This API helps you to get a list of vulnerabilities discovered by an EASM scan.
Parameters |
Mandatory/ Optional |
Data Type |
Description |
---|---|---|---|
asset.assetId |
Optional |
Integer |
Provide the asset Id for which you want to get the list of vulnerabilities. |
vulnerabilities.disabled |
Optional | Boolean | Provide the value true or false. |
vulnerabilities.ssl |
Optional | Boolean |
Provide the value true or false. |
vulnerabilities.found |
Optional | Boolean | Provide the value true or false. |
vulnerabilities.ignored |
Optional |
Boolean |
Provide the value true or false. |
vulnerabilities.qid |
Optional |
Integer |
Provide the qid of the vulnerability. |
vulnerabilities.port | Optional | Integer | Provide the port of the vulnerability. |
vulnerabilities.protocol | Optional | String | Provide the protocol of the vulnerability. |
vulnerabilities.lastFoundDate | Optional | Date | Provide the last found date of the vulnerability. |
vulnerabilities.firstFoundDate | Optional | Date | Provide the first found date of the vulnerability. |
vulnerabilities.status | Optional | String | Provides the current status of the vulnerability. The input values are ACTIVE, NEW, FIXED, REOPENED. |
vulnerabilities.severity | Optional | Integer | Provides the severity value of the vulnerability. The value ranges from 1 to 5. |
vulnerabilities.solution | Optional | String | Provides the solution value of the vulnerability. |
vulnerabilities.title | Optional | String | Provides the title of the vulnerability. |
vulnerabilities.rti | Optional | String | Provides the Real-Time Threat Indicator (RTI) value. The possible values are Easy_Exploit, No_Patch, Exploit_Public, Active_Attacks, High_Lateral_Movement, High_Data_loss, Denial_of_Service, Malware, Predicted_Hig_Risk, Remote-Code_execution. |
vulnerabilities.patchReleaseDate | Optional | Date | Provides the patch release date of the vulnerability on the format yyyy-mon-ddThh:mm:ss.000Z For example, "patchReleaseDate": "2019-02-26T00:00:00.000Z" |
Example:
{
"filters": [
{
"field": "asset.assetID",
"operator": "IN",
"value": "41734168,41734549"
}
]
}
API Request (without filter)
curl --location --request POST
'<qualys_base_url>/rest/2.0/search/am/easm/scan/vulns' \
--header 'Authorization: Bearer <JWT Token>' \
--data-raw ''
API Response (without filter)
{
"responseMessage": "Valid API Access",
"count": 2,
"responseCode": "SUCCESS",
"lastSeenId": 23846,
"hasMore": 0,
"easmVulnerabilityListData": {
"vulnerabilities": [
{
"id": 8760,
"assetID": 41734168,
"qid": 6,
"ssl": false,
"found": true,
"ignored": false,
"disabled": false,
"lastFoundDate": "2024-04-03T00:57:58.000Z",
"firstFoundDate": "2024-03-09T19:02:32.000Z",
"created": "2024-03-09T19:02:32.000Z",
"updated": "2024-04-03T00:57:58.000Z"
},
{
"id": 9022,
"assetID": 41734166,
"qid": 6,
"ssl": false,
"found": true,
"ignored": false,
"disabled": false,
"lastFoundDate": "2024-03-23T20:54:04.000Z",
"firstFoundDate": "2024-03-09T19:25:29.000Z",
"created": "2024-03-09T19:25:29.000Z",
"updated": "2024-03-23T20:54:04.000Z"
}
]
}
}
The following example shows the sample request to get vulnerabilities for a given assetID.
API Request
curl --location --request POST
'<qualys_base_url>/rest/2.0/search/am/easm/scan/vulns' \
--header 'Authorization: Bearer <JWT Token>' \
--header 'Content-Type: application/xml' \
--data-raw '<?xml version="1.0" encoding="UTF-8"?>
<FilterRequest>
<filters>
<criteria>
<field>asset.assetID</field>
<operator>EQUALS</operator>
<value>43333162</value>
</criteria>
</filters>
</FilterRequest>'
API Response
{
"responseMessage": "Valid API Access",
"count": 2,
"responseCode": "SUCCESS",
"lastSeenId": 32304,
"hasMore": 1,
"easmVulnerabilityListData": {
"vulnerabilities": [
{
"id": 32303,
"assetID": 43333162,
"qid": 86137,
"port": 443,
"ssl": false,
"found": true,
"ignored": false,
"disabled": false,
"protocol": "TCP",
"lastFoundDate": "2024-04-16T06:55:08.000Z",
"firstFoundDate": "2024-04-16T02:01:13.000Z",
"created": "2024-04-16T02:01:13.000Z",
"updated": "2024-04-16T06:55:08.000Z"
},
{
"id": 32304,
"assetID": 43333162,
"qid": 38704,
"port": 443,
"ssl": false,
"found": true,
"ignored": false,
"disabled": false,
"protocol": "TCP",
"lastFoundDate": "2024-04-16T06:55:08.000Z",
"firstFoundDate": "2024-04-16T02:01:13.000Z",
"created": "2024-04-16T02:01:13.000Z",
"updated": "2024-04-16T06:55:08.000Z"
}
]
}
}
The following example shows a sample request to get all assets having vulnerabilities with QID.
