Fetches a list of vulnerabilities associated with a list. Use this API when the number of vulnerabilities is large.
Parameter | Mandatory/Optional | Data Type | Description |
---|---|---|---|
listId | Mandatory | string | Specify the ID/UUID of the list. |
filter | Optional | string |
Filter vulnerabilities by providing a query using Qualys syntax. Refer to the “How to Search” topic in the online help for assistance with creating your query. |
pageSize | Optional | integer |
The number of records per page to be included in the response. The default value is 50. |
nextPage | Optional | integer | Specify the next page query to fetch the results of the next page. Use the value from the previous response. |
API Request
curl -X "GET"
"<qualys_base_url>/csapi/v1.3/list/2862fff9-6b49-453f-bb66-112a5f26c3c2/vulns/list?pageSize=50"
-H "accept: application/json"
-H "Authorization: Bearer <token>"
Response
{
"data": [
{
"description": {
"EN": "Tenable virtual appliances deliver power, deployment speed and all around ease of use by virtually eliminating installation, configuration and maintenance problems.<P>\nThe Tenable Appliance contain several vulnerabilities. One exists in the underlying operating system kernel, two in the Appliance web interface, and multiple issues in bundled applications.<P>\nAffected Versions:<BR>\nTenable Appliance versions 3.4.0, 3.5.0, 3.5.1, 3.10.0, 3.10.1, 4.0.0, 4.1.0, 4.2.0, 4.3.0, 4.3.1, 4.4.0 are affected.\n<P>\n\nQID Detection Logic (Unauthenticated):<BR>\nThis QID sends a crafted HTTP request on TCP port 8000 and checks for the system response."
},
"consequence": {
"EN": "Successful exploitation of these vulnerabilities could allow an attacker to take control of the affected system."
},
"solution": {
"EN": "Customers are advised to refer to <A HREF=\"http://www.tenable.com/security/tns-2017-07\" TARGET=\"_blank\">tns-2017-07</A> for updates pertaining to this vulnerability."
},
"discoveryTypes": [
"REMOTE"
],
"published": 1495534216000,
"updated": 1689717601000,
"types": [
"VULNERABILITY"
],
"severity": 4,
"risk": 40,
"flags": [
"REMOTE",
"PCI_RELATED"
],
"category": "CGI",
"typeDetected": "CONFIRMED",
"authTypes": [],
"patches": [
642244
],
"vulnPatch": {
"patchAvailable": true,
"patchReleaseDate": 1488844800000,
"vendorSeverity": "High",
"patches": [
{
"id": 642244,
"advisoryID": "Tenable Appliance 4.5.0 or later version",
"lastModified": 1493766004000,
"link": "https://www.tenable.com/products/tenable-virtual-appliances#tos",
"rebootDetails": "Conditional",
"rebootRequired": 2
}
]
},
"qid": 11802,
"exploits": [
{
"name": "Linux Kernel 4.4.0 (Ubuntu) - DCCP Double-Free (PoC) - The Exploit-DB Ref : 41457",
"insertDate": 1488202773000,
"firstSeen": 1488067200000,
"link": "http://www.exploit-db.com/exploits/41457",
"reference": "CVE-2017-6074",
"vendor": {
"name": "The Exploit-DB",
"link": "http://www.exploit-db.com"
}
},
{
"name": "Linux Kernel 4.4.0 (Ubuntu) - DCCP Double-Free Privilege Escalation - The Exploit-DB Ref : 41458",
"insertDate": 1488202774000,
"firstSeen": 1488067200000,
"link": "http://www.exploit-db.com/exploits/41458",
"reference": "CVE-2017-6074",
"vendor": {
"name": "The Exploit-DB",
"link": "http://www.exploit-db.com"
}
},
{
"name": "Tenable Appliance < 4.5 - Unauthenticated Root Remote Code Execution",
"insertDate": 1493790371000,
"link": "https://www.exploit-db.com/exploits/41892/",
"reference": "CVE-2017-8051",
"vendor": {
"name": "Qualys",
"link": "http://www.qualys.com"
}
},
{
"name": "Tenable Appliance < 4.5 - Root Remote Code Execution - The Exploit-DB Ref : 41892",
"insertDate": 1495551120000,
"firstSeen": 1492473600000,
"link": "http://www.exploit-db.com/exploits/41892",
"reference": "CVE-2017-8051",
"vendor": {
"name": "The Exploit-DB",
"link": "http://www.exploit-db.com"
}
},
{
"name": "Linux Kernel DCCP_PKT_REQUEST Privilege Escalation Exploit - Core Security Category : Exploits/Local",
"insertDate": 1498763575000,
"reference": "CVE-2017-6074",
"vendor": {
"name": "Core Security",
"link": "http://www.coresecurity.com"
}
},
{
"name": "Linux Kernel 4.4.0 (Ubuntu) - DCCP Double-Free (PoC)",
"insertDate": 1685336402000,
"firstSeen": 1488067200000,
"link": "https://www.exploit-db.com/exploits/41457",
"reference": "CVE-2017-6074",
"vendor": {
"name": "exploitdb"
}
},
{
"name": "Linux Kernel DCCP_PKT_REQUEST Privilege Escalation Exploit",
"insertDate": 1685336402000,
