post https://{hostname}/api/risk-v2/v2/risks//vulnerabilities
Use this API to add or replace vulnerabilities on a risk.
Things to Know
- If vulnerabilities were previously assigned to the risk, those vulnerabilities will be replaced with the new specified vulnerabilities after calling this API.