a9OFxcFkAmmm2yf7iJk9\",\n            \"warning\": false\n        },\n        {\n            \"id\": 1539315993,\n            \"assetId\": 2862,\n            \"target\": \"api.fortifydata.com\",\n            \"pluginName\": \"Web mirroring\",\n            \"pluginFamily\": \"Web Servers\",\n            \"synopsis\": \"Nessus can crawl the remote website.\",\n            \"description\": \"This plugin makes a mirror of the remote website(s) and extracts the list of CGIs that are used by the remote host. \\n\\nIt is suggested that you change the number of pages to mirror in the 'Options' section of the client.\",\n            \"solution\": null,\n            \"severity\": 0,\n            \"cvssBaseScore\": null,\n            \"cvss3BaseScore\": null,\n            \"exploitAvailable\": false,\n            \"cve\": null,\n            \"riskLevel\": \"Very Low\",\n            \"vulnerabilityPublicationDate\": null,\n            \"patchPublicationDate\": null,\n            \"findingDate\": 1761955200000,\n            \"seeAlso\": [],\n            \"uniqueReferenceId\": \"qk5iU8aT3B9UyH0Y0sRM_Igw_W7qNN_CXU9zDf1lBsc4uyIP\",\n            \"warning\": false\n        },\n        {\n            \"id\": 1539316082,\n            \"assetId\": 1005,\n            \"target\": \"eu.fortifydata.com\",\n            \"pluginName\": \"Web mirroring\",\n            \"pluginFamily\": \"Web Servers\",\n            \"synopsis\": \"Nessus can crawl the remote website.\",\n            \"description\": \"This plugin makes a mirror of the remote website(s) and extracts the list of CGIs that are used by the remote host. \\n\\nIt is suggested that you change the number of pages to mirror in the 'Options' section of the client.\",\n            \"solution\": null,\n            \"severity\": 0,\n            \"cvssBaseScore\": null,\n            \"cvss3BaseScore\": null,\n            \"exploitAvailable\": false,\n            \"cve\": null,\n            \"riskLevel\": \"Very Low\",\n            \"vulnerabilityPublicationDate\": null,\n            \"patchPublicationDate\": null,\n            \"findingDate\": 1761955200000,\n            \"seeAlso\": [],\n            \"uniqueReferenceId\": \"pN23Awu_PxlVlzNTwE1uonGdwfWLLlb1PjRgh85rvAhLNDZJ\",\n            \"warning\": false\n        },\n        {\n            \"id\": 1539316241,\n            \"assetId\": 676,\n            \"target\": \"vpn.fortifydata.com\",\n            \"pluginName\": \"Web mirroring\",\n            \"pluginFamily\": \"Web Servers\",\n            \"synopsis\": \"Nessus can crawl the remote website.\",\n            \"description\": \"This plugin makes a mirror of the remote website(s) and extracts the list of CGIs that are used by the remote host. \\n\\nIt is suggested that you change the number of pages to mirror in the 'Options' section of the client.\",\n            \"solution\": null,\n            \"severity\": 0,\n            \"cvssBaseScore\": null,\n            \"cvss3BaseScore\": null,\n            \"exploitAvailable\": false,\n            \"cve\": null,\n            \"riskLevel\": \"Very Low\",\n            \"vulnerabilityPublicationDate\": null,\n            \"patchPublicationDate\": null,\n            \"findingDate\": 1761955200000,\n            \"seeAlso\": [],\n            \"uniqueReferenceId\": \"6_wk_sWrTNOf22a3sjc4ocNnwBiETBf2WHH6yxwrdR3u_31\",\n            \"warning\": false\n        },\n        {\n            \"id\": 1539316506,\n            \"assetId\": 140,\n            \"target\": \"app.fortifydata.com\",\n            \"pluginName\": \"Web mirroring\",\n            \"pluginFamily\": \"Web Servers\",\n            \"synopsis\": \"Nessus can crawl the remote website.\",\n            \"description\": \"This plugin makes a mirror of the remote website(s) and extracts the list of CGIs that are used by the remote host. \\n\\nIt is suggested that you change the number of pages to mirror in the 'Options' section of the client.\",\n            \"solution\": null,\n            \"severity\": 0,\n            \"cvssBaseScore\": null,\n            \"cvss3BaseScore\": null,\n            \"exploitAvailable\": false,\n            \"cve\": null,\n            \"riskLevel\": \"Very Low\",\n            \"vulnerabilityPublicationDate\": null,\n            \"patchPublicationDate\": null,\n            \"findingDate\": 1761955200000,\n            \"seeAlso\": [],\n            \"uniqueReferenceId\": \"6lNRwr6XIEnSvIu3aPZME7HgpFKSAOHFQLicj2xipM7bnE8\",\n            \"warning\": false\n        },\n        {\n            \"id\": 1539318257,\n            \"assetId\": 10017408,\n            \"target\": \"dev.status.fortifydata.com\",\n            \"pluginName\": \"Web mirroring\",\n            \"pluginFamily\": \"Web Servers\",\n            \"synopsis\": \"Nessus can crawl the remote website.\",\n            \"description\": \"This plugin makes a mirror of the remote website(s) and extracts the list of CGIs that are used by the remote host. \\n\\nIt is suggested that you change the number of pages to mirror in the 'Options' section of the client.\",\n            \"solution\": null,\n            \"severity\": 0,\n            \"cvssBaseScore\": null,\n            \"cvss3BaseScore\": null,\n            \"exploitAvailable\": false,\n            \"cve\": null,\n            \"riskLevel\": \"Very Low\",\n            \"vulnerabilityPublicationDate\": null,\n            \"patchPublicationDate\": null,\n            \"findingDate\": 1761955200000,\n            \"seeAlso\": [],\n            \"uniqueReferenceId\": \"1MzkvYAUy3YYNVkkuNSzmiBmdXmmN2r0kfYRj7DjT2L3g4sMjIBis3\",\n            \"warning\": false\n        },\n        {\n            \"id\": 1539315961,\n            \"assetId\": 454,\n            \"target\": \"demo.fortifydata.com\",\n            \"pluginName\": \"Web Server Directory Enumeration\",\n            \"pluginFamily\": \"Web Servers\",\n            \"synopsis\": \"It is possible to enumerate directories on the web server.\",\n            \"description\": \"This plugin attempts to determine the presence of various common directories on the remote web server.  By sending a request for a directory, the web server response code indicates if it is a valid directory or not.\",\n            \"solution\": null,\n            \"severity\": 0,\n            \"cvssBaseScore\": null,\n            \"cvss3BaseScore\": null,\n            \"exploitAvailable\": false,\n            \"cve\": \"\",\n            \"riskLevel\": \"Very Low\",\n            \"vulnerabilityPublicationDate\": null,\n            \"patchPublicationDate\": null,\n            \"findingDate\": 1761955200000,\n            \"seeAlso\": [\n                \"http://projects.webappsec.org/w/page/13246953/Predictable%20Resource%20Location\"\n            ],\n            \"uniqueReferenceId\": \"DWse8ZTyu6LPbrsIc6jB6byM0cU2s31_VM6bxJBCMJmmTEd9gA21iJgYEviIrjr3YaaQ3yK2\",\n            \"warning\": false\n        },\n        {\n            \"id\": 1539315980,\n            \"assetId\": 144,\n            \"target\": \"fortifydata.com\",\n            \"pluginName\": \"Web Server Directory Enumeration\",\n            \"pluginFamily\": \"Web Servers\",\n            \"synopsis\": \"It is possible to enumerate directories on the web server.\",\n            \"description\": \"This plugin attempts to determine the presence of various common directories on the remote web server.  By sending a request for a directory, the web server response code indicates if it is a valid directory or not.\",\n            \"solution\": null,\n            \"severity\": 0,\n            \"cvssBaseScore\": null,\n            \"cvss3BaseScore\": null,\n            \"exploitAvailable\": false,\n            \"cve\": \"\",\n            \"riskLevel\": \"Very Low\",\n            \"vulnerabilityPublicationDate\": null,\n            \"patchPublicationDate\": null,\n            \"findingDate\": 1761955200000,\n            \"seeAlso\": [\n                \"http://projects.webappsec.org/w/page/13246953/Predictable%20Resource%20Location\"\n            ],\n            \"uniqueReferenceId\": \"BDJ4QHfJuuKNa9BxFTCXngJyedE1P1pt97LhKSoKcsk3po8r3AWFZTJ2kCJajLTa_VvUcH0d\",\n            \"warning\": false\n        },\n        {\n            \"id\": 1539315994,\n            \"assetId\": 2862,\n            \"target\": \"api.fortifydata.com\",\n            \"pluginName\": \"Web Server Directory Enumeration\",\n            \"pluginFamily\": \"Web Servers\",\n            \"synopsis\": \"It is possible to enumerate directories on the web server.\",\n            \"description\": \"This plugin attempts to determine the presence of various common directories on the remote web server.  By sending a request for a directory, the web server response code indicates if it is a valid directory or not.\",\n            \"solution\": null,\n            \"severity\": 0,\n            \"cvssBaseScore\": null,\n            \"cvss3BaseScore\": null,\n            \"exploitAvailable\": false,\n            \"cve\": \"\",\n            \"riskLevel\": \"Very Low\",\n            \"vulnerabilityPublicationDate\": null,\n            \"patchPublicationDate\": null,\n            \"findingDate\": 1761955200000,\n            \"seeAlso\": [\n                \"http://projects.webappsec.org/w/page/13246953/Predictable%20Resource%20Location\"\n            ],\n            \"uniqueReferenceId\": \"2u4eH8PvNk8JTv7HQKzgrxuudH4CElJ6LkMgJRDytH1jGUm4nLcR2KgJSRePjd5yX2y1GTiaeT\",\n            \"warning\": false\n        },\n        {\n            \"id\": 1539316083,\n            \"assetId\": 1005,\n            \"target\": \"eu.fortifydata.com\",\n            \"pluginName\": \"Web Server Directory Enumeration\",\n            \"pluginFamily\": \"Web Servers\",\n            \"synopsis\": \"It is possible to enumerate directories on the web server.\",\n            \"description\": \"This plugin attempts to determine the presence of various common directories on the remote web server.  By sending a request for a directory, the web server response code indicates if it is a valid directory or not.\",\n            \"solution\": null,\n            \"severity\": 0,\n            \"cvssBaseScore\": null,\n            \"cvss3BaseScore\": null,\n            \"exploitAvailable\": false,\n            \"cve\": \"\",\n            \"riskLevel\": \"Very Low\",\n            \"vulnerabilityPublicationDate\": null,\n            \"patchPublicationDate\": null,\n            \"findingDate\": 1761955200000,\n            \"seeAlso\": [\n                \"http://projects.webappsec.org/w/page/13246953/Predictable%20Resource%20Location\"\n            ],\n            \"uniqueReferenceId\": \"2qSjFzF23fFRHBZ3K_38o2tJ3Drf20KxN0g1pcHHXPtdq0reRihTu7vlnQPkUgxyKU6k5RG2Nv\",\n            \"warning\": false\n        },\n        {\n            \"id\": 1539316100,\n            \"assetId\": 8126,\n            \"target\": \"api.eu.fortifydata.com\",\n            \"pluginName\": \"Web Server Directory Enumeration\",\n            \"pluginFamily\": \"Web Servers\",\n            \"synopsis\": \"It is possible to enumerate directories on the web server.\",\n            \"description\": \"This plugin attempts to determine the presence of various common directories on the remote web server.  By sending a request for a directory, the web server response code indicates if it is a valid directory or not.\",\n            \"solution\": null,\n            \"severity\": 0,\n            \"cvssBaseScore\": null,\n            \"cvss3BaseScore\": null,\n            \"exploitAvailable\": false,\n            \"cve\": \"\",\n            \"riskLevel\": \"Very Low\",\n            \"vulnerabilityPublicationDate\": null,\n            \"patchPublicationDate\": null,\n            \"findingDate\": 1761955200000,\n            \"seeAlso\": [\n                \"http://projects.webappsec.org/w/page/13246953/Predictable%20Resource%20Location\"\n            ],\n            \"uniqueReferenceId\": \"2MDAlFolFHB7QhxF6WsizZAAAFDjvxrxang6j6rHZTOqyG4fDis3dhjIlwTFICjVX23EY7P0q0\",\n            \"warning\": false\n        },\n        {\n            \"id\": 1539316368,\n            \"assetId\": 8128,\n            \"target\": \"api.us.fortifydata.com\",\n            \"pluginName\": \"Web Server Directory Enumeration\",\n            \"pluginFamily\": \"Web Servers\",\n            \"synopsis\": \"It is possible to enumerate directories on the web server.\",\n            \"description\": \"This plugin attempts to determine the presence of various common directories on the remote web server.  By sending a request for a directory, the web server response code indicates if it is a valid directory or not.\",\n            \"solution\": null,\n            \"severity\": 0,\n            \"cvssBaseScore\": null,\n            \"cvss3BaseScore\": null,\n            \"exploitAvailable\": false,\n            \"cve\": \"\",\n            \"riskLevel\": \"Very Low\",\n            \"vulnerabilityPublicationDate\": null,\n            \"patchPublicationDate\": null,\n            \"findingDate\": 1761955200000,\n            \"seeAlso\": [\n                \"http://projects.webappsec.org/w/page/13246953/Predictable%20Resource%20Location\"\n            ],\n            \"uniqueReferenceId\": \"2MDAlLe0w8rSftODN6TxSJU1EqNWEhpS1TalTieITaIyPznCtJNTZmHj9T7FjwXOltChqTXmA2\",\n            \"warning\": false\n        },\n        {\n            \"id\": 1539316507,\n            \"assetId\": 140,\n            \"target\": \"app.fortifydata.com\",\n            \"pluginName\": \"Web Server Directory Enumeration\",\n            \"pluginFamily\": \"Web Servers\",\n            \"synopsis\": \"It is possible to enumerate directories on the web server.\",\n            \"description\": \"This plugin attempts to determine the presence of various common directories on the remote web server.  