You can fetch a paginated list of patches from the patch Catalog specific to Windows or Linux.
Parameter |
Mandatory/Optional |
Data Type |
Description |
---|---|---|---|
filter |
Optional |
string |
Filter criteria to list patches. For example, vendorSeverity:'Critical' AND rebootRequired:true |
pageNumber |
Optional |
integer |
The page to be returned. Default value: 0 |
pageSize |
Optional |
integer |
Limit number of rows to be returned per page. Default value: 10 |
platform |
Optional |
string |
The platform type. - Available values: Linux, Windows - Default value: Windows |
sort |
Optional |
string |
Sort the patch values by certain data. For example, [{"vendorSeverity":"asc"}] |
API request
curl -X GET
"https://<QualysBaseURL>/pm/v1/patchcatalog/patches?filter=vendorSeverity%3A%20Critical&pageNumber=0&pageSize=2&sort=%5B%7B%22publishedDate%22%3A%22asc%22%7D%5D" -H "accept: application/json" -H "Authorization: Bearer <<jwt token>>"
Response
[
{
"isSecurity": true,
"rebootRequired": false,
"vendorSeverity": "Critical",
"description": "The Microsoft VM is a virtual machine for the Win32 operating environment. The Microsoft VM is shipped in most versions of Windows (a complete list is available in the FAQ), as well as in most versions of Internet Explorer. The present Microsoft VM, which includes all previously released fixes to the VM, has been updated to include a fix for the newly reported security vulnerability. This new security vulnerability affects the ByteCode Verifier component of the Microsoft VM, and results because the ByteCode verifier does not correctly check for the presence of certain malicious code when a Java applet is being loaded. The attack vector for this new security issue would likely involve an attacker creating a malicious Java applet and inserting it into a web page that when opened, would exploit the vulnerability. An attacker could then host this malicious web page on a web site, or could send it to a user in e-mail.",
"title": "Flaw in Microsoft VM Could Enable System Compromise (816093)",
"type": "OS",
"appFamily": [
"Windows"
],
"qid": [
"90161"
],
"enabled": true,
"platform": "Windows",
"supersedes": [],
"patchId": "c1645e07-7a3f-33e3-ae2d-bff7b4001146",
"isRollback": false,
"cve": [
"CAN-2003-0111"
],
"vendor": "Microsoft",
"kb": "KB816093",
"downloadMethod": "Automatic",
"id": "c1645e07-7a3f-33e3-ae2d-bff7b4001146",
"supportedOs": null,
"architecture": [
"X86"
],
"packageDetails": null,
"product": [
"Windows XP Home Edition",
"Windows XP Professional",
"Windows NT Workstation 4.0",
"Windows NT Server 4.0",
"Windows NT Server 4.0, Enterprise Edition",
"Windows XP Tablet PC Edition"
],
"servicePack": false,
"advisory": null,
"vendorlink": "http://technet.microsoft.com/security/bulletin/ms03-011",
"osIdentifier": "WINDOWS",
"advisoryLink": null,
"deleted": false,
"isSuperseded": false,
"patchFeedProviderId": 1,
"syncDateTime": 1637673463488,
"vendorPatchId": "672",
"modifiedDate": 1565049600000,
"publishedDate": 1049846400000,
"category": "Security Patches",
"supersededBy": [],
"bulletin": "MS03-011"
},
{
"isSecurity": true,
"rebootRequired": false,
"vendorSeverity": "Critical",
"description": "The Microsoft VM is a virtual machine for the Win32 operating environment. The Microsoft VM is shipped in most versions of Windows (a complete list is available in the FAQ), as well as in most versions of Internet Explorer. The present Microsoft VM, which includes all previously released fixes to the VM, has been updated to include a fix for the newly reported security vulnerability. This new security vulnerability affects the ByteCode Verifier component of the Microsoft VM, and results because the ByteCode verifier does not correctly check for the presence of certain malicious code when a Java applet is being loaded. The attack vector for this new security issue would likely involve an attacker creating a malicious Java applet and inserting it into a web page that when opened, would exploit the vulnerability. An attacker could then host this malicious web page on a web site, or could send it to a user in e-mail.",
"title": "Flaw in Microsoft VM Could Enable System Compromise (816093)",
"type": "Application",
"appFamily": [
"Virtual Machine"
],
"qid": [
"90161"
],
"enabled": true,
"platform": "Windows",
"supersedes": [],
"patchId": "ab21fe7e-cfb5-314c-938d-8f20271760db",
"isRollback": false,
"cve": [
"CAN-2003-0111"
],
"vendor": "Microsoft",
"kb": "KB816093",
"downloadMethod": "Automatic",
"id": "ab21fe7e-cfb5-314c-938d-8f20271760db",
"supportedOs": null,
"architecture": [
"X86"
],
"packageDetails": null,
"product": [
"Microsoft Virtual Machine (VM)"
],
"servicePack": false,
"advisory": null,
"vendorlink": "http://technet.microsoft.com/security/bulletin/ms03-011",
"osIdentifier": "WINDOWS",
"advisoryLink": null,
"deleted": false,
"isSuperseded": false,
"patchFeedProviderId": 1,
"syncDateTime": 1638485700068,
"vendorPatchId": "673",
"modifiedDate": 1638403200000,
"publishedDate": 1049846400000,
"category": "Security Patches",
"supersededBy": [],
"bulletin": "MS03-011"
}
]