Search Custom QID
This API lets you search Custom QID.
Input ParametersInput Parameters
Parameter | Mandatory/Optional | Data Type | Description |
---|---|---|---|
pageNumber | Optional | Integer | Provide the page to be returned. Starts from zero. |
pageSize | Optional | Integer | Provide the number of records per page to be included in the response. Default is 10. |
qid | Optional | Long | Provide QID for which you want to fetch the details. |
Sample 1: QID Parameter is not passedSample 1: QID Parameter is not passed
API Request
curl -X POST
'<qualys_base_url>/sm/v1/qid/search'
--header 'Accept: application/json'
--header 'Authorization: Bearer <authToken>'
--header 'Content-Type: application/json'
--data-raw
'{
"pageNumber":0,
"pageSize":5
}'
Response
{
"body": {
"totalCount": 5,
"list": [
{
"qid": 54913077,
"title": "Microsoft Internet Explorer Information
Disclosure Vulnerability",
"typeId": "Vuln",
"qds": 80,
"severity": 3,
"impact": null,
"solution": null,
"cveIds": "CVE-2023-19283",
"bugTrackIds": null,
"disabled": true,
"description": "Microsoft Internet Explorer Information
Disclosure Vulnerability"
},
{
"qid": 54910004,
"title": "Mozilla Firefox Information Disclosure
Vulnerability",
"typeId": "Vuln",
"qds": 68,
"severity": 3,
"impact": null,
"solution": null,
"cveIds": null,
"bugTrackIds": null,
"disabled": false,
"description": "Mozilla Firefox Information Disclosure
Vulnerability"
},
{
"qid": 54910003,
"title": "Spring4Shell",
"typeId": "Vuln",
"qds": 88,
"severity": 4,
"impact": A Spring MVC or Spring WebFlux application
running on JDK 9+ may be vulnerable to remote code
execution (RCE).,
"solution": Users are recommended to upgrade to the latest
version,
"cveIds": null,
"bugTrackIds": null,
"disabled": false,
"description": "Spring4Shell description"
},
{
"qid": 54910002,
"title": "Tomcat Improper Input Validation",
"typeId": "Vuln",
"qds": 88,
"severity": 3,
"impact": "A trailer header that exceeded the header size
limit could cause Tomcat to treat a single request as
multiple requests leading to the possibility of request smuggling when behind a
reverse proxy.",
"solution": "Users are recommended to upgrade to the latest
version",
"cveIds": string,
"bugTrackIds": null,
"disabled": false,
"description": "Tomcat Improper Input Validation
description"
},
{
"qid": 54910001,
"title": "Log4Shell",
"typeId": "Vuln",
"qds": 98,
"severity": 4,
"impact": Apache Log4j2 versions 2.14.1 and below proof
of concept remote code execution exploit,
"solution": Users are recommended to upgrade to the latest
version,
"cveIds": CVE-2029-2244,
"bugTrackIds": null,
"disabled": false,
"description": "Log4Shell description"
}
]
}
}
Sample 2: QID Parameter is PassedSample 2: QID Parameter is Passed
API Request
curl -X POST
'<qualys_base_url>/sm/v1/qid/search'
--header 'Accept: application/json'
--header 'Authorization: Bearer <authToken>'
--header 'Content-Type: application/json' \
--data-raw '{
"pageNumber":0,
"pageSize":5,
"qid": 54571562
}'
Response
{
"body": {
"totalCount": 1,
"list": [
{
"qid": 54571562,
"title": "AutomationQID",
"typeId": "Vuln",
"qds": 90,
"severity": 4,
"impact": "Automation",
"solution": "Automation",
"cveIds": "CVE-2022-2244",
"bugTrackIds": null,
"disabled": false,
"description": "QID created using Automation Script"
}
]
}
}