API Request
curl --location '<qualys_base_url>/rest/2.0/search/am/easm/scan/vulns' \
--header 'Content-Type: application/xml' \
--header 'Authorization: <JWT_Token>' \
--data '<?xml version="1.0" encoding="UTF-8"?>
<FilterRequest>
<filters>
<criteria>
<field>vulnerabilities.qid</field>
<operator>EQUALS</operator>
<value>38173</value>
</criteria>
</filters>
</FilterRequest>'
API Response
{
"responseMessage": "Valid API Access",
"count": 11,
"responseCode": "SUCCESS",
"lastSeenId": 68729,
"hasMore": 0,
"easmVulnerabilityListData": {
"vulnerabilities": [
{
"id": 31,
"assetID": 54513412,
"qid": 38173,
"port": 443,
"found": true,
"ignored": false,
"disabled": false,
"protocol": "TCP",
"lastFoundDate": "2024-10-28T08:13:08.000Z",
"firstFoundDate": "2024-05-29T10:12:46.000Z",
"lastScanned": "2024-10-28T08:13:08.000Z",
"created": "2024-05-29T10:12:46.000Z",
"updated": "2024-10-28T08:13:08.000Z",
"rti": [
"Easy_Exploit",
"No_Patch"
],
"solution": "Please install a server certificate signed by a trusted third-party Certificate Authority.",
"title": "SSL Certificate - Signature Verification Failed Vulnerability",
"vulnStatus": "REOPENED",
"severity": 2
},
{
"id": 2836,
"assetID": 54622241,
"qid": 38173,
"port": 443,
"found": true,
"ignored": false,
"disabled": false,
"protocol": "TCP",
"lastFoundDate": "2024-06-23T01:22:15.000Z",
"firstFoundDate": "2024-06-01T18:40:11.000Z",
"lastScanned": "2024-06-23T01:22:15.000Z",
"created": "2024-06-01T18:40:11.000Z",
"updated": "2024-06-23T01:22:15.000Z",
"rti": [
"Easy_Exploit",
"No_Patch"
],
"solution": "Please install a server certificate signed by a trusted third-party Certificate Authority.",
"title": "SSL Certificate - Signature Verification Failed Vulnerability",
"vulnStatus": "ACTIVE",
"severity": 2
}
]
}
}
API Request
curl --location --request POST '<qualys_base_url>/rest/2.0/search/am/easm/scan/vulns' \
--header 'Authorization: Bearer <JWT_Token>' \
--header 'Content-Type: application/xml' \
--data '<?xml version="1.0" encoding="UTF-8"?>
<FilterRequest>
<filters>
<criteria>
<field>vulnerabilities.severity</field>
<operator>EQUALS</operator>
<value>2</value>
</criteria>
</filters>
</FilterRequest>'
API Response
{
"responseMessage": "Valid API Access",
"count": 736,
"responseCode": "SUCCESS",
"lastSeenId": 102100,
"hasMore": 0,
"easmVulnerabilityListData": {
"vulnerabilities": [
{
"id": 4662,
"assetID": 55503403,
"qid": 38173,
"port": 443,
"ssl": true,
"found": true,
"ignored": false,
"disabled": false,
"protocol": "TCP",
"lastFoundDate": "2024-10-18T12:04:19.000Z",
"firstFoundDate": "2024-06-12T13:12:04.000Z",
"lastScanned": "2024-10-18T12:04:19.000Z",
"created": "2024-06-12T13:12:04.000Z",
"updated": "2024-10-18T12:04:19.000Z", "patchReleaseDate": "2019-02-26T00:00:00.000Z",
"rti": [
"Easy_Exploit",
"No_Patch"
],
"solution": "Please install a server certificate signed by a trusted third-party Certificate
Authority.",
"title": "SSL Certificate - Signature Verification Failed Vulnerability",
"vulnStatus": "ACTIVE",
"severity": 2
}
]
}
}
API Request
curl --location --request POST
'<qualys_base_url>/rest/2.0/search/am/easm/scan/vulns' \
--header 'Authorization: Bearer <JWT_Token>' \
--header 'Content-Type: application/json' \
--data '{
"filters": [
{
"field": "vulnerabilities.severity",
"operator": "EQUALS",
"value": "2"
}
]
}'
API Response
{
"responseMessage": "Valid API Access",
"count": 736,
"responseCode": "SUCCESS",
"lastSeenId": 102100,
"hasMore": 0,
"easmVulnerabilityListData": {
"vulnerabilities": [
{
"id": 4662,
"assetID": 55503403,
"qid": 38173,
"port": 443,
"ssl": true,
"found": true,
"ignored": false,
"disabled": false,
"protocol": "TCP",
"lastFoundDate": "2024-10-18T12:04:19.000Z",
"firstFoundDate": "2024-06-12T13:12:04.000Z",
"lastScanned": "2024-10-18T12:04:19.000Z",
"created": "2024-06-12T13:12:04.000Z",
"updated": "2024-10-18T12:04:19.000Z",
rti": [
"Easy_Exploit",
"No_Patch"
],
"solution": "Please install a server certificate signed by a trusted third-party Certificate Authority.",
"title": "SSL Certificate - Signature Verification Failed Vulnerability",
"vulnStatus": "ACTIVE",
"severity": 2
}
]
}