Use this API to get a list of Fix-based mitigations with CVE and mitigation details for Windows and Linux.
Parameter |
Mandatory/ |
Data Type |
Description |
---|---|---|---|
pageNumber | Optional | Number | Specify the page number. |
pageSize | Optional | Number | Specify the page size. The maximum page size allowed is 200. |
qids | Optional | Number | Specify the QID to filter the list. |
platform | Optional | String | Specify the platform type. For example, Windows, Linux. |
implication | Optional | String | Specify the implication type in capital letters.
Only FIX type mitigation is supported. The value is case sensitive. |
This API provides a list of all QIDs with FIX type implication for Windows and Linux platforms. The maximum page size is 200.
API Request
curl -X 'POST' \
'<quayls_base_url>/mtg/v1/vulnerabilities/mitigations' \
-H 'accept: application/json' \
-H 'Authorization: Bearer <JWT_Token>\
-H 'Content-Type: application/json' \
-d '{}'
API Response
[ { "qid": 511693, "vulnMitigation": { "Linux": { "scriptBased": { "CVE-2019-9516": [ { "mitigationId": "01914b7b-58af-73cf-b305-0386a423d5cc", "mitigationType": "Enforce System Hardening", "mitigationCategory": null, "description": "To remove the nghttp2 package on Debian, sudo apt purge command is used on: nghttp2. On RHEL, sudo yum remove command is used on: nghttp2. This process ensures the package and its dependencies are completely removed from the system.", "impactFactor": 100, "isDefault": false, "implication": "FIX" } ], "CVE-2019-9513": [ { "mitigationId": "01914b66-695a-716a-9689-88a9704d3406", "mitigationType": "Enforce System Hardening", "mitigationCategory": null, "description": "To remove the nghttp2 package on Debian, sudo apt purge command is used on: nghttp2. On RHEL, sudo yum remove command is used on: nghttp2. This process ensures the package and its dependencies are completely removed from the system.", "impactFactor": 100, "isDefault": false, "implication": "FIX" } ] } } } }, { "qid": 378079, "vulnMitigation": { "Windows": { "scriptBased": { "CVE-2023-22883": [ { "mitigationId": "0fc55933-2421-4d73-a7ae-9c97fd0860eb", "mitigationType": "Install Update", "mitigationCategory": null, "description": "The signature updates Zoom to the latest version. Note If Zoom is installed in the user space, it will first uninstall it and then install the latest version for all users.", "impactFactor": 0, "isDefault": true, "implication": "FIX" } ] } } } } ]
API Request
curl -X 'POST' \
'<qualys_base_url>/mtg/v1/vulnerabilities/mitigations' \
-H 'accept: application/json' \
-H 'Authorization: Bearer <JWT_Token>' \
-H 'Content-Type: application/json' \
-d
API Body
{
"pageNumber": 0,
"pageSize": 2,
"qids": [],
"platform": [
"Windows"
],
"implication": [
"FIX"
]
}
API Response
[ { "qid": 92163, "vulnMitigation": { "Windows": { "scriptBased": { "CVE-2024-38177": [ { "mitigationId": "93e31bb0-447c-465a-94d3-c5e42f09687b", "mitigationType": "Install Update", "mitigationCategory": null, "description": "The signature will install the latest version of Windows App Installer.", "impactFactor": 100, "isDefault": true, "implication": "FIX" } ] } } } }, { "qid": 370177, "vulnMitigation": { "Windows": { "scriptBased": { "CVE-2016-7855": [ { "mitigationId": "2c92f84d-b99c-47bd-b5a8-5b46e148788f", "mitigationType": "Uninstall EOL", "mitigationCategory": null, "description": "Adobe no longer supports Flash Player after December 31, 2020 and blocked Flash content from running in Flash Player beginning January 12, 2021, Adobe strongly recommends all users immediately uninstall Flash Player to help protect their systems. This script checks for Adobe Flash Player and if found installed, it proceeds to uninstall it.", "impactFactor": 0, "isDefault": true, "implication": "FIX" } ] } } } } ]
API Request
curl -X 'POST' \
'<qualys_base_url>/mtg/v1/vulnerabilities/mitigations' \
-H 'accept: application/json' \
-H 'Authorization: Bearer <JWT_Token>' \
-H 'Content-Type: application/json' \
-d
API Body
{
"pageNumber": 0,
"pageSize": 10,
"qids": [379939,105511],
"platform": [
"Windows"
],
"implication": [
"FIX"
]
}
API Response
[
{
"qid": 105511,
"vulnMitigation": {
"Windows": {
"scriptBased": {
"105511": [
{
"mitigationId": "4f45f994-2a2a-4ead-ac03-ece2278751ee",
"mitigationType": "Uninstall EOL",
"mitigationCategory": null,
"description": "Adobe Reader 9.x installed. Adobe ended support for Adobe Reader 9.x on June 26, 2013 and provides no further updates. The script checks the installed version of Adobe Reader, and if it matches any of the affected versions, it proceeds to uninstall it.",
"impactFactor": 0,
"isDefault": true,
"implication": "FIX"
}
]
}
}
}
},
{
"qid": 379939,
"vulnMitigation": {
"Windows": {
"scriptBased": {
"CVE-2024-27239": [
{
"mitigationId": "9a3e1c8e-7ff1-4f3a-8f1e-3c762f3628d3",
"mitigationType": "Uninstall Plugin",
"mitigationCategory": null,
"description": "The signature will remove vulnerable Zoom VDI plugins. Note: Use this signature only when the vulnerability detection is based on Zoom VDI.",
"impactFactor": 0,
"isDefault": false,
"implication": "FIX"
}
],
"CVE-2024-27246": [
{
"mitigationId": "0fc55933-2421-4d73-a7ae-9c97fd0860eb",
"mitigationType": "Install Update",
"mitigationCategory": null,
"description": "The signature updates Zoom to the latest version. Note If Zoom is installed in the user space, it will first uninstall it and then install the latest version for all users.",
"impactFactor": 0,
"isDefault": true,
"implication": "FIX"
}
],
"CVE-2024-27245": [
{
"mitigationId": "0fc55933-2421-4d73-a7ae-9c97fd0860eb",
"mitigationType": "Install Update",
"mitigationCategory": null,
"description": "The signature updates Zoom to the latest version. Note If Zoom is installed in the user space, it will first uninstall it and then install the latest version for all users.",
"impactFactor": 0,
"isDefault": true,
"implication": "FIX"
}
]
}
}
}
}
]