By sending a request for a directory, the web server response code indicates if it is a valid directory or not.\",\n            \"solution\": null,\n            \"severity\": 0,\n            \"cvssBaseScore\": null,\n            \"cvss3BaseScore\": null,\n            \"exploitAvailable\": false,\n            \"cve\": \"\",\n            \"riskLevel\": \"Very Low\",\n            \"vulnerabilityPublicationDate\": null,\n            \"patchPublicationDate\": null,\n            \"findingDate\": 1761955200000,\n            \"seeAlso\": [\n                \"http://projects.webappsec.org/w/page/13246953/Predictable%20Resource%20Location\"\n            ],\n            \"uniqueReferenceId\": \"BDIUamyQN0VoDcgaOp1rLnC0TZmxSmGskDBV9QCaobNgNFrzmVpveH5kRDwl304iUFzmWZH9\",\n            \"warning\": false\n        },\n        {\n            \"id\": 1539317604,\n            \"assetId\": 26165,\n            \"target\": \"scanner.fortifydata.com\",\n            \"pluginName\": \"Web Server Directory Enumeration\",\n            \"pluginFamily\": \"Web Servers\",\n            \"synopsis\": \"It is possible to enumerate directories on the web server.\",\n            \"description\": \"This plugin attempts to determine the presence of various common directories on the remote web server.  By sending a request for a directory, the web server response code indicates if it is a valid directory or not.\",\n            \"solution\": null,\n            \"severity\": 0,\n            \"cvssBaseScore\": null,\n            \"cvss3BaseScore\": null,\n            \"exploitAvailable\": false,\n            \"cve\": \"\",\n            \"riskLevel\": \"Very Low\",\n            \"vulnerabilityPublicationDate\": null,\n            \"patchPublicationDate\": null,\n            \"findingDate\": 1761955200000,\n            \"seeAlso\": [\n                \"http://projects.webappsec.org/w/page/13246953/Predictable%20Resource%20Location\"\n            ],\n            \"uniqueReferenceId\": \"a44WidVymrMp4T1qSaAJeWE6qZgcZuD99nW67O5VxHtoRWhIOkXzSKCaoC_dPc2MzRYgozn6hno\",\n            \"warning\": false\n        },\n        {\n            \"id\": 1539317637,\n            \"assetId\": 26639,\n            \"target\": \"scanner-eu.fortifydata.com\",\n            \"pluginName\": \"Web Server Directory Enumeration\",\n            \"pluginFamily\": \"Web Servers\",\n            \"synopsis\": \"It is possible to enumerate directories on the web server.\",\n            \"description\": \"This plugin attempts to determine the presence of various common directories on the remote web server.  By sending a request for a directory, the web server response code indicates if it is a valid directory or not.\",\n            \"solution\": null,\n            \"severity\": 0,\n            \"cvssBaseScore\": null,\n            \"cvss3BaseScore\": null,\n            \"exploitAvailable\": false,\n            \"cve\": \"\",\n            \"riskLevel\": \"Very Low\",\n            \"vulnerabilityPublicationDate\": null,\n            \"patchPublicationDate\": null,\n            \"findingDate\": 1761955200000,\n            \"seeAlso\": [\n                \"http://projects.webappsec.org/w/page/13246953/Predictable%20Resource%20Location\"\n            ],\n            \"uniqueReferenceId\": \"a44_6zGJJPhga28lU_Qa2zkzts6OrBLjmmi5159hxa3ub0IxZRJyVwpGrC3oIS_NBKrjtpLg_sx\",\n            \"warning\": false\n        },\n        {\n            \"id\": 1539317646,\n            \"assetId\": 27969,\n            \"target\": \"scanner-3.fortifydata.com\",\n            \"pluginName\": \"Web Server Directory Enumeration\",\n            \"pluginFamily\": \"Web Servers\",\n            \"synopsis\": \"It is possible to enumerate directories on the web server.\",\n            \"description\": \"This plugin attempts to determine the presence of various common directories on the remote web server.  By sending a request for a directory, the web server response code indicates if it is a valid directory or not.\",\n            \"solution\": null,\n            \"severity\": 0,\n            \"cvssBaseScore\": null,\n            \"cvss3BaseScore\": null,\n            \"exploitAvailable\": false,\n            \"cve\": \"\",\n            \"riskLevel\": \"Very Low\",\n            \"vulnerabilityPublicationDate\": null,\n            \"patchPublicationDate\": null,\n            \"findingDate\": 1761955200000,\n            \"seeAlso\": [\n                \"http://projects.webappsec.org/w/page/13246953/Predictable%20Resource%20Location\"\n            ],\n            \"uniqueReferenceId\": \"a488c7G8vFlNcHx2EoC8JXy9bXNYptrnwW2qnv7Wyd2aDbTFSXy_yO02Us8HDw7oLniw6tjnv5v\",\n            \"warning\": false\n        },\n        {\n            \"id\": 1539315977,\n            \"assetId\": 144,\n            \"target\": \"fortifydata.com\",\n            \"pluginName\": \"Target Credential Status by Authentication Protocol - No Credentials Provided\",\n            \"pluginFamily\": \"Settings\",\n            \"synopsis\": \"Nessus was able to find common ports used for local checks, however, no credentials were provided in the scan policy.\",\n            \"description\": \"Nessus was not able to successfully authenticate directly to the remote target on an available authentication protocol. Nessus was able to connect to the remote port and identify that the service running on the port supports an authentication protocol, but Nessus failed to authenticate to the remote service using the provided credentials. There may have been a protocol failure that prevented authentication from being attempted or all of the provided credentials for the authentication protocol may be invalid. See plugin output for error details.\\n\\nPlease note the following :\\n\\n- This plugin reports per protocol, so it is possible for   valid credentials to be provided for one protocol and not   another. For example, authentication may succeed via SSH   but fail via SMB, while no credentials were provided for   an available SNMP service.\\n\\n- Providing valid credentials for all available   authentication protocols may improve scan coverage, but   the value of successful authentication for a given   protocol may vary from target to target depending upon   what data (if any) is gathered from the target via that   protocol. For example, successful authentication via SSH   is more valuable for Linux targets than for Windows   targets, and likewise successful authentication via SMB   is more valuable for Windows targets than for Linux   targets.\",\n            \"solution\": null,\n            \"severity\": 0,\n            \"cvssBaseScore\": null,\n            \"cvss3BaseScore\": null,\n            \"exploitAvailable\": false,\n            \"cve\": \"\",\n            \"riskLevel\": \"Very Low\",\n            \"vulnerabilityPublicationDate\": null,\n            \"patchPublicationDate\": null,\n            \"findingDate\": 1761955200000,\n            \"seeAlso\": [],\n            \"uniqueReferenceId\": \"5Smu4Ldyt8kgAV54zC9KwOOC6aBuLEAcUtLX2s0UJtCU001yPUPxlmRhGU7n_XcGspjrfHIfc4CzqsnZ47TzpfNG0ZlQ8RPAZcboP95VBTWsNNODQH9yEDXt_VOgTVowiW\",\n            \"warning\": false\n        },\n        {\n            \"id\": 1539316992,\n            \"assetId\": 569262,\n            \"target\": \"scanner-9.fortifydata.com\",\n            \"pluginName\": \"Target Credential Status by Authentication Protocol - No Credentials Provided\",\n            \"pluginFamily\": \"Settings\",\n            \"synopsis\": \"Nessus was able to find common ports used for local checks, however, no credentials were provided in the scan policy.\",\n            \"description\": \"Nessus was not able to successfully authenticate directly to the remote target on an available authentication protocol. Nessus was able to connect to the remote port and identify that the service running on the port supports an authentication protocol, but Nessus failed to authenticate to the remote service using the provided credentials. There may have been a protocol failure that prevented authentication from being attempted or all of the provided credentials for the authentication protocol may be invalid. See plugin output for error details.\\n\\nPlease note the following :\\n\\n- This plugin reports per protocol, so it is possible for   valid credentials to be provided for one protocol and not   another. For example, authentication may succeed via SSH   but fail via SMB, while no credentials were provided for   an available SNMP service.\\n\\n- Providing valid credentials for all available   authentication protocols may improve scan coverage, but   the value of successful authentication for a given   protocol may vary from target to target depending upon   what data (if any) is gathered from the target via that   protocol. For example, successful authentication via SSH   is more valuable for Linux targets than for Windows   targets, and likewise successful authentication via SMB   is more valuable for Windows targets than for Linux   targets.\",\n            \"solution\": null,\n            \"severity\": 0,\n            \"cvssBaseScore\": null,\n            \"cvss3BaseScore\": null,\n            \"exploitAvailable\": false,\n            \"cve\": \"\",\n            \"riskLevel\": \"Very Low\",\n            \"vulnerabilityPublicationDate\": null,\n            \"patchPublicationDate\": null,\n            \"findingDate\": 1761955200000,\n            \"seeAlso\": [],\n            \"uniqueReferenceId\": \"6Lq6jo2AMDtqo7wwfRdFE72jtEoKdn7FDdP63_avzBkuIGA9iBdKdRYpnGq6dOGtHrbDQNMEFFV7nZkT1zRhcBFW9gdhRILcU5Bvh7yEIFi0Nkw5XobHptYvhgYMDC2qMTnrwv\",\n            \"warning\": false\n        },\n        {\n            \"id\": 1539315964,\n            \"assetId\": 454,\n            \"target\": \"demo.fortifydata.com\",\n            \"pluginName\": \"Nessus Launched Plugin List\",\n            \"pluginFamily\": \"Settings\",\n            \"synopsis\": \"This plugin displays information about the launched plugins.\",\n            \"description\": \"This plugin displays the list of launched plugins in a semicolon delimited list.\",\n            \"solution\": null,\n            \"severity\": 0,\n            \"cvssBaseScore\": null,\n            \"cvss3BaseScore\": null,\n            \"exploitAvailable\": false,\n            \"cve\": null,\n            \"riskLevel\": \"Very Low\",\n            \"vulnerabilityPublicationDate\": null,\n            \"patchPublicationDate\": null,\n            \"findingDate\": 1761955200000,\n            \"seeAlso\": [],\n            \"uniqueReferenceId\": \"8FLNCqaj18pjJirXABWdE1SKYgJFyoAKrx1TmFCRVq3WvC2y7W7xdOyqR7G1Y68\",\n            \"warning\": false\n        },\n        {\n            \"id\": 1539315974,\n            \"assetId\": 144,\n            \"target\": \"fortifydata.com\",\n            \"pluginName\": \"Nessus Launched Plugin List\",\n            \"pluginFamily\": \"Settings\",\n            \"synopsis\": \"This plugin displays information about the launched plugins.\",\n            \"description\": \"This plugin displays the list of launched plugins in a semicolon delimited list.\",\n            \"solution\": null,\n            \"severity\": 0,\n            \"cvssBaseScore\": null,\n            \"cvss3BaseScore\": null,\n            \"exploitAvailable\": false,\n            \"cve\": null,\n            \"riskLevel\": \"Very Low\",\n            \"vulnerabilityPublicationDate\": null,\n            \"patchPublicationDate\": null,\n            \"findingDate\": 1761955200000,\n            \"seeAlso\": [],\n            \"uniqueReferenceId\": \"8amuORCRRK25IHkPawFa51_RhBqgmKN7905UCBu_psPh3xgIQ_GkFqs0a4XE5wW\",\n            \"warning\": false\n        },\n        {\n            \"id\": 1539315989,\n            \"assetId\": 2862,\n            \"target\": \"api.fortifydata.com\",\n            \"pluginName\": \"Nessus Launched Plugin List\",\n            \"pluginFamily\": \"Settings\",\n            \"synopsis\": \"This plugin displays information about the launched plugins.\",\n            \"description\": \"This plugin displays the list of launched plugins in a semicolon delimited list.\",\n            \"solution\": null,\n            \"severity\": 0,\n            \"cvssBaseScore\": null,\n            \"cvss3BaseScore\": null,\n            \"exploitAvailable\": false,\n            \"cve\": null,\n            \"riskLevel\": \"Very Low\",\n            \"vulnerabilityPublicationDate\": null,\n            \"patchPublicationDate\": null,\n            \"findingDate\": 1761955200000,\n            \"seeAlso\": [],\n            \"uniqueReferenceId\": \"xSeosNkYFDOtCXi_i7CJcwdtxSvrzKZCnLD_unQPk4fjbUe6k2VtWt2vAx9isbAB\",\n            \"warning\": false\n        },\n        {\n            \"id\": 1539316001,\n            \"assetId\": 7204,\n            \"target\": \"test.fortifydata.com\",\n            \"pluginName\": \"Nessus Launched Plugin List\",\n            \"pluginFamily\": \"Settings\",\n            \"synopsis\": \"This plugin displays information about the launched plugins.\",\n            \"description\": \"This plugin displays the list of launched plugins in a semicolon delimited list.\",\n            \"solution\": null,\n            \"severity\": 0,\n            \"cvssBaseScore\": null,\n            \"cvss3BaseScore\": null,\n            \"exploitAvailable\": false,\n            \"cve\": null,\n            \"riskLevel\": \"Very Low\",\n            \"vulnerabilityPublicationDate\": null,\n            \"patchPublicationDate\": null,\n            \"findingDate\": 1761955200000,\n            \"seeAlso\": [],\n            \"uniqueReferenceId\": \"BdC_ZcuYA4_762mkHQzgE8eSzitocAHRNNNkPX8QFfodN4gpR5O0H_y5ePA6WCQU\",\n            \"warning\": false\n        },\n        {\n            \"id\": 1539316056,\n            \"assetId\": 9967,\n            \"target\": \"autodiscover.fortifydata.com\",\n            \"pluginName\": \"Nessus Launched Plugin List\",\n            \"pluginFamily\": \"Settings\",\n            \"synopsis\": \"This plugin displays information about the launched plugins.