Download Report Using Resource Name API
Use this API to download reports using resource ID. The Byte stream file is downloaded.
Input ParametersInput Parameters
Parameter |
Mandatory/Optional |
Data Type |
Description |
---|---|---|---|
id | Mandatory | String | Provide a unique ID of the report. |
resource-name | Mandatory | String | Provide resource name of the report. |
Authorization |
Mandatory |
String |
Authorization token to authenticate to the Qualys Enterprise TruRisk Platform Prepend token with Bearer and one space. For example - Bearer authToken |
SampleSample
API Request
curl -X GET '<qualys_base_url>/
etm/api/rest/v1/reports/20ce9e32-fe6e-4172-b5ee-ef770591c56b/resources/part_15097524224131306.json' --header 'Content-Type: application/json' --header 'Authorization: Bearer <JWT Token>'
Response
{ "cveId": "CVE-2024-49896", "assetId": 343748, "assetName": "arn:aws:ec2:eu-central-1:984186218765:instance/i-0de56c3fe2da2ed3c", "dnsName": "prod-runner-2", "assetType": "HOST", "findingId": "8ad29d66-152a-4c8b-8240-73b981cc4181", "ignored": false, "externalFindingId": "8d0b3cbe-ad3e-59ae-8732-4b73f251320a", "title": "CVE-2024-49896", "vendorProductName": "Wiz", "category": "VULNERABILITY", "lastFound": 1746443314000, "firstFound": 1741084281705, "severity": 1, "status": "ACTIVE", "vendorName": "Wiz", "lastUpdated": 1746443314000, "isChangeDetected": false, "qds": 30, "detectionResult": "The package `linux-aws` version `5.4.0-1030.31` was detected in `APT package manager` on a machine running `Ubuntu 20.04.1` is vulnerable to `CVE-2024-49896`, which exists in versions `>= 5.0.0 && < 5.4.0-1140.150`.\n\nThe vulnerability was found in the [Official Ubuntu Security Advisories](https://ubuntu.com/security/CVE-2024-49896) with vendor severity: `Medium` ([NVD](https://nvd.nist.gov/vuln/detail/CVE-2024-49896) severity: `Medium`).\n\nThe vulnerability can be remediated by updating the package to version `5.4.0-1140.150` or higher, using `apt upgrade linux-aws`.", "impact": "NA", "solution": "apt upgrade linux-aws", "description": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/amd/display: Check stream before comparing them\n\n[WHAT & HOW]\namdgpu_dm can pass a null stream to dc_is_stream_unchanged. It is\nnecessary to check for null before dereferencing them.\n\nThis fixes 1 FORWARD_NULL issue reported by Coverity.", "cve": { "cveId": "CVE-2024-49896", "qvs": 30, "trending": [ "03312025", "04022025", "04032025", "03182025" ], "cisaKnownExploits": false, "epssScore": 0.00028, "updated": 1746188184, "cvss2Info": { "temporalScore": 5 }, "cvss3Info": { "basescore": 5.5, "temporalScore": 5, "accessVector": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" } } }