Get List of Mitigations

Use this API to get a list of Fix-based mitigations with CVE and mitigation details for Windows and Linux.

POST/mtg/v1/vulnerabilities/mitigations

Input ParametersInput Parameters

Parameter

Mandatory/
Optional

Data Type

Description

pageNumber Optional Number Specify the page number. 
pageSize Optional Number Specify the page size. 
The maximum page size allowed is 200.
qids Optional Number Specify the QID to filter the list.
platform Optional String Specify the platform type.
For example, Windows, Linux.
implication Optional String Specify the implication type in capital letters.

Only FIX type mitigation is supported. The value is case sensitive.

Sample - Get List of Fix based mitigations for Windows and Linux (without filter)Sample - Get List of Fix based mitigations for Windows and Linux (without filter)

 This API provides a list of all QIDs with FIX type implication for Windows and Linux platforms. The maximum page size is 200.

API Request

  curl -X 'POST' \
  '<quayls_base_url>/mtg/v1/vulnerabilities/mitigations' \
  -H 'accept: application/json' \
  -H 'Authorization: Bearer <JWT_Token>\
  -H 'Content-Type: application/json' \
  -d '{}' 

API Response

[
  {
    "qid": 511693,
    "vulnMitigation": {
      "Linux": {
        "scriptBased": {
          "CVE-2019-9516": [
            {
              "mitigationId": "01914b7b-58af-73cf-b305-0386a423d5cc",
              "mitigationType": "Enforce System Hardening",
              "mitigationCategory": null,
              "description": "To remove the nghttp2 package on Debian, sudo apt purge command is used on:  nghttp2. On RHEL, sudo yum remove command is used on: nghttp2. This process ensures the package and its dependencies are completely removed from the system.",
              "impactFactor": 100,
              "isDefault": false,
              "implication": "FIX"
            }
          ],
          "CVE-2019-9513": [
            {
              "mitigationId": "01914b66-695a-716a-9689-88a9704d3406",
              "mitigationType": "Enforce System Hardening",
              "mitigationCategory": null,
              "description": "To remove the nghttp2 package on Debian, sudo apt purge command is used on:  nghttp2. On RHEL, sudo yum remove command is used on: nghttp2. This process ensures the package and its dependencies are completely removed from the system.",
              "impactFactor": 100,
              "isDefault": false,
              "implication": "FIX"
            }
          ]
        }
      }
    }
  },
  {
    "qid": 378079,
    "vulnMitigation": {
      "Windows": {
        "scriptBased": {
          "CVE-2023-22883": [
            {
              "mitigationId": "0fc55933-2421-4d73-a7ae-9c97fd0860eb",
              "mitigationType": "Install Update",
              "mitigationCategory": null,
              "description": "The signature updates Zoom to the latest version. Note If Zoom is installed in the user space, it will first uninstall it and then install the latest version for all users.",
              "impactFactor": 0,
              "isDefault": true,
              "implication": "FIX"
            }
          ]
        }
      }
    }
  }
]

Sample - Get List of Fix based mitigations for Windows (with filter)Sample - Get List of Fix based mitigations for Windows (with filter)

API Request

curl -X 'POST' \
  '<qualys_base_url>/mtg/v1/vulnerabilities/mitigations' \
  -H 'accept: application/json' \
  -H 'Authorization: Bearer <JWT_Token>' \
  -H 'Content-Type: application/json' \
  -d 

API Body

{
  "pageNumber": 0,
  "pageSize": 2,
  "qids": [],
  "platform": [
    "Windows"
  ],
  "implication": [
    "FIX"
  ]
}

API Response

[
  {
    "qid": 92163,
    "vulnMitigation": {
      "Windows": {
        "scriptBased": {
          "CVE-2024-38177": [
            {
              "mitigationId": "93e31bb0-447c-465a-94d3-c5e42f09687b",
              "mitigationType": "Install Update",
              "mitigationCategory": null,
              "description": "The signature will install the latest version of Windows App Installer.",
              "impactFactor": 100,
              "isDefault": true,
              "implication": "FIX"
            }
          ]
        }
      }
    }
  },
  {
    "qid": 370177,
    "vulnMitigation": {
      "Windows": {
        "scriptBased": {
          "CVE-2016-7855": [
            {
              "mitigationId": "2c92f84d-b99c-47bd-b5a8-5b46e148788f",
              "mitigationType": "Uninstall EOL",
              "mitigationCategory": null,
              "description": "Adobe no longer supports Flash Player after December 31, 2020 and blocked Flash content from running in Flash Player beginning January 12, 2021, Adobe strongly recommends all users immediately uninstall Flash Player to help protect their systems. This script checks for Adobe Flash Player and if found installed, it proceeds to uninstall it.",
              "impactFactor": 0,
              "isDefault": true,
              "implication": "FIX"
            }
          ]
        }
      }
    }
  }
]

Sample - Get List of Fix based mitigations with specific QIDsSample - Get List of Fix based mitigations with specific QIDs

API Request

curl -X 'POST' \
  '<qualys_base_url>/mtg/v1/vulnerabilities/mitigations' \
  -H 'accept: application/json' \
  -H 'Authorization: Bearer <JWT_Token>' \
  -H 'Content-Type: application/json' \
  -d 

API Body

{
  "pageNumber": 0,
  "pageSize": 10,
  "qids": [379939,105511],
  "platform": [
    "Windows"
  ],
  "implication": [
    "FIX"
  ]
}

API Response

[
  {
    "qid": 105511,
    "vulnMitigation": {
      "Windows": {
        "scriptBased": {
          "105511": [
            {
              "mitigationId": "4f45f994-2a2a-4ead-ac03-ece2278751ee",
              "mitigationType": "Uninstall EOL",
              "mitigationCategory": null,
              "description": "Adobe Reader 9.x installed. Adobe ended support for Adobe Reader 9.x on June 26, 2013 and provides no further updates. The script checks the installed version of Adobe Reader, and if it matches any of the affected versions, it proceeds to uninstall it.",
              "impactFactor": 0,
              "isDefault": true,
              "implication": "FIX"
            }
          ]
        }
      }
    }
  },
  {
    "qid": 379939,
    "vulnMitigation": {
      "Windows": {
        "scriptBased": {
          "CVE-2024-27239": [
            {
              "mitigationId": "9a3e1c8e-7ff1-4f3a-8f1e-3c762f3628d3",
              "mitigationType": "Uninstall Plugin",
              "mitigationCategory": null,
              "description": "The signature will remove vulnerable Zoom VDI plugins. Note: Use this signature only when the vulnerability detection is based on Zoom VDI.",
              "impactFactor": 0,
              "isDefault": false,
              "implication": "FIX"
            }
          ],
          "CVE-2024-27246": [
            {
              "mitigationId": "0fc55933-2421-4d73-a7ae-9c97fd0860eb",
              "mitigationType": "Install Update",
              "mitigationCategory": null,
              "description": "The signature updates Zoom to the latest version. Note If Zoom is installed in the user space, it will first uninstall it and then install the latest version for all users.",
              "impactFactor": 0,
              "isDefault": true,
              "implication": "FIX"
            }
          ],
          "CVE-2024-27245": [
            {
              "mitigationId": "0fc55933-2421-4d73-a7ae-9c97fd0860eb",
              "mitigationType": "Install Update",
              "mitigationCategory": null,
              "description": "The signature updates Zoom to the latest version. Note If Zoom is installed in the user space, it will first uninstall it and then install the latest version for all users.",
              "impactFactor": 0,
              "isDefault": true,
              "implication": "FIX"
            }
          ]
        }
      }
    }
  }
]