\",\n            \"description\": \"This plugin displays the list of launched plugins in a semicolon delimited list.\",\n            \"solution\": null,\n            \"severity\": 0,\n            \"cvssBaseScore\": null,\n            \"cvss3BaseScore\": null,\n            \"exploitAvailable\": false,\n            \"cve\": null,\n            \"riskLevel\": \"Very Low\",\n            \"vulnerabilityPublicationDate\": null,\n            \"patchPublicationDate\": null,\n            \"findingDate\": 1761955200000,\n            \"seeAlso\": [],\n            \"uniqueReferenceId\": \"CAKF12ZQUOaGPEN3FCw86TyBz3t77BlgidLFXEkoIeH5PsKXOwAeDB1s44_NTbnI\",\n            \"warning\": false\n        },\n        {\n            \"id\": 1539316086,\n            \"assetId\": 1005,\n            \"target\": \"eu.fortifydata.com\",\n            \"pluginName\": \"Nessus Launched Plugin List\",\n            \"pluginFamily\": \"Settings\",\n            \"synopsis\": \"This plugin displays information about the launched plugins.\",\n            \"description\": \"This plugin displays the list of launched plugins in a semicolon delimited list.\",\n            \"solution\": null,\n            \"severity\": 0,\n            \"cvssBaseScore\": null,\n            \"cvss3BaseScore\": null,\n            \"exploitAvailable\": false,\n            \"cve\": null,\n            \"riskLevel\": \"Very Low\",\n            \"vulnerabilityPublicationDate\": null,\n            \"patchPublicationDate\": null,\n            \"findingDate\": 1761955200000,\n            \"seeAlso\": [],\n            \"uniqueReferenceId\": \"xaqpaUuL9sbCB__y0hGo8P0caNgh6R2JnAnbF_dGgLSuFjoqgcDizofP7OMNY8kv\",\n            \"warning\": false\n        },\n        {\n            \"id\": 1539316098,\n            \"assetId\": 8126,\n            \"target\": \"api.eu.fortifydata.com\",\n            \"pluginName\": \"Nessus Launched Plugin List\",\n            \"pluginFamily\": \"Settings\",\n            \"synopsis\": \"This plugin displays information about the launched plugins.\",\n            \"description\": \"This plugin displays the list of launched plugins in a semicolon delimited list.\",\n            \"solution\": null,\n            \"severity\": 0,\n            \"cvssBaseScore\": null,\n            \"cvss3BaseScore\": null,\n            \"exploitAvailable\": false,\n            \"cve\": null,\n            \"riskLevel\": \"Very Low\",\n            \"vulnerabilityPublicationDate\": null,\n            \"patchPublicationDate\": null,\n            \"findingDate\": 1761955200000,\n            \"seeAlso\": [],\n            \"uniqueReferenceId\": \"BTWKQMAnAcREiiuSz4fWvoc7l77Qn1vVzn_Taf8_OMW_o_qiwzivD_2qZ2ICbb5D\",\n            \"warning\": false\n        },\n        {\n            \"id\": 1539316238,\n            \"assetId\": 676,\n            \"target\": \"vpn.fortifydata.com\",\n            \"pluginName\": \"Nessus Launched Plugin List\",\n            \"pluginFamily\": \"Settings\",\n            \"synopsis\": \"This plugin displays information about the launched plugins.\",\n            \"description\": \"This plugin displays the list of launched plugins in a semicolon delimited list.\",\n            \"solution\": null,\n            \"severity\": 0,\n            \"cvssBaseScore\": null,\n            \"cvss3BaseScore\": null,\n            \"exploitAvailable\": false,\n            \"cve\": null,\n            \"riskLevel\": \"Very Low\",\n            \"vulnerabilityPublicationDate\": null,\n            \"patchPublicationDate\": null,\n            \"findingDate\": 1761955200000,\n            \"seeAlso\": [],\n            \"uniqueReferenceId\": \"8_L6vTtC6Fg9dQz2ocYKZiYvtVq8bHt_mKSiL83DxmO48mc9Grcl_kL59kwlMdO\",\n            \"warning\": false\n        },\n        {\n            \"id\": 1539316358,\n            \"assetId\": 8128,\n            \"target\": \"api.us.fortifydata.com\",\n            \"pluginName\": \"Nessus Launched Plugin List\",\n            \"pluginFamily\": \"Settings\",\n            \"synopsis\": \"This plugin displays information about the launched plugins.\",\n            \"description\": \"This plugin displays the list of launched plugins in a semicolon delimited list.\",\n            \"solution\": null,\n            \"severity\": 0,\n            \"cvssBaseScore\": null,\n            \"cvss3BaseScore\": null,\n            \"exploitAvailable\": false,\n            \"cve\": null,\n            \"riskLevel\": \"Very Low\",\n            \"vulnerabilityPublicationDate\": null,\n            \"patchPublicationDate\": null,\n            \"findingDate\": 1761955200000,\n            \"seeAlso\": [],\n            \"uniqueReferenceId\": \"BTWKS2lRx1B613geWW9piBE6NGnWxSquq1wfullv_eb1OPh_baYqxTdisEkPpgz8\",\n            \"warning\": false\n        },\n        {\n            \"id\": 1539316426,\n            \"assetId\": 85003,\n            \"target\": \"sales.fortifydata.com\",\n            \"pluginName\": \"Nessus Launched Plugin List\",\n            \"pluginFamily\": \"Settings\",\n            \"synopsis\": \"This plugin displays information about the launched plugins.\",\n            \"description\": \"This plugin displays the list of launched plugins in a semicolon delimited list.\",\n            \"solution\": null,\n            \"severity\": 0,\n            \"cvssBaseScore\": null,\n            \"cvss3BaseScore\": null,\n            \"exploitAvailable\": false,\n            \"cve\": null,\n            \"riskLevel\": \"Very Low\",\n            \"vulnerabilityPublicationDate\": null,\n            \"patchPublicationDate\": null,\n            \"findingDate\": 1761955200000,\n            \"seeAlso\": [],\n            \"uniqueReferenceId\": \"2r_ZhDwnaQ5F21IaWbNgjc1XgKNwfNvp0YkuC1WMyGkAMl2u1TPXEnFgFsTStzGYLU\",\n            \"warning\": false\n        },\n        {\n            \"id\": 1539316510,\n            \"assetId\": 140,\n            \"target\": \"app.fortifydata.com\",\n            \"pluginName\": \"Nessus Launched Plugin List\",\n            \"pluginFamily\": \"Settings\",\n            \"synopsis\": \"This plugin displays information about the launched plugins.\",\n            \"description\": \"This plugin displays the list of launched plugins in a semicolon delimited list.\",\n            \"solution\": null,\n            \"severity\": 0,\n            \"cvssBaseScore\": null,\n            \"cvss3BaseScore\": null,\n            \"exploitAvailable\": false,\n            \"cve\": null,\n            \"riskLevel\": \"Very Low\",\n            \"vulnerabilityPublicationDate\": null,\n            \"patchPublicationDate\": null,\n            \"findingDate\": 1761955200000,\n            \"seeAlso\": [],\n            \"uniqueReferenceId\": \"8amshjFYdg7Ec9B3sJIzF90Xa5dVGVEpRZmgqctDvZKspNToCFQwT4J1YQxbVAV\",\n            \"warning\": false\n        },\n        {\n            \"id\": 1539316989,\n            \"assetId\": 569262,\n            \"target\": \"scanner-9.fortifydata.com\",\n            \"pluginName\": \"Nessus Launched Plugin List\",\n            \"pluginFamily\": \"Settings\",\n            \"synopsis\": \"This plugin displays information about the launched plugins.\",\n            \"description\": \"This plugin displays the list of launched plugins in a semicolon delimited list.\",\n            \"solution\": null,\n            \"severity\": 0,\n            \"cvssBaseScore\": null,\n            \"cvss3BaseScore\": null,\n            \"exploitAvailable\": false,\n            \"cve\": null,\n            \"riskLevel\": \"Very Low\",\n            \"vulnerabilityPublicationDate\": null,\n            \"patchPublicationDate\": null,\n            \"findingDate\": 1761955200000,\n            \"seeAlso\": [],\n            \"uniqueReferenceId\": \"9pqxUlynHhRctGtMTbpsYukWEMFQLtsyx6A7TmGv7dEqT_tovah26apMZDuf_fD6Vfd\",\n            \"warning\": false\n        },\n        {\n            \"id\": 1539317525,\n            \"assetId\": 15539,\n            \"target\": \"teamcity.api.eu.fortifydata.com\",\n            \"pluginName\": \"Nessus Launched Plugin List\",\n            \"pluginFamily\": \"Settings\",\n            \"synopsis\": \"This plugin displays information about the launched plugins.\",\n            \"description\": \"This plugin displays the list of launched plugins in a semicolon delimited list.\",\n            \"solution\": null,\n            \"severity\": 0,\n            \"cvssBaseScore\": null,\n            \"cvss3BaseScore\": null,\n            \"exploitAvailable\": false,\n            \"cve\": null,\n            \"riskLevel\": \"Very Low\",\n            \"vulnerabilityPublicationDate\": null,\n            \"patchPublicationDate\": null,\n            \"findingDate\": 1761955200000,\n            \"seeAlso\": [],\n            \"uniqueReferenceId\": \"28PJv30INdr5q12rJW5vHdzaKHxJ2ij5MTvSN9j9vOq60BU85cRVklReRPXOcGXIhG\",\n            \"warning\": false\n        },\n        {\n            \"id\": 1539317537,\n            \"assetId\": 16811,\n            \"target\": \"teamcity.test.fortifydata.com\",\n            \"pluginName\": \"Nessus Launched Plugin List\",\n            \"pluginFamily\": \"Settings\",\n            \"synopsis\": \"This plugin displays information about the launched plugins.\",\n            \"description\": \"This plugin displays the list of launched plugins in a semicolon delimited list.\",\n            \"solution\": null,\n            \"severity\": 0,\n            \"cvssBaseScore\": null,\n            \"cvss3BaseScore\": null,\n            \"exploitAvailable\": false,\n            \"cve\": null,\n            \"riskLevel\": \"Very Low\",\n            \"vulnerabilityPublicationDate\": null,\n            \"patchPublicationDate\": null,\n            \"findingDate\": 1761955200000,\n            \"seeAlso\": [],\n            \"uniqueReferenceId\": \"28QptrNEv73I493Zm5KkpkK5a4rCy70T40ViHKzNIbLKmpbuGTKIQpovBVgX4tioT3\",\n            \"warning\": false\n        },\n        {\n            \"id\": 1539317600,\n            \"assetId\": 26165,\n            \"target\": \"scanner.fortifydata.com\",\n            \"pluginName\": \"Nessus Launched Plugin List\",\n            \"pluginFamily\": \"Settings\",\n            \"synopsis\": \"This plugin displays information about the launched plugins.\",\n            \"description\": \"This plugin displays the list of launched plugins in a semicolon delimited list.\",\n            \"solution\": null,\n            \"severity\": 0,\n            \"cvssBaseScore\": null,\n            \"cvss3BaseScore\": null,\n            \"exploitAvailable\": false,\n            \"cve\": null,\n            \"riskLevel\": \"Very Low\",\n            \"vulnerabilityPublicationDate\": null,\n            \"patchPublicationDate\": null,\n            \"findingDate\": 1761955200000,\n            \"seeAlso\": [],\n            \"uniqueReferenceId\": \"2bz_H2peYZZBAI53m7ISfa6JW14KGBOxqfhsyKUBfROKB3FMsdMY6HzZUp8k0pdntJ\",\n            \"warning\": false\n        },\n        {\n            \"id\": 1539317614,\n            \"assetId\": 8127,\n            \"target\": \"api.test.fortifydata.com\",\n            \"pluginName\": \"Nessus Launched Plugin List\",\n            \"pluginFamily\": \"Settings\",\n            \"synopsis\": \"This plugin displays information about the launched plugins.\",\n            \"description\": \"This plugin displays the list of launched plugins in a semicolon delimited list.\",\n            \"solution\": null,\n            \"severity\": 0,\n            \"cvssBaseScore\": null,\n            \"cvss3BaseScore\": null,\n            \"exploitAvailable\": false,\n            \"cve\": null,\n            \"riskLevel\": \"Very Low\",\n            \"vulnerabilityPublicationDate\": null,\n            \"patchPublicationDate\": null,\n            \"findingDate\": 1761955200000,\n            \"seeAlso\": [],\n            \"uniqueReferenceId\": \"BTWKRpt737dSFaT3fvcFUuVCzoLnXXtcuIg3PNKLp03w6pm8Rn7YAWDmIR1didPT\",\n            \"warning\": false\n        },\n        {\n            \"id\": 1539317624,\n            \"assetId\": 603644,\n            \"target\": \"status.fortifydata.com\",\n            \"pluginName\": \"Nessus Launched Plugin List\",\n            \"pluginFamily\": \"Settings\",\n            \"synopsis\": \"This plugin displays information about the launched plugins.\",\n            \"description\": \"This plugin displays the list of launched plugins in a semicolon delimited list.\",\n            \"solution\": null,\n            \"severity\": 0,\n            \"cvssBaseScore\": null,\n            \"cvss3BaseScore\": null,\n            \"exploitAvailable\": false,\n            \"cve\": null,\n            \"riskLevel\": \"Very Low\",\n            \"vulnerabilityPublicationDate\": null,\n            \"patchPublicationDate\": null,\n            \"findingDate\": 1761955200000,\n            \"seeAlso\": [],\n            \"uniqueReferenceId\": \"9Air8Fp4uSQADSoKPbE350a9NJhDMWo5PNvTunuy7kUW585GlTyFFm0xDUuEC2zWNQo\",\n            \"warning\": false\n        },\n        {\n            \"id\": 1539317629,\n            \"assetId\": 250700,\n            \"target\": \"tscanner-4.fortifydata.com\",\n            \"pluginName\": \"Nessus Launched Plugin List\",\n            \"pluginFamily\": \"Settings\",\n            \"synopsis\": \"This plugin displays information about the launched plugins.\",\n            \"description\": \"This plugin displays the list of launched plugins in a semicolon delimited list.