Search Custom QID 

This API lets you search Custom QID.

POST/sm/v1/qid/search

Input ParametersInput Parameters

Parameter Mandatory/Optional Data Type Description
pageNumber Optional Integer Provide the page to be returned. Starts from zero.
pageSize Optional Integer Provide the number of records per page to be included in the response. Default is 10.
qid Optional Long Provide QID for which you want to fetch the details.

Sample 1: QID Parameter is not passedSample 1: QID Parameter is not passed

API Request

curl -X POST 
'<qualys_base_url>/sm/v1/qid/search'
--header 'Accept: application/json' 
--header 'Authorization: Bearer <authToken>' 
--header 'Content-Type: application/json' 
--data-raw 
'{
 "pageNumber":0,
 "pageSize":5
}'

Response

{
 "body": {
 "totalCount": 5,
 "list": [
 {
 "qid": 54913077,
 "title": "Microsoft Internet Explorer Information
Disclosure Vulnerability",
 "typeId": "Vuln",
 "qds": 80,
 "severity": 3,
 "impact": null,
 "solution": null,
 "cveIds": "CVE-2023-19283",
 "bugTrackIds": null,
 "disabled": true,
 "description": "Microsoft Internet Explorer Information
Disclosure Vulnerability"
 },
 {
 "qid": 54910004,
 "title": "Mozilla Firefox Information Disclosure
 Vulnerability",
 "typeId": "Vuln",
 "qds": 68,
 "severity": 3,
 "impact": null,
 "solution": null,
 "cveIds": null,
 "bugTrackIds": null,
 "disabled": false,
 "description": "Mozilla Firefox Information Disclosure
 Vulnerability"
 },
 {
 "qid": 54910003,
 "title": "Spring4Shell",
 "typeId": "Vuln",
 "qds": 88,
 "severity": 4,
 "impact": A Spring MVC or Spring WebFlux application
 running on JDK 9+ may be vulnerable to remote code 
execution (RCE).,
 "solution": Users are recommended to upgrade to the latest
 version,
 "cveIds": null,
 "bugTrackIds": null,
 "disabled": false,
 "description": "Spring4Shell description"
 },
 {
 "qid": 54910002,
 "title": "Tomcat Improper Input Validation",
 "typeId": "Vuln",
 "qds": 88,
"severity": 3,
 "impact": "A trailer header that exceeded the header size
 limit could cause Tomcat to treat a single request as 
multiple requests leading to the possibility of request smuggling when behind a 
reverse proxy.",
 "solution": "Users are recommended to upgrade to the latest
 version",
 "cveIds": string,
 "bugTrackIds": null,
 "disabled": false,
 "description": "Tomcat Improper Input Validation
 description"
 },
 {
 "qid": 54910001,
 "title": "Log4Shell",
 "typeId": "Vuln",
 "qds": 98,
 "severity": 4,
 "impact": Apache Log4j2 versions 2.14.1 and below proof
 of concept remote code execution exploit,
 "solution": Users are recommended to upgrade to the latest
 version,
 "cveIds": CVE-2029-2244,
 "bugTrackIds": null,
 "disabled": false,
 "description": "Log4Shell description"
 }
 ]
 }
}

Sample 2: QID Parameter is PassedSample 2: QID Parameter is Passed

API Request

curl -X POST 
'<qualys_base_url>/sm/v1/qid/search'
--header 'Accept: application/json' 
--header 'Authorization: Bearer <authToken>' 
--header 'Content-Type: application/json' \
--data-raw '{
 "pageNumber":0,
 "pageSize":5,
 "qid": 54571562
}'

Response

{
 "body": {
 "totalCount": 1,
 "list": [
 {
 "qid": 54571562,
 "title": "AutomationQID",
 "typeId": "Vuln",
 "qds": 90,
 "severity": 4,
 "impact": "Automation",
 "solution": "Automation",
 "cveIds": "CVE-2022-2244",
 "bugTrackIds": null,
 "disabled": false,
 "description": "QID created using Automation Script"
 }
 ]
 }
}