Download Report Using Resource Name API

GET/etm/api/rest/v1/reports/{report-id}/resources/{resource-name}

Use this API to download reports using resource ID. The Byte stream file is downloaded.

Input ParametersInput Parameters

Parameter

Mandatory/Optional

Data Type

Description

id Mandatory String Provide a unique ID of the report.
resource-name Mandatory String Provide resource name of the report.

Authorization 

Mandatory

String

Authorization token to authenticate to the Qualys Enterprise TruRisk Platform

Prepend token with Bearer and one space.

For example - Bearer authToken

SampleSample

API Request

curl -X GET '<qualys_base_url>/etm/api/rest/v1/reports/20ce9e32-fe6e-4172-b5ee-ef770591c56b/resources/part_15097524224131306.json'
--header 'Content-Type: application/json' 
--header 'Authorization: Bearer <JWT Token>'

Response

 {
  "cveId": "CVE-2024-49896",
  "assetId": 343748,
  "assetName": "arn:aws:ec2:eu-central-1:984186218765:instance/i-0de56c3fe2da2ed3c",
  "dnsName": "prod-runner-2",
  "assetType": "HOST",
  "findingId": "8ad29d66-152a-4c8b-8240-73b981cc4181",
  "ignored": false,
  "externalFindingId": "8d0b3cbe-ad3e-59ae-8732-4b73f251320a",
  "title": "CVE-2024-49896",
  "vendorProductName": "Wiz",
  "category": "VULNERABILITY",
  "lastFound": 1746443314000,
  "firstFound": 1741084281705,
  "severity": 1,
  "status": "ACTIVE",
  "vendorName": "Wiz",
  "lastUpdated": 1746443314000,
  "isChangeDetected": false,
  "qds": 30,
  "detectionResult": "The package `linux-aws` version `5.4.0-1030.31` was detected in `APT package manager` on a machine running `Ubuntu 20.04.1` is vulnerable to `CVE-2024-49896`, which exists in versions `>= 5.0.0 && < 5.4.0-1140.150`.\n\nThe vulnerability was found in the [Official Ubuntu Security Advisories](https://ubuntu.com/security/CVE-2024-49896) with vendor severity: `Medium` ([NVD](https://nvd.nist.gov/vuln/detail/CVE-2024-49896) severity: `Medium`).\n\nThe vulnerability can be remediated by updating the package to version `5.4.0-1140.150` or higher, using `apt upgrade linux-aws`.",
  "impact": "NA",
  "solution": "apt upgrade linux-aws",
  "description": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/amd/display: Check stream before comparing them\n\n[WHAT & HOW]\namdgpu_dm can pass a null stream to dc_is_stream_unchanged. It is\nnecessary to check for null before dereferencing them.\n\nThis fixes 1 FORWARD_NULL issue reported by Coverity.",
  "cve": {
    "cveId": "CVE-2024-49896",
    "qvs": 30,
    "trending": [
      "03312025",
      "04022025",
      "04032025",
      "03182025"
    ],
    "cisaKnownExploits": false,
    "epssScore": 0.00028,
    "updated": 1746188184,
    "cvss2Info": {
      "temporalScore": 5
    },
    "cvss3Info": {
      "basescore": 5.5,
      "temporalScore": 5,
      "accessVector": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
    }
  }
}