\",\n            \"solution\": null,\n            \"severity\": 0,\n            \"cvssBaseScore\": null,\n            \"cvss3BaseScore\": null,\n            \"exploitAvailable\": false,\n            \"cve\": null,\n            \"riskLevel\": \"Very Low\",\n            \"vulnerabilityPublicationDate\": null,\n            \"patchPublicationDate\": null,\n            \"findingDate\": 1761955200000,\n            \"seeAlso\": [],\n            \"uniqueReferenceId\": \"8SZwrcjNfCzwnyzEWpjnJ5XMPKR21rgmpvjmvd8rocTdqD9ihGiBPt5BoV39K9riuhr\",\n            \"warning\": false\n        },\n        {\n            \"id\": 1539317633,\n            \"assetId\": 26639,\n            \"target\": \"scanner-eu.fortifydata.com\",\n            \"pluginName\": \"Nessus Launched Plugin List\",\n            \"pluginFamily\": \"Settings\",\n            \"synopsis\": \"This plugin displays information about the launched plugins.\",\n            \"description\": \"This plugin displays the list of launched plugins in a semicolon delimited list.\",\n            \"solution\": null,\n            \"severity\": 0,\n            \"cvssBaseScore\": null,\n            \"cvss3BaseScore\": null,\n            \"exploitAvailable\": false,\n            \"cve\": null,\n            \"riskLevel\": \"Very Low\",\n            \"vulnerabilityPublicationDate\": null,\n            \"patchPublicationDate\": null,\n            \"findingDate\": 1761955200000,\n            \"seeAlso\": [],\n            \"uniqueReferenceId\": \"2bA0wbBMQdqYWc30BJvVoImXpE1J0sI9ut4rcCCgtD44pI4npBB3cgYrxmIgTZqtW0\",\n            \"warning\": false\n        },\n        {\n            \"id\": 1539317638,\n            \"assetId\": 870166,\n            \"target\": \"tscanner-7.fortifydata.com\",\n            \"pluginName\": \"Nessus Launched Plugin List\",\n            \"pluginFamily\": \"Settings\",\n            \"synopsis\": \"This plugin displays information about the launched plugins.\",\n            \"description\": \"This plugin displays the list of launched plugins in a semicolon delimited list.\",\n            \"solution\": null,\n            \"severity\": 0,\n            \"cvssBaseScore\": null,\n            \"cvss3BaseScore\": null,\n            \"exploitAvailable\": false,\n            \"cve\": null,\n            \"riskLevel\": \"Very Low\",\n            \"vulnerabilityPublicationDate\": null,\n            \"patchPublicationDate\": null,\n            \"findingDate\": 1761955200000,\n            \"seeAlso\": [],\n            \"uniqueReferenceId\": \"9WSneygTBIjfdLP5IVFRNZxwZAflnU4_ohjUHfRzovEGyncAWypmE2BM8tDtVVzpHY5\",\n            \"warning\": false\n        },\n        {\n            \"id\": 1539317642,\n            \"assetId\": 27969,\n            \"target\": \"scanner-3.fortifydata.com\",\n            \"pluginName\": \"Nessus Launched Plugin List\",\n            \"pluginFamily\": \"Settings\",\n            \"synopsis\": \"This plugin displays information about the launched plugins.\",\n            \"description\": \"This plugin displays the list of launched plugins in a semicolon delimited list.\",\n            \"solution\": null,\n            \"severity\": 0,\n            \"cvssBaseScore\": null,\n            \"cvss3BaseScore\": null,\n            \"exploitAvailable\": false,\n            \"cve\": null,\n            \"riskLevel\": \"Very Low\",\n            \"vulnerabilityPublicationDate\": null,\n            \"patchPublicationDate\": null,\n            \"findingDate\": 1761955200000,\n            \"seeAlso\": [],\n            \"uniqueReferenceId\": \"2bAHuNk84gzssYPQGT0GopQhYqT04ndQg4Q00AkgyZrnu8kX5AS6de3VlpN_zWM49v\",\n            \"warning\": false\n        },\n        {\n            \"id\": 1539317697,\n            \"assetId\": 250701,\n            \"target\": \"tscanner-5.fortifydata.com\",\n            \"pluginName\": \"Nessus Launched Plugin List\",\n            \"pluginFamily\": \"Settings\",\n            \"synopsis\": \"This plugin displays information about the launched plugins.\",\n            \"description\": \"This plugin displays the list of launched plugins in a semicolon delimited list.\",\n            \"solution\": null,\n            \"severity\": 0,\n            \"cvssBaseScore\": null,\n            \"cvss3BaseScore\": null,\n            \"exploitAvailable\": false,\n            \"cve\": null,\n            \"riskLevel\": \"Very Low\",\n            \"vulnerabilityPublicationDate\": null,\n            \"patchPublicationDate\": null,\n            \"findingDate\": 1761955200000,\n            \"seeAlso\": [],\n            \"uniqueReferenceId\": \"8SZwrcjNTvi_hVO0ONv492HaWtlgj3OXksBhPtk5WODOEKF_HC8WDiyyluZUxt2px0H\",\n            \"warning\": false\n        },\n        {\n            \"id\": 1539317710,\n            \"assetId\": 5661407,\n            \"target\": \"www.fortifydata.co.uk\",\n            \"pluginName\": \"Nessus Launched Plugin List\",\n            \"pluginFamily\": \"Settings\",\n            \"synopsis\": \"This plugin displays information about the launched plugins.\",\n            \"description\": \"This plugin displays the list of launched plugins in a semicolon delimited list.\",\n            \"solution\": null,\n            \"severity\": 0,\n            \"cvssBaseScore\": null,\n            \"cvss3BaseScore\": null,\n            \"exploitAvailable\": false,\n            \"cve\": null,\n            \"riskLevel\": \"Very Low\",\n            \"vulnerabilityPublicationDate\": null,\n            \"patchPublicationDate\": null,\n            \"findingDate\": 1761955200000,\n            \"seeAlso\": [],\n            \"uniqueReferenceId\": \"CdiIvrCT4oVEqmrOiPmQ8tXcnCFlZryAJ2VjStlqQPTFlLN91hpmY3pBbpB2MgiddyG0\",\n            \"warning\": false\n        },\n        {\n            \"id\": 1539317730,\n            \"assetId\": 243670,\n            \"target\": \"tscanner-3.fortifydata.com\",\n            \"pluginName\": \"Nessus Launched Plugin List\",\n            \"pluginFamily\": \"Settings\",\n            \"synopsis\": \"This plugin displays information about the launched plugins.\",\n            \"description\": \"This plugin displays the list of launched plugins in a semicolon delimited list.\",\n            \"solution\": null,\n            \"severity\": 0,\n            \"cvssBaseScore\": null,\n            \"cvss3BaseScore\": null,\n            \"exploitAvailable\": false,\n            \"cve\": null,\n            \"riskLevel\": \"Very Low\",\n            \"vulnerabilityPublicationDate\": null,\n            \"patchPublicationDate\": null,\n            \"findingDate\": 1761955200000,\n            \"seeAlso\": [],\n            \"uniqueReferenceId\": \"8SWOR5WjjMJJFbETAa9ZciFATqHiQjZpPk8kJapeHUBkg7U48F35aMyvISBU_md_vje\",\n            \"warning\": false\n        },\n        {\n            \"id\": 1539317744,\n            \"assetId\": 1744758,\n            \"target\": \"fortifydata.co.uk\",\n            \"pluginName\": \"Nessus Launched Plugin List\",\n            \"pluginFamily\": \"Settings\",\n            \"synopsis\": \"This plugin displays information about the launched plugins.\",\n            \"description\": \"This plugin displays the list of launched plugins in a semicolon delimited list.\",\n            \"solution\": null,\n            \"severity\": 0,\n            \"cvssBaseScore\": null,\n            \"cvss3BaseScore\": null,\n            \"exploitAvailable\": false,\n            \"cve\": null,\n            \"riskLevel\": \"Very Low\",\n            \"vulnerabilityPublicationDate\": null,\n            \"patchPublicationDate\": null,\n            \"findingDate\": 1761955200000,\n            \"seeAlso\": [],\n            \"uniqueReferenceId\": \"zlwic0SS25ZEghGV2FzMYR7_pi1ULVIpV0bE1pjc2Nw873KNKzK7vXrwIRD6UMN87p4j\",\n            \"warning\": false\n        }\n    ]\n}"}],"_postman_id":"7c66557b-7e4c-4ce3-b53b-b694fba20f2c"},{"name":"Get Dark Web Data","id":"624dd465-4dab-44d8-a1c1-97b364281b64","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"auth":{"type":"noauth","isInherited":false},"method":"GET","header":[{"key":"Authorization","value":"ApiKey {{api_key}}","type":"text"}],"url":"https://api.{{region}}.fortifydata.com/api/v1/darkWeb/id/{{companyId}}","description":"<p>Retrieves a list of <strong>dark web findings</strong> for the specified <strong>Company ID</strong>.</p>\n<ul>\n<li>If a <strong>Portfolio ID</strong> is provided instead, the response includes aggregated dark web data for all companies in the portfolio.</li>\n</ul>\n<h3 id=\"requirements\"><strong>Requirements</strong></h3>\n<ul>\n<li>Requires the <strong>Dark Web Data</strong> permission.</li>\n</ul>\n<h3 id=\"responses\"><strong>Responses</strong></h3>\n<ul>\n<li><p><strong>200 OK</strong> – Returns dark web findings.</p>\n</li>\n<li><p><strong>404 Not Found</strong> – Invalid company ID.</p>\n</li>\n<li><p><strong>403 Forbidden</strong> – Not authorized.</p>\n</li>\n</ul>\n","urlObject":{"protocol":"https","path":["api","v1","darkWeb","id","{{companyId}}"],"host":["api","{{region}}","fortifydata","com"],"query":[],"variable":[]}},"response":[{"id":"75b72689-d3da-4857-b392-08735e1b7334","name":"Successful Response","originalRequest":{"method":"GET","header":[{"key":"Authorization","value":"ApiKey {{api_key}}","type":"text"}],"url":"https://api.{{region}}.fortifydata.com/api/v1/darkWeb/id/{{companyId}}"},"status":"OK","code":200,"_postman_previewlanguage":"json","header":[{"key":"Server","value":"nginx/1.21.4"},{"key":"Date","value":"Thu, 13 Jan 2022 13:23:02 GMT"},{"key":"Content-Type","value":"application/json;charset=UTF-8"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Connection","value":"keep-alive"},{"key":"X-Content-Type-Options","value":"nosniff"},{"key":"X-Content-Type-Options","value":"nosniff"},{"key":"X-XSS-Protection","value":"1; mode=block"},{"key":"Cache-Control","value":"no-cache, no-store, max-age=0, must-revalidate"},{"key":"Pragma","value":"no-cache"},{"key":"Expires","value":"0"},{"key":"X-Frame-Options","value":"DENY"},{"key":"X-Frame-Options","value":"DENY"},{"key":"Strict-Transport-Security","value":"max-age=31536000; includeSubDomains"},{"key":"Content-Security-Policy-Report-Only","value":"default-src https:; script-src https: 'unsafe-eval' 'unsafe-inline'; style-src https: 'unsafe-inline'; img-src https: data:; font-src https: data:; report-uri /csp-report"}],"cookie":[],"responseTime":null,"body":"[\n    {\n        \"email\": \"jan.smit@example.com\",\n        \"password\": null,\n        \"sourceName\": \"alphahosting\",\n        \"sourceDescription\": \"The site alphahosting has been reported in January 2016 to possibly have suffered a data exposure that could include 22967 usernames, surnames, names, zips, phones, passwords and emails\",\n        \"date\": \"2016-01-04T00:00:00.000+0000\",\n        \"findingDate\": \"2016-01-04\",\n        \"ultimateRisk\": \"Moderate\",\n        \"solution\": \"If this credential is still in use, change the password immediately. Disable or delete any credentials that are no longer active.\"\n    },\n    {\n        \"email\": \"nogen555@example.com\",\n        \"password\": null,\n        \"sourceName\": \"Unknown breach\",\n        \"sourceDescription\": \"The site Unknown breach has been reported in March 2015 to possibly have suffered a data exposure that could include 338580 passwords and emails\",\n        \"date\": \"2015-03-27T00:00:00.000+0000\",\n        \"findingDate\": \"2015-03-27\",\n        \"ultimateRisk\": \"Moderate\",\n        \"solution\": \"If this credential is still in use, change the password immediately. Disable or delete any credentials that are no longer active.\"\n    },\n    {\n        \"email\": \"cosar_43@example.com\",\n        \"password\": null,\n        \"sourceName\": \"Unknown breach\",\n        \"sourceDescription\": \"The site Unknown breach has been reported in March 2015 to possibly have suffered a data exposure that could include 338580 passwords and emails\",\n        \"date\": \"2015-03-27T00:00:00.000+0000\",\n        \"findingDate\": \"2015-03-27\",\n        \"ultimateRisk\": \"Moderate\",\n        \"solution\": \"If this credential is still in use, change the password immediately. Disable or delete any credentials that are no longer active.\"\n    },\n    {\n        \"email\": \"camparota_1905@example.com\",\n        \"password\": null,\n        \"sourceName\": \"Unknown breach\",\n        \"sourceDescription\": \"The site Unknown breach has been reported in March 2015 to possibly have suffered a data exposure that could include 338580 passwords and emails\",\n        \"date\": \"2015-03-27T00:00:00.000+0000\",\n        \"findingDate\": \"2015-03-27\",\n        \"ultimateRisk\": \"Moderate\",\n        \"solution\": \"If this credential is still in use, change the password immediately. Disable or delete any credentials that are no longer active.\"\n    },\n    {\n        \"email\": \"coskun12312311@example.com\",\n        \"password\": null,\n        \"sourceName\": \"Unknown breach\",\n        \"sourceDescription\": \"The site Unknown breach has been reported in March 2015 to possibly have suffered a data exposure that could include 338580 passwords and emails\",\n        \"date\": \"2015-03-27T00:00:00.000+0000\",\n        \"findingDate\": \"2015-03-27\",\n        \"ultimateRisk\": \"Moderate\",\n        \"solution\": \"If this credential is still in use, change the password immediately. Disable or delete any credentials that are no longer active.\"\n    },\n    {\n        \"email\": \"erdogan_fb_1907_@example.com\",\n        \"password\": null,\n        \"sourceName\": \"Unknown breach\",\n        \"sourceDescription\": \"The site Unknown breach has been reported in March 2015 to possibly have suffered a data exposure that could include 338580 passwords and emails\",\n        \"date\": \"2015-03-27T00:00:00.000+0000\",\n        \"findingDate\": \"2015-03-27\",\n        \"ultimateRisk\": \"Moderate\",\n        \"solution\": \"If this credential is still in use, change the password immediately. Disable or delete any credentials that are no longer active.