HEX
Server: Apache/2.4.65 (Ubuntu)
System: Linux ielts-store-v2 6.8.0-1036-gcp #38~22.04.1-Ubuntu SMP Thu Aug 14 01:19:18 UTC 2025 x86_64
User: root (0)
PHP: 7.2.34-54+ubuntu20.04.1+deb.sury.org+1
Disabled: pcntl_alarm,pcntl_fork,pcntl_waitpid,pcntl_wait,pcntl_wifexited,pcntl_wifstopped,pcntl_wifsignaled,pcntl_wifcontinued,pcntl_wexitstatus,pcntl_wtermsig,pcntl_wstopsig,pcntl_signal,pcntl_signal_get_handler,pcntl_signal_dispatch,pcntl_get_last_error,pcntl_strerror,pcntl_sigprocmask,pcntl_sigwaitinfo,pcntl_sigtimedwait,pcntl_exec,pcntl_getpriority,pcntl_setpriority,pcntl_async_signals,
Upload Files
File: //snap/google-cloud-cli/current/lib/surface/artifacts/docker/images/list_vulnerabilities.yaml
- release_tracks: [BETA, GA]
  help_text:
    brief: List On-Demand Scanning vulnerabilities.
    description: |
      List On-Demand Scanning vulnerabilities from a completed scan.
    examples: |
      The following command lists vulnerabilities from a completed On-Demand
      Scanning scan.

        $ {command} projects/my-project/locations/europe/scans/fff66882-0z55-4333-l619-z1z00df6040c

  command_type: LIST
  request:
    collection: ondemandscanning.projects.locations.scans.vulnerabilities
    BETA:
      api_version: v1beta1
    GA:
      api_version: v1

  arguments:
    resource:
      help_text: The scan resource to list vulnerabilites for.
      spec: !REF googlecloudsdk.command_lib.container.images.resources:scan
      is_positional: true

      # This is needed because the request path ends with "/vulnerabilities" and
      # doesn't match the Scan resource name, but they both refer to the same
      # actual resource object (vulnerability occurrences).
      override_resource_collection: true

    # These aren't supported at this time.
    exclude: ['filter', 'sort-by']