Get Patches from the Catalog

You can fetch a paginated list of patches from the patch Catalog specific to Windows or Linux.

GET/pm/v1/patchcatalog/patches

Input ParametersInput Parameters

Parameter

Mandatory/Optional

Data Type

Description

filter

Optional

string

Filter criteria to list patches.

For example, vendorSeverity:'Critical' AND rebootRequired:true

pageNumber

Optional

integer

The page to be returned.

Default value: 0

pageSize

Optional

integer

Limit number of rows to be returned per page.

Default value: 10

platform

Optional

string

The platform type.

- Available values: Linux, Windows

- Default value: Windows

sort

Optional

string

Sort the patch values by certain data.

For example, [{"vendorSeverity":"asc"}]

Sample - Get Windows Patches from the CatalogSample - Get Windows Patches from the Catalog

API request

    
        curl -X GET 
        "https://<QualysBaseURL>/pm/v1/patchcatalog/patches?filter=vendorSeverity%3A%20Critical&pageNumber=0&pageSize=2&sort=%5B%7B%22publishedDate%22%3A%22asc%22%7D%5D" -H "accept: application/json" -H "Authorization: Bearer <<jwt token>>"
    

Response

    
      [
    {
        "isSecurity": true,
        "rebootRequired": false,
        "vendorSeverity": "Critical",
        "description": "The Microsoft VM is a virtual machine for the Win32 operating environment. The Microsoft VM is shipped in most versions of Windows (a complete list is available in the FAQ), as well as in most versions of Internet Explorer.   The present Microsoft VM, which includes all previously released fixes to the VM, has been updated to include a fix for the newly reported security vulnerability. This new security vulnerability affects the ByteCode Verifier component of the Microsoft VM, and results because the ByteCode verifier does not correctly check for the presence of certain malicious code when a Java applet is being loaded. The attack vector for this new security issue would likely involve an attacker creating a malicious Java applet and inserting it into a web page that when opened, would exploit the vulnerability. An attacker could then host this malicious web page on a web site, or could send it to a user in e-mail.",
        "title": "Flaw in Microsoft VM Could Enable System Compromise (816093)",
        "type": "OS",
        "appFamily": [
            "Windows"
        ],
        "qid": [
            "90161"
        ],
        "enabled": true,
        "platform": "Windows",
        "supersedes": [],
        "patchId": "c1645e07-7a3f-33e3-ae2d-bff7b4001146",
        "isRollback": false,
        "cve": [
            "CAN-2003-0111"
        ],
        "vendor": "Microsoft",
        "kb": "KB816093",
        "downloadMethod": "Automatic",
        "id": "c1645e07-7a3f-33e3-ae2d-bff7b4001146",
        "supportedOs": null,
        "architecture": [
            "X86"
        ],
        "packageDetails": null,
        "product": [
            "Windows XP Home Edition",
            "Windows XP Professional",
            "Windows NT Workstation 4.0",
            "Windows NT Server 4.0",
            "Windows NT Server 4.0, Enterprise Edition",
            "Windows XP Tablet PC Edition"
        ],
        "servicePack": false,
        "advisory": null,
        "vendorlink": "http://technet.microsoft.com/security/bulletin/ms03-011",
        "osIdentifier": "WINDOWS",
        "advisoryLink": null,
        "deleted": false,
        "isSuperseded": false,
        "patchFeedProviderId": 1,
        "syncDateTime": 1637673463488,
        "vendorPatchId": "672",
        "modifiedDate": 1565049600000,
        "publishedDate": 1049846400000,
        "category": "Security Patches",
        "supersededBy": [],
        "bulletin": "MS03-011"
    },
    {
        "isSecurity": true,
        "rebootRequired": false,
        "vendorSeverity": "Critical",
        "description": "The Microsoft VM is a virtual machine for the Win32 operating environment. The Microsoft VM is shipped in most versions of Windows (a complete list is available in the FAQ), as well as in most versions of Internet Explorer.   The present Microsoft VM, which includes all previously released fixes to the VM, has been updated to include a fix for the newly reported security vulnerability. This new security vulnerability affects the ByteCode Verifier component of the Microsoft VM, and results because the ByteCode verifier does not correctly check for the presence of certain malicious code when a Java applet is being loaded. The attack vector for this new security issue would likely involve an attacker creating a malicious Java applet and inserting it into a web page that when opened, would exploit the vulnerability. An attacker could then host this malicious web page on a web site, or could send it to a user in e-mail.",
        "title": "Flaw in Microsoft VM Could Enable System Compromise (816093)",
        "type": "Application",
        "appFamily": [
            "Virtual Machine"
        ],
        "qid": [
            "90161"
        ],
        "enabled": true,
        "platform": "Windows",
        "supersedes": [],
        "patchId": "ab21fe7e-cfb5-314c-938d-8f20271760db",
        "isRollback": false,
        "cve": [
            "CAN-2003-0111"
        ],
        "vendor": "Microsoft",
        "kb": "KB816093",
        "downloadMethod": "Automatic",
        "id": "ab21fe7e-cfb5-314c-938d-8f20271760db",
        "supportedOs": null,
        "architecture": [
            "X86"
        ],
        "packageDetails": null,
        "product": [
            "Microsoft Virtual Machine (VM)"
        ],
        "servicePack": false,
        "advisory": null,
        "vendorlink": "http://technet.microsoft.com/security/bulletin/ms03-011",
        "osIdentifier": "WINDOWS",
        "advisoryLink": null,
        "deleted": false,
        "isSuperseded": false,
        "patchFeedProviderId": 1,
        "syncDateTime": 1638485700068,
        "vendorPatchId": "673",
        "modifiedDate": 1638403200000,
        "publishedDate": 1049846400000,
        "category": "Security Patches",
        "supersededBy": [],
        "bulletin": "MS03-011"
    }
]