\"\n    },\n    {\n        \"email\": \"drya_su1980@example.com\",\n        \"password\": null,\n        \"sourceName\": \"Unknown breach\",\n        \"sourceDescription\": \"The site Unknown breach has been reported in March 2015 to possibly have suffered a data exposure that could include 338580 passwords and emails\",\n        \"date\": \"2015-03-27T00:00:00.000+0000\",\n        \"findingDate\": \"2015-03-27\",\n        \"ultimateRisk\": \"Moderate\",\n        \"solution\": \"If this credential is still in use, change the password immediately. Disable or delete any credentials that are no longer active.\"\n    },\n    {\n        \"email\": \"delyqenc_1907@example.com\",\n        \"password\": null,\n        \"sourceName\": \"Unknown breach\",\n        \"sourceDescription\": \"The site Unknown breach has been reported in March 2015 to possibly have suffered a data exposure that could include 338580 passwords and emails\",\n        \"date\": \"2015-03-27T00:00:00.000+0000\",\n        \"findingDate\": \"2015-03-27\",\n        \"ultimateRisk\": \"Moderate\",\n        \"solution\": \"If this credential is still in use, change the password immediately. Disable or delete any credentials that are no longer active.\"\n    },\n    {\n        \"email\": \"delyy_jojuk@example.com\",\n        \"password\": null,\n        \"sourceName\": \"Unknown breach\",\n        \"sourceDescription\": \"The site Unknown breach has been reported in March 2015 to possibly have suffered a data exposure that could include 338580 passwords and emails\",\n        \"date\": \"2015-03-27T00:00:00.000+0000\",\n        \"findingDate\": \"2015-03-27\",\n        \"ultimateRisk\": \"Moderate\",\n        \"solution\": \"If this credential is still in use, change the password immediately. Disable or delete any credentials that are no longer active.\"\n    },\n    {\n        \"email\": \"cosmow_read_1910@example.com\",\n        \"password\": null,\n        \"sourceName\": \"Unknown breach\",\n        \"sourceDescription\": \"The site Unknown breach has been reported in March 2015 to possibly have suffered a data exposure that could include 338580 passwords and emails\",\n        \"date\": \"2015-03-27T00:00:00.000+0000\",\n        \"findingDate\": \"2015-03-27\",\n        \"ultimateRisk\": \"Moderate\",\n        \"solution\": \"If this credential is still in use, change the password immediately. Disable or delete any credentials that are no longer active.\"\n    },\n    {\n        \"email\": \"dehxet1@example.com\",\n        \"password\": null,\n        \"sourceName\": \"Unknown breach\",\n        \"sourceDescription\": \"The site Unknown breach has been reported in March 2015 to possibly have suffered a data exposure that could include 338580 passwords and emails\",\n        \"date\": \"2015-03-27T00:00:00.000+0000\",\n        \"findingDate\": \"2015-03-27\",\n        \"ultimateRisk\": \"Moderate\",\n        \"solution\": \"If this credential is still in use, change the password immediately. Disable or delete any credentials that are no longer active.\"\n    },\n    {\n        \"email\": \"erqan_quru_93@example.com\",\n        \"password\": null,\n        \"sourceName\": \"Unknown breach\",\n        \"sourceDescription\": \"The site Unknown breach has been reported in March 2015 to possibly have suffered a data exposure that could include 338580 passwords and emails\",\n        \"date\": \"2015-03-27T00:00:00.000+0000\",\n        \"findingDate\": \"2015-03-27\",\n        \"ultimateRisk\": \"Moderate\",\n        \"solution\": \"If this credential is still in use, change the password immediately. Disable or delete any credentials that are no longer active.\"\n    },\n    {\n        \"email\": \"jerrypkoontz@example.com\",\n        \"password\": null,\n        \"sourceName\": \"forumkorner.com\",\n        \"sourceDescription\": \"The site forumkorner.com has been reported in March 2015 to possibly have suffered a data exposure that could include 21509 usernames, names, credit cards, phones, addresses, passwords and emails\",\n        \"date\": \"2015-03-25T00:00:00.000+0000\",\n        \"findingDate\": \"2015-03-25\",\n        \"ultimateRisk\": \"Moderate\",\n        \"solution\": \"If this credential is still in use, change the password immediately. Disable or delete any credentials that are no longer active.\"\n    },\n    {\n        \"email\": \"hrovshan@example.com\",\n        \"password\": null,\n        \"sourceName\": \"unknown breach\",\n        \"sourceDescription\": \"The site unknown breach has been reported in February 2015 to possibly have suffered a data exposure that could include 100500 passwords and emails\",\n        \"date\": \"2015-02-23T00:00:00.000+0000\",\n        \"findingDate\": \"2015-02-23\",\n        \"ultimateRisk\": \"Moderate\",\n        \"solution\": \"If this credential is still in use, change the password immediately. Disable or delete any credentials that are no longer active.\"\n    },\n    {\n        \"email\": \"ceyhun999@example.com\",\n        \"password\": null,\n        \"sourceName\": \"unknown breach\",\n        \"sourceDescription\": \"The site unknown breach has been reported in February 2015 to possibly have suffered a data exposure that could include 100500 passwords and emails\",\n        \"date\": \"2015-02-23T00:00:00.000+0000\",\n        \"findingDate\": \"2015-02-23\",\n        \"ultimateRisk\": \"Moderate\",\n        \"solution\": \"If this credential is still in use, change the password immediately. Disable or delete any credentials that are no longer active.\"\n    },\n    {\n        \"email\": \"onlygirl_flower@example.com\",\n        \"password\": null,\n        \"sourceName\": \"unknown breach\",\n        \"sourceDescription\": \"The site unknown breach has been reported in February 2015 to possibly have suffered a data exposure that could include 100500 passwords and emails\",\n        \"date\": \"2015-02-23T00:00:00.000+0000\",\n        \"findingDate\": \"2015-02-23\",\n        \"ultimateRisk\": \"Moderate\",\n        \"solution\": \"If this credential is still in use, change the password immediately. Disable or delete any credentials that are no longer active.\"\n    },\n    {\n        \"email\": \"mysweet.@example.com\",\n        \"password\": null,\n        \"sourceName\": \"unknown breach\",\n        \"sourceDescription\": \"The site unknown breach has been reported in February 2015 to possibly have suffered a data exposure that could include 100500 passwords and emails\",\n        \"date\": \"2015-02-23T00:00:00.000+0000\",\n        \"findingDate\": \"2015-02-23\",\n        \"ultimateRisk\": \"Moderate\",\n        \"solution\": \"If this credential is still in use, change the password immediately. Disable or delete any credentials that are no longer active.\"\n    },\n    {\n        \"email\": \"tunay@example.com\",\n        \"password\": null,\n        \"sourceName\": \"unknown breach\",\n        \"sourceDescription\": \"The site unknown breach has been reported in February 2015 to possibly have suffered a data exposure that could include 100500 passwords and emails\",\n        \"date\": \"2015-02-23T00:00:00.000+0000\",\n        \"findingDate\": \"2015-02-23\",\n        \"ultimateRisk\": \"Moderate\",\n        \"solution\": \"If this credential is still in use, change the password immediately. Disable or delete any credentials that are no longer active.\"\n    },\n    {\n        \"email\": \"test@example.com\",\n        \"password\": null,\n        \"sourceName\": \"payivy.com\",\n        \"sourceDescription\": \"The site payivy.com has been reported in January 2015 to possibly have suffered a data exposure that could include 9991 passwords and emails\",\n        \"date\": \"2015-01-29T00:00:00.000+0000\",\n        \"findingDate\": \"2015-01-29\",\n        \"ultimateRisk\": \"Moderate\",\n        \"solution\": \"If this credential is still in use, change the password immediately. Disable or delete any credentials that are no longer active.\"\n    },\n    {\n        \"email\": \"netsparker@example.com\",\n        \"password\": null,\n        \"sourceName\": \"philsacra.ust.edu.ph\",\n        \"sourceDescription\": \"The site philsacra.ust.edu.ph has been reported in January 2015 to possibly have suffered a data exposure that could include 5130 surnames, names, zips, dates of birth, passwords and emails\",\n        \"date\": \"2015-01-17T00:00:00.000+0000\",\n        \"findingDate\": \"2015-01-17\",\n        \"ultimateRisk\": \"Moderate\",\n        \"solution\": \"If this credential is still in use, change the password immediately. Disable or delete any credentials that are no longer active.\"\n    },\n    {\n        \"email\": \"netsparker@example.com\",\n        \"password\": null,\n        \"sourceName\": \"soundmass.com\",\n        \"sourceDescription\": \"The site soundmass.com has been reported in January 2015 to possibly have suffered a data exposure that could include 1383 passwords and emails\",\n        \"date\": \"2015-01-07T00:00:00.000+0000\",\n        \"findingDate\": \"2015-01-07\",\n        \"ultimateRisk\": \"Moderate\",\n        \"solution\": \"If this credential is still in use, change the password immediately. Disable or delete any credentials that are no longer active.\"\n    },\n    {\n        \"email\": \"solmaz@example.com\",\n        \"password\": null,\n        \"sourceName\": \"facenama.com\",\n        \"sourceDescription\": \"The site facenama.com has been reported in January 2015 to possibly have suffered a data exposure that could include 116418 usernames, passwords, emails, names and surnames\",\n        \"date\": \"2015-01-02T00:00:00.000+0000\",\n        \"findingDate\": \"2015-01-02\",\n        \"ultimateRisk\": \"Moderate\",\n        \"solution\": \"If this credential is still in use, change the password immediately. Disable or delete any credentials that are no longer active.\"\n    },\n    {\n        \"email\": \"ali@example.com\",\n        \"password\": null,\n        \"sourceName\": \"facenama.com\",\n        \"sourceDescription\": \"The site facenama.com has been reported in January 2015 to possibly have suffered a data exposure that could include 116418 usernames, passwords, emails, names and surnames\",\n        \"date\": \"2015-01-02T00:00:00.000+0000\",\n        \"findingDate\": \"2015-01-02\",\n        \"ultimateRisk\": \"Moderate\",\n        \"solution\": \"If this credential is still in use, change the password immediately. Disable or delete any credentials that are no longer active.\"\n    },\n    {\n        \"email\": \"hajame@example.com\",\n        \"password\": null,\n        \"sourceName\": \"theouchocolat.fr\",\n        \"sourceDescription\": \"The site theouchocolat.fr has been reported in December 2014 to possibly have suffered a data exposure that could include 116737 emails\",\n        \"date\": \"2014-12-04T00:00:00.000+0000\",\n        \"findingDate\": \"2014-12-04\",\n        \"ultimateRisk\": \"Moderate\",\n        \"solution\": \"If this credential is still in use, change the password immediately. Disable or delete any credentials that are no longer active.\"\n    },\n    {\n        \"email\": \"charlene1999@example.com\",\n        \"password\": null,\n        \"sourceName\": \"theouchocolat.fr\",\n        \"sourceDescription\": \"The site theouchocolat.fr has been reported in December 2014 to possibly have suffered a data exposure that could include 116737 emails\",\n        \"date\": \"2014-12-04T00:00:00.000+0000\",\n        \"findingDate\": \"2014-12-04\",\n        \"ultimateRisk\": \"Moderate\",\n        \"solution\": \"If this credential is still in use, change the password immediately. Disable or delete any credentials that are no longer active.\"\n    }\n]"}],"_postman_id":"624dd465-4dab-44d8-a1c1-97b364281b64"},{"name":"Get Email Vulnerabilities","id":"1cdaf2db-6e7b-4fbe-b34d-90a7a27c18a2","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[{"key":"Authorization","value":"ApiKey {{api_key}}","type":"text"}],"url":"https://api.{{region}}.fortifydata.com/api/v1/vulnerability/email/{{companyId}}","description":"<p>Retrieves all <strong>email vulnerabilities</strong> for the specified <strong>Company ID</strong> from the company’s latest assessment.</p>\n<ul>\n<li>If a <strong>Portfolio ID</strong> is provided instead, the response includes aggregated email security data for all subsidiaries within the portfolio.</li>\n</ul>\n<h3 id=\"requirements\"><strong>Requirements</strong></h3>\n<ul>\n<li>Requires the <strong>Email Security</strong> privilege.</li>\n</ul>\n<h3 id=\"responses\"><strong>Responses</strong></h3>\n<ul>\n<li><p><strong>200 OK</strong> – Returns email vulnerability data.</p>\n</li>\n<li><p><strong>403 Forbidden</strong> – API key not authorized for the requested company.</p>\n</li>\n<li><p><strong>404 Not Found</strong> – Invalid or unknown company ID.</p>\n</li>\n</ul>\n","urlObject":{"protocol":"https","path":["api","v1","vulnerability","email","{{companyId}}"],"host":["api","{{region}}","fortifydata","com"],"query":[],"variable":[]}},"response":[{"id":"f065d060-abed-4529-825f-cb89845b22ba","name":"Successful Response","originalRequest":{"method":"GET","header":[{"key":"Authorization","value":"ApiKey {{api_key}}","type":"text"}],"url":"https://api.