"firstSeen": 1498694400000,
"link": "https://www.coresecurity.com/core-labs/exploits",
"reference": "CVE-2017-6074",
"vendor": {
"name": "coreimpact"
}
},
{
"name": "Linux Kernel 4.4.0 (Ubuntu) - DCCP Double-Free Privilege Escalation",
"insertDate": 1685336402000,
"firstSeen": 1488067200000,
"link": "https://www.exploit-db.com/exploits/41458",
"reference": "CVE-2017-6074",
"vendor": {
"name": "exploitdb"
}
},
{
"name": "Linux Kernel 4.4.0 Ubuntu DCCP Double-Free Privilege Escalation",
"insertDate": 1685336402000,
"firstSeen": 1488153600000,
"link": "https://packetstormsecurity.com/files/141331/Linux-Kernel-4.4.0-Ubuntu-DCCP-Double-Free-Privilege-Escalation.html",
"reference": "CVE-2017-6074",
"vendor": {
"name": "packetstorm"
}
},
{
"name": "Linux Kernel 4.4.0 Ubuntu DCCP Double-Free Crash",
"insertDate": 1685336402000,
"firstSeen": 1488153600000,
"link": "https://packetstormsecurity.com/files/141339/Linux-Kernel-4.4.0-Ubuntu-DCCP-Double-Free-Crash.html",
"reference": "CVE-2017-6074",
"vendor": {
"name": "packetstorm"
}
},
{
"name": "Linux Kernel 4.4.0 (Ubuntu) - DCCP Double-Free PoC Exploit",
"insertDate": 1685336402000,
"firstSeen": 1488067200000,
"link": "https://0day.today/exploit/27133",
"reference": "CVE-2017-6074",
"vendor": {
"name": "0day.today"
}
},
{
"name": "Linux Kernel 4.4.0 (Ubuntu) - DCCP Double-Free Privilege Escalation Exploit",
"insertDate": 1685336402000,
"firstSeen": 1488067200000,
"link": "https://0day.today/exploit/27134",
"reference": "CVE-2017-6074",
"vendor": {
"name": "0day.today"
}
},
{
"name": "Tenable Appliance 3.5 - 4.4.0, and possibly prior versions, contains a flaw in the simpleupload.py script in the Web UI. Through the manipulation of the tns_appliance_session_user parameter, a remote attacker can inject arbitrary commands.",
"insertDate": 1685404802000,
"firstSeen": 1492732800000,
"link": "https://www.exploit-db.com/exploits/41892/",
"reference": "CVE-2017-8051",
"vendor": {
"name": "nvd"
}
},
{
"name": "Tenable Appliance < 4.5 - Root Remote Code Execution",
"insertDate": 1685404802000,
"firstSeen": 1492473600000,
"link": "https://www.exploit-db.com/exploits/41892",
"reference": "CVE-2017-8051",
"vendor": {
"name": "exploitdb"
}
},
{
"name": "toanthang1842002/CVE-2017-6074 exploit repository",
"insertDate": 1689717601000,
"firstSeen": 1689379200000,
"link": "https://github.com/toanthang1842002/CVE-2017-6074",
"reference": "CVE-2017-6074",
"vendor": {
"name": "github-exploits"
}
}
],
"threatIntel": {
"activeAttacks": true,
"publicExploit": true,
"highLateralMovement": true,
"easyExploit": true,
"highDataLoss": true,
"denialOfService": true,
"malware": true,
"publicExploitNames": [
"Linux Kernel 4.4.0 (Ubuntu) - DCCP Double-Free (PoC) - The Exploit-DB Ref : 41457",
"Linux Kernel 4.4.0 (Ubuntu) - DCCP Double-Free Privilege Escalation - The Exploit-DB Ref : 41458",
"Tenable Appliance < 4.5 - Root Remote Code Execution - The Exploit-DB Ref : 41892",
"Linux Kernel DCCP_PKT_REQUEST Privilege Escalation Exploit - Core Security Category : Exploits/Local"
],
"malwareNames": [
"CVE-2017-6074",
"CVE-2017-7308"
],
"exploitKitNames": []
},
"malwares": [
{
"name": "CVE-2017-6074",
"platform": "Linux",
"type": "Exploit",
"firstSeen": 1532048192000,
"vendor": {
"name": "ReversingLabs",
"link": "https://www.reversinglabs.com"
}
},
{
"name": "CVE-2017-7308",
"platform": "Linux",
"type": "Exploit",
"firstSeen": 1610837068000,
"vendor": {
"name": "ReversingLabs",
"link": "https://www.reversinglabs.com"
}
}
],
"title": "Tenable Appliance Multiple Security Vulnerabilities",
"patchAvailable": true,
"cveIds": [
"CVE-2017-6074",
"CVE-2017-6543",
"CVE-2017-8050",
"CVE-2017-8051"
],
"vendorRefs": [
"tns-2017-07"
],
"vendorRefDetails": [
{
"vendorRef": "tns-2017-07",
"url": "http://www.tenable.com/security/tns-2017-07",
"urlID": 33459,
"lastModified": 1493766006000
}
],
"bugTraqIds": [
"96310",
"96418"
],
"cvssInfo": {
"baseScore": "10",
"temporalScore": "8.3",
"accessVector": "Network"
},
"cvss3Info": {
"baseScore": "9.8",
"temporalScore": "9.1"
},
"compliances": [],
"supportedBy": [
"VM"
],
"vendors": [
{
"vendorName": "linux",
"productName": "linux_kernel"
},
{
"vendorName": "tenable",
"productName": "nessus"
},
{
"vendorName": "tenable",
"productName": "appliance"
}
],
"qidProperties": [
"ap",
"noa",
"pci",
"lpt",
"os"
]
},
...
],
"count": 50,
"nextPage": [
"988179"
]
}
Was this topic helpful?