{{region}}.fortifydata.com/api/v1/vulnerability/email/{{companyId}}"},"status":"OK","code":200,"_postman_previewlanguage":"json","header":[{"key":"Date","value":"Fri, 14 Jul 2023 21:02:03 GMT"},{"key":"Content-Type","value":"application/json;charset=UTF-8"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Connection","value":"keep-alive"},{"key":"X-Rate-Limit-Remaining","value":"4"},{"key":"X-Content-Type-Options","value":"nosniff"},{"key":"X-XSS-Protection","value":"1; mode=block"},{"key":"Cache-Control","value":"no-cache, no-store, max-age=0, must-revalidate"},{"key":"Pragma","value":"no-cache"},{"key":"Expires","value":"0"},{"key":"Strict-Transport-Security","value":"max-age=31536000 ; includeSubDomains"},{"key":"X-Frame-Options","value":"DENY"}],"cookie":[],"responseTime":null,"body":"[\n    {\n        \"threatEventText\": \"Outbound emails incorrectly classified as spam\",\n        \"maxRisk\": 4,\n        \"sources\": [\n            {\n                \"domain\": \"webovio.com\",\n                \"vulnerabilities\": [\n                    {\n                        \"id\": 189449,\n                        \"vulnerability\": \"No DKIM Record found\",\n                        \"issue\": \"Missing or Invalid Record\",\n                        \"domain\": \"webovio.com\",\n                        \"riskLevel\": \"Moderate\",\n                        \"solution\": \"Ensure text(TX) record has no inadvertant spaces leading, trailing or inside the TXT key. \\n\\nDouble check the DNS record name. Some DNS providers may create DNS records with a duplicate domain name, causing \\\"nameserver1._domainkey.example.com\\\" record to be incorrectly created as \\\"nameserver1._domainkey.example.com.example.com\\\". \\n\\nThis is the case of GoDaddy and Namecheap, for example.\\n\\n\",\n                        \"description\": \"DKIM Records are published via DNS as a text(TXT) record using your selector. They should be published at: selector._domainkey.domain.com Your selector should be provided by the mail system you are setting up DKIM on.\",\n                        \"findingDate\": 1709596800000\n                    }\n                ]\n            }\n        ]\n    },\n    {\n        \"threatEventText\": \"Malicious act via domain spoofing\",\n        \"maxRisk\": 4,\n        \"sources\": [\n            {\n                \"domain\": \"webovio.com\",\n                \"vulnerabilities\": [\n                    {\n                        \"id\": 189448,\n                        \"vulnerability\": \"No DMARC Record found\",\n                        \"issue\": \"DMARC Record Published Failed\",\n                        \"domain\": \"webovio.com\",\n                        \"riskLevel\": \"Moderate\",\n                        \"solution\": \"Publish DMARC record. Examples for Cloudflare, GoDaddy and cPanel are below. \\n\\nhttps://dmarcly.com/blog/how-to-add-dmarc-record-in-cloudflare-cloudflare-dmarc-setup-guide\\nhttps://dmarcly.com/blog/how-to-add-dmarc-record-in-godaddy-godaddy-dmarc-setup-guide\\nhttps://dmarcly.com/blog/how-to-add-dmarc-record-in-cpanel-cpanel-dmarc-setup-guide\\n\\n\",\n                        \"description\": \"If you are encountering this error of No DMARC Record found, this means that your domain does not have a published DMARC record. DMARC Records are published via DNS as a text(TXT) record. They will let receiving servers know what they should do with non-aligned email received from your domain.\",\n                        \"findingDate\": 1709596800000\n                    },\n                    {\n                        \"id\": 189450,\n                        \"vulnerability\": \"DMARC Quarantine/Reject policy not enabled\",\n                        \"issue\": \"No DMARC Protection\",\n                        \"domain\": \"webovio.com\",\n                        \"riskLevel\": \"Low\",\n                        \"solution\": \"Set your DMARC configuration to Quarantine or Reject. This value will help prevent spoofed email and other unauthorized senders.\",\n                        \"description\": \"DMARC for this domain is not currently configured for protection against spoofing and other unauthorized emails.\",\n                        \"findingDate\": 1709596800000\n                    }\n                ]\n            }\n        ]\n    }\n]"}],"_postman_id":"1cdaf2db-6e7b-4fbe-b34d-90a7a27c18a2"},{"name":"Get Data Breach History","id":"2da5c703-4558-48a7-8b4a-abadc97fed56","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[{"key":"Authorization","value":"ApiKey {{api_key}}","type":"text"}],"url":"https://api.{{region}}.fortifydata.com/api/v1/breach-history/{{companyId}}","description":"<p>Retrieves the <strong>data breach history</strong> for the specified <strong>Company ID</strong>.</p>\n<ul>\n<li>If a <strong>Portfolio ID</strong> is provided instead, the response includes an aggregated breach history for all companies in the portfolio.</li>\n</ul>\n<h3 id=\"requirements\"><strong>Requirements</strong></h3>\n<ul>\n<li>Requires the <strong>Breach History</strong> privilege.</li>\n</ul>\n<h3 id=\"responses\"><strong>Responses</strong></h3>\n<ul>\n<li><p><strong>200 OK</strong> – Returns breach history data.</p>\n</li>\n<li><p><strong>403 Forbidden</strong> – API key not authorized for the requested company.</p>\n</li>\n<li><p><strong>404 Not Found</strong> – Invalid or unknown company ID.</p>\n</li>\n</ul>\n","urlObject":{"protocol":"https","path":["api","v1","breach-history","{{companyId}}"],"host":["api","{{region}}","fortifydata","com"],"query":[],"variable":[]}},"response":[{"id":"2dc9d9d5-2b81-494d-9331-9ce237b8c955","name":"Successful Response","originalRequest":{"method":"GET","header":[{"key":"Authorization","value":"ApiKey {{api_key}}","type":"text"}],"url":"https://api.{{region}}.fortifydata.com/api/v1/breach-history/{{companyId}}"},"status":"OK","code":200,"_postman_previewlanguage":"json","header":[{"key":"Date","value":"Fri, 14 Jul 2023 21:11:59 GMT"},{"key":"Content-Type","value":"application/json;charset=UTF-8"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Connection","value":"keep-alive"},{"key":"X-Rate-Limit-Remaining","value":"4"},{"key":"X-Content-Type-Options","value":"nosniff"},{"key":"X-XSS-Protection","value":"1; mode=block"},{"key":"Cache-Control","value":"no-cache, no-store, max-age=0, must-revalidate"},{"key":"Pragma","value":"no-cache"},{"key":"Expires","value":"0"},{"key":"Strict-Transport-Security","value":"max-age=31536000 ; includeSubDomains"},{"key":"X-Frame-Options","value":"DENY"}],"cookie":[],"responseTime":null,"body":"[\n    {\n        \"publishedDate\": 1568592000000,\n        \"companyName\": \"Webovio Inc.\",\n        \"breachType\": \"HACK\",\n        \"description\": \"Location of breached information: Email\\nBusiness associate present: No\",\n        \"numRecords\": 4674,\n        \"sourceUrl\": \"https://ocrportal.hhs.gov/ocr/breach/breach_report.jsf\"\n    },\n    {\n        \"publishedDate\": 1564704000000,\n        \"companyName\": \"Webovio\",\n        \"breachType\": \"HACK\",\n        \"description\": \"Location of breached information: Other\\nBusiness associate present: Yes\",\n        \"numRecords\": 33730,\n        \"sourceUrl\": \"https://ocrportal.hhs.gov/ocr/breach/breach_report.jsf\"\n    }\n]"}],"_postman_id":"2da5c703-4558-48a7-8b4a-abadc97fed56"},{"name":"Get Threat Intel Incidents","id":"e56f2587-172a-4deb-bc22-63fc0a204043","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[{"key":"Authorization","value":"ApiKey {{api_key}}","type":"text"}],"url":"https://api.{{region}}.fortifydata.com/api/v1/incident/{{companyId}}","description":"<p>This endpoint returns all open Threat Intelligence Incidents from the past thirty days for the specified company ID.</p>\n<p>It requires the <strong>Threat Intel Incidents</strong> privilege.</p>\n<ul>\n<li><p>Returns <strong>403</strong> if the API key is not authorized for the company.</p>\n</li>\n<li><p>Returns <strong>404</strong> if the company is not found.</p>\n</li>\n<li><p>Returns <strong>400</strong> if a portfolio ID is provided.</p>\n</li>\n</ul>\n","urlObject":{"protocol":"https","path":["api","v1","incident","{{companyId}}"],"host":["api","{{region}}","fortifydata","com"],"query":[],"variable":[]}},"response":[{"id":"f407f3dc-3b70-4826-9d32-341915692717","name":"Successful Response","originalRequest":{"method":"GET","header":[{"key":"Authorization","value":"ApiKey {{api_key}}","type":"text"}],"url":"https://api.{{region}}.fortifydata.com/api/v1/incident/{{companyId}}"},"status":"OK","code":200,"_postman_previewlanguage":"json","header":[{"key":"Date","value":"Fri, 14 Jul 2023 21:20:21 GMT"},{"key":"Content-Type","value":"application/json;charset=UTF-8"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Connection","value":"keep-alive"},{"key":"X-Rate-Limit-Remaining","value":"4"},{"key":"X-Content-Type-Options","value":"nosniff"},{"key":"X-XSS-Protection","value":"1; mode=block"},{"key":"Cache-Control","value":"no-cache, no-store, max-age=0, must-revalidate"},{"key":"Pragma","value":"no-cache"},{"key":"Expires","value":"0"},{"key":"Strict-Transport-Security","value":"max-age=31536000 ; includeSubDomains"},{"key":"X-Frame-Options","value":"DENY"}],"cookie":[],"responseTime":null,"body":"[\n    {\n        \"threatCategory\": \"IP_REPUTATION\",\n        \"subCategory\": \"SPAM\",\n        \"domain\": \"test.com\",\n        \"ip\": \"67.225.146.248\",\n        \"incidentDate\": 1688342400000,\n        \"status\": \"UNASSIGNED\",\n        \"confidence\": 4\n    },\n    {\n        \"threatCategory\": \"MALWARE\",\n        \"subCategory\": \"MALWARE\",\n        \"domain\": \"test.com\",\n        \"ip\": \"67.225.146.248\",\n        \"incidentDate\": 1687478400000,\n        \"status\": \"UNASSIGNED\",\n        \"confidence\": 4\n    },\n    {\n        \"threatCategory\": \"MALWARE\",\n        \"subCategory\": \"IOC\",\n        \"domain\": \"test.com\",\n        \"ip\": \"67.225.146.248\",\n        \"incidentDate\": 1687478400000,\n        \"status\": \"UNASSIGNED\",\n        \"confidence\": 4\n    },\n    {\n        \"threatCategory\": \"C2\",\n        \"subCategory\": \"BOTS\",\n        \"domain\": \"test.com\",\n        \"ip\": \"67.225.146.248\",\n        \"incidentDate\": 1686787200000,\n        \"status\": \"UNASSIGNED\",\n        \"confidence\": 4\n    },\n    {\n        \"threatCategory\": \"IP_REPUTATION\",\n        \"subCategory\": \"PHISHING\",\n        \"domain\": \"test.com\",\n        \"ip\": \"67.225.146.248\",\n        \"incidentDate\": 1686787200000,\n        \"status\": \"UNASSIGNED\",\n        \"confidence\": 4\n    }\n]"}],"_postman_id":"e56f2587-172a-4deb-bc22-63fc0a204043"},{"name":"Portfolio Summary","id":"4775e264-e1b7-4d91-9e32-b098de7b953a","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[{"key":"Authorization","value":"ApiKey {{api_key}}","type":"text"}],"url":"https://api.{{region}}.fortifydata.com/api/v1/portfolio-summary/id/{{companyId}}","description":"<p>This endpoint returns a list of portfolios for the specified company ID. The company ID must be the one under which the portfolios are managed.</p>\n<p>It requires the <strong>Portfolio Summary</strong> permission.</p>\n<ul>\n<li><p>Returns <strong>403</strong> if the request is not authorized.</p>\n</li>\n<li><p>Returns <strong>404</strong> if the company ID does not exist.</p>\n</li>\n</ul>\n","urlObject":{"protocol":"https","path":["api","v1","portfolio-summary","id","{{companyId}}"],"host":["api","{{region}}","fortifydata","com"],"query":[],"variable":[]}},"response":[{"id":"7e341d9c-2ba5-40ad-ab2a-b5ead6e97d0f","name":"Successful Response","originalRequest":{"method":"GET","header":[{"key":"Authorization","value":"ApiKey {{api_key}}","type":"text"}],"url":"https://api.{{region}}.fortifydata.com/api/v1/portfolio-summary/id/{{companyId}}"},"status":"OK","code":200,"_postman_previewlanguage":"json","header":[{"key":"Server","value":"nginx/1.23.3"},{"key":"Date","value":"Thu, 01 Jun 2023 12:30:52 GMT"},{"key":"Content-Type","value":"application/json;charset=UTF-8"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Connection","value":"keep-alive"},{"key":"X-Rate-Limit-Remaining","value":"4"},{"key":"X-Content-Type-Options","value":"nosniff"},{"key":"X-Content-Type-Options","value":"nosniff"},{"key":"X-XSS-Protection","value":"1; mode=block"},{"key":"Cache-Control","value":"no-cache, no-store, max-age=0, must-revalidate"},{"key":"Pragma","value":"no-cache"},{"key":"Expires","value":"0"},{"key":"X-Frame-Options","value":"DENY"},{"key":"X-Frame-Options","value":"DENY"},{"key":"Strict-Transport-Security","value":"max-age=31536000; includeSubDomains"},{"key":"Content-Security-Policy-Report-Only","value":"default-src https:; script-src https: 'unsafe-eval' 'unsafe-inline'; style-src https: 'unsafe-inline'; img-src https: data:; font-src https: data:; report-uri /csp-report"}],"cookie":[],"responseTime":null,"body":"[\n    {\n        \"portfolioId\": 1107,\n        \"name\": \"All Subsidiaries\",\n        \"score\": 816\n    },\n    {\n        \"portfolioId\": 1110,\n        \"name\": \"Managed Services\",\n        \"score\": 793\n    },\n    {\n        \"portfolioId\": 1164,\n        \"name\": \"Sprockets and Widgets\",\n        \"score\": 801\n    },\n    {\n        \"portfolioId\": 1181,\n        \"name\": \"Americas\",\n        \"score\": 730\n    },\n    {\n        \"portfolioId\": 1185,\n        \"name\": \"Europe and Asia\",\n        \"score\": 817\n    }\n]"}],"_postman_id":"4775e264-e1b7-4d91-9e32-b098de7b953a"},{"name":"Portfolio Companies","id":"2ffcbee3-063b-49e5-a735-6b166c9c7bd8","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[{"key":"Authorization","value":"ApiKey {{api_key}}","type":"text"}],"url":"https://api.{{region}}.fortifydata.com/api/v1/company/portfolio-companies/id/{{portfolioId}}","description":"<p>This endpoint returns a list of companies in the portfolio for the specified portfolio ID. To locate portfolio IDs, use the <strong>Portfolio Summary</strong> endpoint.</p>\n<p>It requires the <strong>Portfolio Summary</strong> permission.</p>\n<ul>\n<li><p>Returns <strong>403</strong> if the request is not authorized.</p>\n</li>\n<li><p>Returns <strong>404</strong> if the portfolio ID does not exist.</p>\n</li>\n</ul>\n","urlObject":{"protocol":"https","path":["api","v1","company","portfolio-companies","id","{{portfolioId}}"],"host":["api","{{region}}","fortifydata","com"],"query":[],"variable":[]}},"response":[{"id":"77320265-100d-493b-bec3-9784c0f451cc","name":"Successful Response","originalRequest":{"method":"GET","header":[{"key":"Authorization","value":"ApiKey {{api_key}}","type":"text"}],"url":"https://api.{{region}}.fortifydata.com/api/v1/company/portfolio-companies/id/{{portfolioId}}"},"status":"OK","code":200,"_postman_previewlanguage":"json","header":[{"key":"Server","value":"nginx/1.23.3"},{"key":"Date","value":"Thu, 01 Jun 2023 12:44:51 GMT"},{"key":"Content-Type","value":"application/json;charset=UTF-8"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Connection","value":"keep-alive"},{"key":"X-Rate-Limit-Remaining","value":"4"},{"key":"X-Content-Type-Options","value":"nosniff"},{"key":"X-Content-Type-Options","value":"nosniff"},{"key":"X-XSS-Protection","value":"1; mode=block"},{"key":"Cache-Control","value":"no-cache, no-store, max-age=0, must-revalidate"},{"key":"Pragma","value":"no-cache"},{"key":"Expires","value":"0"},{"key":"X-Frame-Options","value":"DENY"},{"key":"X-Frame-Options","value":"DENY"},{"key":"Strict-Transport-Security","value":"max-age=31536000; includeSubDomains"},{"key":"Content-Security-Policy-Report-Only","value":"default-src https:; script-src https: 'unsafe-eval' 'unsafe-inline'; style-src https: 'unsafe-inline'; img-src https: data:; font-src https: data:; report-uri /csp-report"}],"cookie":[],"responseTime":null,"body":"[\n    {\n        \"id\": 17,\n        \"logo\": \"https://logo.clearbit.com/adobe.com\",\n        \"name\": \"Webovio\",\n        \"legalName\": null,\n        \"type\": \"private\",\n        \"domain\": \"webovio.com\",\n        \"additionalDomains\": [],\n        \"employees\": 10,\n        \"location\": \"860 City Center Blvd #60, Kennesaw, GA 30144, USA\",\n        \"description\": \"Our number one priority since 1947 continues to be our customers. Dustex provides compliance support with the most efficient and cost effective Air Pollution Control (APC) solutions.\",\n        \"industry\": \"Renewable Electricity\",\n        \"phone\": \"678-372-6877\",\n        \"scores\": [\n            {\n                \"scoreName\": \"FortifyScore\",\n                \"score\": 812,\n                \"scoreChange\": 0\n            },\n            {\n                \"scoreName\": \"Demo\",\n                \"score\": 792,\n                \"scoreChange\": 0\n            },\n            {\n                \"scoreName\": \"External Only\",\n                \"score\": 817,\n                \"scoreChange\": 0\n            }\n        ]\n    },\n    {\n        \"id\": 31,\n        \"logo\": null,\n        \"name\": \"Cyberlinx\",\n        \"legalName\": null,\n        \"type\": \"private\",\n        \"domain\": \"cyberlinx.com\",\n        \"additionalDomains\": [],\n        \"employees\": 2300000,\n        \"location\": \"United States\",\n        \"description\": \"Global leaders in quality domain names. Branding experts with an array of different premium domain names available for purchase.\",\n        \"industry\": \"Beverages\",\n        \"phone\": \"4040006000\",\n        \"scores\": [\n            {\n                \"scoreName\": \"FortifyScore\",\n                \"score\": 812,\n                \"scoreChange\": 0\n            },\n            {\n                \"scoreName\": \"Demo\",\n                \"score\": 792,\n                \"scoreChange\": 0\n            },\n            {\n                \"scoreName\": \"External Only\",\n                \"score\": 817,\n                \"scoreChange\": 0\n            }\n        ]\n    },\n    {\n        \"id\": 35,\n        \"logo\": null,\n        \"name\": \"Hooli\",\n        \"legalName\": null,\n        \"type\": \"private\",\n        \"domain\": \"hooli.xyz\",\n        \"additionalDomains\": [],\n        \"employees\": 3,\n        \"location\": \"United States\",\n        \"description\": \"Stream all episodes now on HBO.\",\n        \"industry\": \"Internet Software & Services\",\n        \"phone\": \"4040006000\",\n        \"scores\": [\n            {\n                \"scoreName\": \"FortifyScore\",\n                \"score\": 812,\n                \"scoreChange\": 0\n            },\n            {\n                \"scoreName\": \"Demo\",\n                \"score\": 792,\n                \"scoreChange\": 0\n            },\n            {\n                \"scoreName\": \"External Only\",\n                \"score\": 817,\n                \"scoreChange\": 0\n            }\n        ]\n    },\n    {\n        \"id\": 68,\n        \"logo\": \"https://logo.clearbit.com/piedpiper.com\",\n        \"name\": \"Pied Piper\",\n        \"legalName\": null,\n        \"type\": \"private\",\n        \"domain\": \"piedpiper.com\",\n        \"additionalDomains\": [],\n        \"employees\": 5,\n        \"location\": \"Newell Rd, Palo Alto, CA 94303, USA\",\n        \"description\": \"Stream all episodes now on HBO.\",\n        \"industry\": \"Internet Software & Services\",\n        \"phone\": \"4049007896\"\n        ,\n        \"scores\": [\n            {\n                \"scoreName\": \"FortifyScore\",\n                \"score\": 612,\n                \"scoreChange\": 0\n            },\n            {\n                \"scoreName\": \"Demo\",\n                \"score\": 792,\n                \"scoreChange\": 0\n            },\n            {\n                \"scoreName\": \"External Only\",\n                \"score\": 817,\n                \"scoreChange\": 0\n            }\n        ]\n    }\n]"}],"_postman_id":"2ffcbee3-063b-49e5-a735-6b166c9c7bd8"},{"name":"TPRM Summary","id":"abc615df-e6d1-4af4-8f54-6cbe0fb78e8f","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"auth":{"type":"noauth","isInherited":false},"method":"GET","header":[{"key":"Authorization","value":"ApiKey {{api_key}}","type":"text"}],"url":"https://api.{{region}}.fortifydata.com/api/v1/vendor/list/{{companyId}}","description":"<p>Returns a list of third parties for the company ID provided. The company ID should be your company's ID.</p>\n<p>Requires the <em>TPRM Summary</em> permission.</p>\n<p>Possible values for the <em>assessmentType</em> field are:</p>\n<ul>\n<li><p>Profile Only - for Profily Only third-parties</p>\n</li>\n<li><p>Questionnaire Only - for third-parties with only a questionnaire assigned and no external assessment</p>\n</li>\n<li><p>One-time Assessment - for one-time third-parties with no questionnaire assigned</p>\n</li>\n<li><p>Monitored - for monitored third-parties with no questionnaire assigned</p>\n</li>\n<li><p>One-time Assessment with Questionnaire - for one-time third-parties with a questionnaire assigned</p>\n</li>\n<li><p>Monitored with Questionnaire - for monitored third-parties with a questionnaire assigned</p>\n</li>\n</ul>\n<p>Error Codes:</p>\n<ul>\n<li><p>Returns <code>404</code> if invalid company ID provided</p>\n</li>\n<li><p>Returns <code>403</code> if not authorized</p>\n</li>\n</ul>\n","urlObject":{"protocol":"https","path":["api","v1","vendor","list","{{companyId}}"],"host":["api","{{region}}","fortifydata","com"],"query":[],"variable":[]}},"response":[{"id":"e79861ef-02a0-4d7c-b3c8-4943df2c21c1","name":"Successful Response","originalRequest":{"method":"GET","header":[{"key":"Authorization","value":"ApiKey {{api_key}}","type":"text"}],"url":"https://api.{{region}}.fortifydata.com/api/v1/vendor/list/{{companyId}}"},"status":"OK","code":200,"_postman_previewlanguage":"json","header":[{"key":"Server","value":"nginx/1.23.2"},{"key":"Date","value":"Mon, 05 Dec 2022 12:32:32 GMT"},{"key":"Content-Type","value":"application/json;charset=UTF-8"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Connection","value":"keep-alive"},{"key":"X-Content-Type-Options","value":"nosniff"},{"key":"X-Content-Type-Options","value":"nosniff"},{"key":"X-XSS-Protection","value":"1; mode=block"},{"key":"Cache-Control","value":"no-cache, no-store, max-age=0, must-revalidate"},{"key":"Pragma","value":"no-cache"},{"key":"Expires","value":"0"},{"key":"X-Frame-Options","value":"DENY"},{"key":"X-Frame-Options","value":"DENY"},{"key":"Strict-Transport-Security","value":"max-age=31536000; includeSubDomains"},{"key":"Content-Security-Policy-Report-Only","value":"default-src https:; script-src https: 'unsafe-eval' 'unsafe-inline'; style-src https: 'unsafe-inline'; img-src https: data:; font-src https: data:; report-uri /csp-report"}],"cookie":[],"responseTime":null,"body":"[\n    {\n        \"vendorCompanyId\": 31,\n        \"name\": \"Cyberlinx\",\n        \"domain\": \"cyberlinx.com\",\n        \"additionalDomains\": [],\n        \"scores\": [\n            {\n                \"scoreName\": \"FortifyScore\",\n                \"score\": 818,\n                \"scoreChange\": 71\n            },\n            {\n                \"scoreName\": \"TPRM Custom Score\",\n                \"score\": 798,\n                \"scoreChange\": 0\n            }\n        ],\n        \"lastAssessmentDate\": 1669382183000,\n        \"lastAssessmentDateISO\": \"2022-11-25 13:16:23\",\n        \"scoreThreshold\": 600,\n        \"assessmentType\": \"One-time Assessment with Questionnaire\",\n        \"tags\": [\n            \"Supplier\"\n        ]\n    },\n    {\n        \"vendorCompanyId\": 35,\n        \"name\": \"Hooli\",\n        \"domain\": \"hooli.xyz\",\n        \"additionalDomains\": [\n            \"hooz.xyz\"\n        ],\n        \"scores\": [\n            {\n                \"scoreName\": \"FortifyScore\",\n                \"score\": 660,\n                \"scoreChange\": 0\n            },\n            {\n                \"scoreName\": \"TPRM Custom Score\",\n                \"score\": 718,\n                \"scoreChange\": 0\n            }\n        ],\n        \"lastAssessmentDate\": 1669941717000,\n        \"lastAssessmentDateISO\": \"2022-12-02 00:41:57\",\n        \"scoreThreshold\": 675,\n        \"assessmentType\": \"One-time Assessment with Questionnaire\",\n        \"tags\": [\n            \"Supplier\",\n            \"Tier 1\"\n        ]\n    },\n    {\n        \"vendorCompanyId\": 95,\n        \"name\": \"itsecgames\",\n        \"domain\": \"itsecgames.com\",\n        \"additionalDomains\": [],\n        \"scores\": [],\n        \"lastAssessmentDate\": 1670122726000,\n        \"lastAssessmentDateISO\": \"N/A\",\n        \"scoreThreshold\": 675,\n        \"assessmentType\": \"Questionnaire Only\",\n        \"tags\": [\n            \"Contractor or sub-contractor\",\n            \"Supplier/vendor\"\n        ]\n    }\n]"}],"_postman_id":"abc615df-e6d1-4af4-8f54-6cbe0fb78e8f"},{"name":"Add Third Party","id":"787a0f93-9d7e-40b3-8943-6b9f55aed982","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"POST","header":[],"url":"https://api.{{region}}.fortifydata.com/api/v1/vendor","description":"<p>Adds a third party to your profile.</p>\n<p>Request Fields (only <em>domain</em> required):</p>\n<ul>\n<li>domain : top level domain with no <em>www.</em> and no slashes <strong>(required)</strong></li>\n<li>classification : indicates the criticality of this vendor to your organization<ul>\n<li>CRITICAL</li>\n<li>MODERATE <em>(default)</em></li>\n<li>LOW</li>\n</ul>\n</li>\n<li>monitoring : type of external monitoring desired. If no value provided, this will default to the value set as the default when your organization was onboarded.<ul>\n<li>ONE_TIME</li>\n<li>CONTINUOUS</li>\n<li>NONE</li>\n</ul>\n</li>\n<li>minimumAcceptableScore : an integer value between 300 and 900 that represents the minimum score your organization considers acceptable for this vendor. Defaults to <strong>675</strong> if not provided.</li>\n<li>thirdPartyRoles : an array of roles this third party performs for your organization.</li>\n<li>servicesRendered : a description of the services this third party provides your organization.</li>\n</ul>\n<p>If the third party is an existing company on the platform, the assessment summary data will be returned. If the data is more than 31 days old, we will run a new assessment.</p>\n<p>If the company is new to the platform, an assessment will be started and you'll receive a pending result with the new company's <em>id</em>.</p>\n<p>Requires the <em>Add Third Parties</em> permission.</p>\n","urlObject":{"protocol":"https","path":["api","v1","vendor"],"host":["api","{{region}}","fortifydata","com"],"query":[],"variable":[]}},"response":[{"id":"49c75378-5732-4685-b63c-c71e55b9a6ca","name":"Add existing company as third party","originalRequest":{"method":"POST","header":[{"key":"Authorization","value":"ApiKey {{api_key}}","type":"text"}],"body":{"mode":"raw","raw":"{\r\n    \"domain\" : \"webovio.com\",\r\n\t\"classification\" : \"MODERATE\",\r\n    \"monitoring\": \"ONE_TIME\",\r\n    \"minimumAcceptableScore\" : 735,\r\n    \"thirdPartyRoles\" : [\"Supplier/vendor\", \"Subsidiary\"],\r\n    \"servicesRendered\" : \"Services\"\r\n}"},"url":"https://api.{{region}}.fortifydata.com/api/v1/vendor"},"code":200,"_postman_previewlanguage":null,"header":null,"cookie":[],"responseTime":null,"body":"{\r\n    \"companyId\": 17,\r\n    \"companyName\": \"Webovio\",\r\n    \"domain\": \"webovio.com\",\r\n    \"status\": \"COMPLETE\",\r\n    \"score\": 757,\r\n    \"lastCheckedDate\": \"2021-04-29T19:31:51.000+0000\",\r\n    \"totalInfrastructureIssuesCount\": 6,\r\n    \"severeInfrastructureIssuesCount\": 0,\r\n    \"highInfrastructureIssuesCount\": 0,\r\n    \"mediumInfrastructureIssuesCount\": 2,\r\n    \"lowInfrastructureIssuesCount\": 4,\r\n    \"totalApplicationIssuesCount\": 3,\r\n    \"criticalApplicationIssuesCount\": 0,\r\n    \"highApplicationIssuesCount\": 0,\r\n    \"mediumApplicationIssuesCount\": 2,\r\n    \"lowApplicationIssuesCount\": 1,\r\n    \"totalDarkWebRecordsCount\": 0,\r\n    \"partialCredentialsCount\": 0,\r\n    \"fullCredentialsCount\": 0,\r\n    \"companyAssetsCount\": 4,\r\n    \"vendorImpactScore\": -75,\r\n    \"scores\": [\r\n        {\r\n            \"scoreName\": \"FortifyScore\",\r\n            \"score\": 665\r\n        },\r\n        {\r\n            \"scoreName\": \"Fortify Comply Score FD\",\r\n            \"score\": 694\r\n        }\r\n    ]\r\n}"},{"id":"437b52e7-e05e-4689-a42d-d384a1dadc00","name":"Add new company as third party","originalRequest":{"method":"POST","header":[{"key":"Authorization","value":"ApiKey {{api_key}}","type":"text"}],"body":{"mode":"raw","raw":"{\r\n    \"domain\" : \"example.company\"\r\n}"},"url":"https://api.{{region}}.fortifydata.com/api/v1/vendor"},"code":200,"_postman_previewlanguage":null,"header":null,"cookie":[],"responseTime":null,"body":"{\r\n    \"companyId\": 571,\r\n    \"companyName\": \"Example Company\",\r\n    \"domain\": \"example.company\",\r\n    \"status\": \"PENDING\",\r\n    \"score\": 0,\r\n    \"lastCheckedDate\": null,\r\n    \"totalInfrastructureIssuesCount\": 0,\r\n    \"severeInfrastructureIssuesCount\": 0,\r\n    \"highInfrastructureIssuesCount\": 0,\r\n    \"mediumInfrastructureIssuesCount\": 0,\r\n    \"lowInfrastructureIssuesCount\": 0,\r\n    \"totalApplicationIssuesCount\": 0,\r\n    \"criticalApplicationIssuesCount\": 0,\r\n    \"highApplicationIssuesCount\": 0,\r\n    \"mediumApplicationIssuesCount\": 0,\r\n    \"lowApplicationIssuesCount\": 0,\r\n    \"totalDarkWebRecordsCount\": 0,\r\n    \"partialCredentialsCount\": 0,\r\n    \"fullCredentialsCount\": 0,\r\n    \"companyAssetsCount\": 0,\r\n    \"vendorImpactScore\": 0,\r\n    \"scores\": []\r\n}"}],"_postman_id":"787a0f93-9d7e-40b3-8943-6b9f55aed982"},{"name":"Add Vulnerabilities","id":"061f7365-610e-4ea7-835a-2c21bcd71795","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"POST","header":[{"key":"Authorization","value":"ApiKey {{api_key}}","type":"text"}],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://api.{{region}}.fortifydata.com/api/v1/vulnerability/add/{{companyId}}","description":"<p>Add internal vulnerabilities to your latest assessment.</p>\n<h4 id=\"required-parameter\">Required parameter</h4>\n<p><em>companyId</em>: your company's ID. You can get this value by calling the Get Assessment Summary by Domain API with your company's domain.</p>\n<h4 id=\"request-fields\">Request fields</h4>\n<p>The expected POST body is an array of vulnerabilities.</p>\n<h5 id=\"vulnerability-fields\">Vulnerability fields</h5>\n<ul>\n<li>pluginId (<em>required</em>): the ID of the plugin that found the vulnerability</li>\n<li>cve: a comma separated list of CVEs that apply to the vulnerability</li>\n<li>cvss: CVSS version 2</li>\n<li>cvssV3BaseScore: CVSS version 3</li>\n<li>severity: numeric value between 0 and 4<ul>\n<li>0 = INFO</li>\n<li>1 = LOW</li>\n<li>2 = MODERATE</li>\n<li>3 = HIGH</li>\n<li>4 = CRITICAL</li>\n</ul>\n</li>\n<li>ipAddress (<em>required</em>): the IP address of the affected host</li>\n<li>host (<em>required</em>): the name of the affected host</li>\n<li>protocol (<em>required</em>): protocol of port on which the vulnerability was found (tcp or udp).</li>\n<li>port (<em>required</em>): port on which the vulnerability was found</li>\n<li>name (<em>required</em>): vulnerability name</li>\n<li>synopsis (<em>required</em>): a synopsis of the vulnerability</li>\n<li>description: additional description of the vulnerability</li>\n<li>pluginOutput: specific details about the finding (e.g. file locations and other details specific to the host)</li>\n<li>source (<em>required</em>): the source of the vulnerability<ul>\n<li>TENABLE</li>\n<li>RAPID7</li>\n<li>QUALYS</li>\n<li>CROWDSTRIKE</li>\n<li>OPENVAS</li>\n</ul>\n</li>\n</ul>\n<p>For each vulnerability at least one of <em>cvss</em>, <em>cvssV3BaseScore</em>, or <em>severity</em> is <strong>required</strong>.</p>\n<p>The response will be an object giving a summary of the POST results:</p>\n<ul>\n<li>companyId: your companyID</li>\n<li>addedRecordsCount: the number of vulnerabilities added successfully</li>\n<li>invalidRecordsCount: the number of vulnerabilities that could not be added due to invalid values</li>\n<li>invalidRecordsList: the vulnerabilities that couldn't be added due to invalid data provided</li>\n</ul>\n<p>Each valid vulnerability will be added to your companies latest assessment as an internal vulnerability.</p>\n<p>Requires the <em>Add Vulnerabilities</em> permission.</p>\n","urlObject":{"protocol":"https","path":["api","v1","vulnerability","add","{{companyId}}"],"host":["api","{{region}}","fortifydata","com"],"query":[],"variable":[]}},"response":[{"id":"67aade31-e987-4aa7-b73e-b0faed89d449","name":"Successful POST","originalRequest":{"method":"POST","header":[{"key":"Authorization","value":"ApiKey {{api_key}}","type":"text"}],"body":{"mode":"raw","raw":"[{\r\n    \"pluginId\" : \"132101\",\r\n\t\"cve\" : \"CVE-2018-3620, CVE-2017-5753, CVE-2018-12127, CVE-2017-5754, CVE-2019-11135, CVE-2018-3639\",\r\n    \"cvss\": \"5.4\",\r\n    \"cvssV3BaseScore\" : \"5.4\",\r\n    \"severity\" : 2,\r\n    \"ipAddress\" : \"192.168.0.23\",\r\n    \"host\" : \"DESKTOP01\",\r\n    \"protocol\" : \"udp\",\r\n    \"port\" : \"23\",\r\n    \"name\" : \"Windows Speculative Execution Configuration Check\",\r\n    \"synopsis\" : \"The remote host has not properly mitigated a series of speculative execution vulnerabilities.\",\r\n    \"description\" : \"The remote host has not properly mitigated a series of known speculative execution vulnerabilities.\",\r\n    \"pluginOutput\" : \"Even more descriptive details about the vulnerability\",\r\n    \"source\" : \"TENABLE\"\r\n},\r\n{\r\n    \"pluginId\" : \"132101\",\r\n\t\"cve\" : \"CVE-2018-3620, CVE-2017-5753, CVE-2018-12127, CVE-2017-5754, CVE-2019-11135, CVE-2018-3639\",\r\n    \"cvss\": \"5.4\",\r\n    \"cvssV3BaseScore\" : \"5.4\",\r\n    \"severity\" : 2,\r\n    \"ipAddress\" : \"192.168.222.6\",\r\n    \"host\" : \"DESKTOP02\",\r\n    \"protocol\" : \"udp\",\r\n    \"port\" : \"23\",\r\n    \"name\" : \"Windows Speculative Execution Configuration Check\",\r\n    \"synopsis\" : \"The remote host has not properly mitigated a series of speculative execution vulnerabilities.\",\r\n    \"description\" : \"The remote host has not properly mitigated a series of known speculative execution vulnerabilities.\",\r\n    \"pluginOutput\" : \"Even more descriptive details about the vulnerability\",\r\n    \"source\" : \"TENABLE\"\r\n},\r\n{\r\n    \"pluginId\" : \"154258\",\r\n\t\"cve\" : \"CVE-2022-21278, CVE-2021-35608, CVE-2021-35607, CVE-2021-35628, CVE-2021-36222, CVE-2021-35627, CVE-2021-35604, CVE-2021-35626\",\r\n    \"cvss\": \"7.5\",\r\n    \"cvssV3BaseScore\" : \"7.5\",\r\n    \"severity\" : 3,\r\n    \"ipAddress\" : \"192.168.222.6\",\r\n    \"host\" : \"DESKTOP02\",\r\n    \"protocol\" : \"tcp\",\r\n    \"port\" : \"3206\",\r\n    \"name\" : \"MySQL 8.0.x < 8.0.27 Multiple Vulnerabilities (Oct 2021 CPU)\",\r\n    \"synopsis\" : \"The remote database server is affected by multiple vulnerabilities.\",\r\n    \"description\" : \"The version of MySQL running on the remote host is 8.0.x prior to 8.0.27. It is, therefore, affected by multiple vulnerabilities, including the following, as noted in the October 2021 Critical Patch Update advisory\",\r\n    \"pluginOutput\" : \"Even more descriptive details about the vulnerability\",\r\n    \"source\" : \"TENABLE\"\r\n}\r\n]","options":{"raw":{"language":"json"}}},"url":"https://api.{{region}}.fortifydata.com/api/v1/vulnerability/add/{{companyId}}"},"status":"OK","code":200,"_postman_previewlanguage":"json","header":[{"key":"Server","value":"nginx/1.21.6"},{"key":"Date","value":"Mon, 07 Mar 2022 16:49:58 GMT"},{"key":"Content-Type","value":"application/json;charset=UTF-8"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Connection","value":"keep-alive"},{"key":"X-Content-Type-Options","value":"nosniff"},{"key":"X-Content-Type-Options","value":"nosniff"},{"key":"X-XSS-Protection","value":"1; mode=block"},{"key":"Cache-Control","value":"no-cache, no-store, max-age=0, must-revalidate"},{"key":"Pragma","value":"no-cache"},{"key":"Expires","value":"0"},{"key":"X-Frame-Options","value":"DENY"},{"key":"X-Frame-Options","value":"DENY"},{"key":"Strict-Transport-Security","value":"max-age=31536000; includeSubDomains"},{"key":"Content-Security-Policy-Report-Only","value":"default-src https:; script-src https: 'unsafe-eval' 'unsafe-inline'; style-src https: 'unsafe-inline'; img-src https: data:; font-src https: data:; report-uri /csp-report"}],"cookie":[],"responseTime":null,"body":"{\n    \"companyId\": 12,\n    \"addedRecordsCount\": 3,\n    \"invalidRecordsCount\": 0,\n    \"invalidRecordsList\": []\n}"},{"id":"84bd0d61-954d-48d8-972a-b8b017f3118c","name":"Invalid POST","originalRequest":{"method":"POST","header":[{"key":"Authorization","value":"ApiKey {{api_key}}","type":"text"}],"body":{"mode":"raw","raw":"[{\r\n    \"pluginId\" : \"132101\",\r\n\t\"cve\" : \"CVE-2018-3620, CVE-2017-5753, CVE-2018-12127, CVE-2017-5754, CVE-2019-11135, CVE-2018-3639\",\r\n    \"cvss\": \"invalid\",\r\n    \"severity\" : 2,\r\n    \"ipAddress\" : \"192.168.0.23\",\r\n    \"host\" : \"DESKTOP01\",\r\n    \"protocol\" : \"udp\",\r\n    \"port\" : \"23\",\r\n    \"name\" : \"Windows Speculative Execution Configuration Check\",\r\n    \"synopsis\" : \"The remote host has not properly mitigated a series of speculative execution vulnerabilities.\",\r\n    \"description\" : \"The remote host has not properly mitigated a series of known speculative execution vulnerabilities.\",\r\n    \"pluginOutput\" : \"Even more descriptive details about the vulnerability\",\r\n    \"source\" : \"TENABLE\"\r\n},\r\n{\r\n    \"pluginId\" : \"132101\",\r\n    \"cvss\": \"5.4\",\r\n    \"cvssV3BaseScore\" : \"5.4\",\r\n    \"severity\" : 2,\r\n    \"ipAddress\" : \"192.168.222.6\",\r\n    \"host\" : \"DESKTOP02\",\r\n    \"protocol\" : \"udp\",\r\n    \"port\" : \"23\",\r\n    \"synopsis\" : \"The remote host has not properly mitigated a series of speculative execution vulnerabilities.\",\r\n    \"description\" : \"The remote host has not properly mitigated a series of known speculative execution vulnerabilities.\",\r\n    \"pluginOutput\" : \"Even more descriptive details about the vulnerability\",\r\n    \"source\" : \"TENABLE\"\r\n}\r\n]","options":{"raw":{"language":"json"}}},"url":"https://api.{{region}}.fortifydata.com/api/v1/vulnerability/add/{{companyId}}"},"status":"OK","code":200,"_postman_previewlanguage":"json","header":[{"key":"Server","value":"nginx/1.21.6"},{"key":"Date","value":"Mon, 07 Mar 2022 16:54:33 GMT"},{"key":"Content-Type","value":"application/json;charset=UTF-8"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Connection","value":"keep-alive"},{"key":"X-Content-Type-Options","value":"nosniff"},{"key":"X-Content-Type-Options","value":"nosniff"},{"key":"X-XSS-Protection","value":"1; mode=block"},{"key":"Cache-Control","value":"no-cache, no-store, max-age=0, must-revalidate"},{"key":"Pragma","value":"no-cache"},{"key":"Expires","value":"0"},{"key":"X-Frame-Options","value":"DENY"},{"key":"X-Frame-Options","value":"DENY"},{"key":"Strict-Transport-Security","value":"max-age=31536000; includeSubDomains"},{"key":"Content-Security-Policy-Report-Only","value":"default-src https:; script-src https: 'unsafe-eval' 'unsafe-inline'; style-src https: 'unsafe-inline'; img-src https: data:; font-src https: data:; report-uri /csp-report"}],"cookie":[],"responseTime":null,"body":"{\n    \"companyId\": 12,\n    \"addedRecordsCount\": 0,\n    \"invalidRecordsCount\": 2,\n    \"invalidRecordsList\": [\n        {\n            \"pluginId\": \"132101\",\n            \"cve\": \"CVE-2018-3620, CVE-2017-5753, CVE-2018-12127, CVE-2017-5754, CVE-2019-11135, CVE-2018-3639\",\n            \"cvss\": \"invalid\",\n            \"cvssV3BaseScore\": null,\n            \"severity\": 2,\n            \"ipAddress\": \"192.168.0.23\",\n            \"host\": \"DESKTOP01\",\n            \"protocol\": \"udp\",\n            \"port\": \"23\",\n            \"name\": \"Windows Speculative Execution Configuration Check\",\n            \"synopsis\": \"The remote host has not properly mitigated a series of speculative execution vulnerabilities.\",\n            \"description\": \"The remote host has not properly mitigated a series of known speculative execution vulnerabilities.\",\n            \"pluginOutput\": \"Even more descriptive details about the vulnerability\",\n            \"source\": \"TENABLE\",\n            \"assetId\": 0,\n            \"scanId\": 0\n        },\n        {\n            \"pluginId\": \"132101\",\n            \"cve\": null,\n            \"cvss\": \"5.4\",\n            \"cvssV3BaseScore\": \"5.4\",\n            \"severity\": 2,\n            \"ipAddress\": \"192.168.222.6\",\n            \"host\": \"DESKTOP02\",\n            \"protocol\": \"udp\",\n            \"port\": \"23\",\n            \"name\": null,\n            \"synopsis\": \"The remote host has not properly mitigated a series of speculative execution vulnerabilities.\",\n            \"description\": \"The remote host has not properly mitigated a series of known speculative execution vulnerabilities.\",\n            \"pluginOutput\": \"Even more descriptive details about the vulnerability\",\n            \"source\": \"TENABLE\",\n            \"assetId\": 0,\n            \"scanId\": 0\n        }\n    ]\n}"}],"_postman_id":"061f7365-610e-4ea7-835a-2c21bcd71795"}],"event":[{"listen":"prerequest","script":{"id":"1b710dbd-4799-4fca-95d9-9df4c0db0df9","type":"text/javascript","exec":[""]}},{"listen":"test","script":{"id":"219ee23e-0447-45e0-9887-f8bcade02019","type":"text/javascript","exec":[""]}}]}