Use this API to get patches for a given customer after applying the specified filter.
Parameter |
Mandatory/Optional |
Data Type |
Description |
---|---|---|---|
havingQuery |
Optional |
string |
Specify a QQL to filter patches based on asset search criteria. For example, status:Enabled |
pageNumber |
Optional |
string |
The page to be returned. Default value: 0 |
pageSize |
Optional |
string |
Limit number of rows to be returned per page. Default value: 10 |
platform |
Optional |
string |
The platform type. - Available values: Linux, Windows - Default value: Windows |
query |
Optional |
string |
Specify a QQL to filter patches based on patch catalog search criteria. For example, appFamily:Firefox Append the QQL (patchStatus:[Missing,Installed] and isSuperseded:false) to filter the latest missing and installed patches. |
sort |
Optional |
string |
Sort the patch values by certain data. For example, [{"appFamily":"asc"}] |
API request
curl -X GET
"https://<QualysBaseURL>/pm/v1/patches?havingQuery=name%3A%22Windows%22&pageNumber=0&pageSize=2&platform=Windows&query=isSecurity%3A%20true%20and%20%28patchStatus%3A%5BMissing%2C%20Installed%5D%20and%20isSuperseded%3A%20false%29&sort=%5B%7B%22vendorSeverity%22%3A%22asc%22%7D%5D" -H "accept: application/json" -H "Authorization: Bearer <<jwt token>>"
Response
[
{
"architecture": [
"X64"
],
"bulletin": "MS13-098",
"category": "Security Patches",
"cve": [
"CVE-2013-3900"
],
"kb": "KB2893294",
"modifiedDate": 1438732800000,
"appFamily": [
"Windows"
],
"product": [
"Windows Server 2012 R2 Datacenter (x64)",
"Windows Server 2012 R2 Essentials (x64)",
"Windows Server 2012 R2 Foundation (x64)",
"Windows Storage Server 2012 R2 Workgroup (x64)",
"Windows Hyper-V Server 2012 R2 (x64)",
"Windows Server 2012 R2 Standard (x64)",
"Windows Storage Server 2012 R2 Standard (x64)"
],
"publishedDate": 1386633600000,
"qid": [
"90931"
],
"rebootRequired": true,
"supersededBy": [],
"supersedes": [],
"title": "Vulnerability in Windows Could Allow Remote Code Execution (2893294)",
"type": "OS",
"vendor": "Microsoft",
"vendorSeverity": "Critical",
"vendorlink": "http://technet.microsoft.com/en-us/security/bulletin/MS13-098",
"missingCount": 1,
"installedCount": 0,
"downloadMethod": "Automatic",
"advisory": null,
"id": "0536aeee-60c0-383b-bbdd-8b8d1a35b6fa",
"isSecurity": true,
"isSuperseded": false,
"isRollback": true
},
{
"architecture": [
"X64"
],
"bulletin": "MS20-08-SSU-4569073",
"category": "Security Patches",
"cve": [],
"kb": "KB4569073",
"modifiedDate": 1597104000000,
"appFamily": [
"Windows"
],
"product": [
"Windows 10 Education (x64)",
"Windows 10 Home N (x64)",
"Windows 10 Pro for Workstations (x64)",
"Windows 10 Pro Education (x64)",
"Windows 10 Pro N (x64)",
"Windows 10 Home (x64)",
"Windows 10 Pro for Workstations N (x64)",
"Windows 10 IoT Enterprise (x64)",
"Windows 10 Enterprise (x64)",
"Windows 10 Enterprise N (x64)",
"Windows 10 Pro (x64)",
"Windows 10 Pro Education N (x64)",
"Windows 10 Education N (x64)"
],
"publishedDate": 1597104000000,
"qid": [
"91653"
],
"rebootRequired": true,
"supersededBy": [
"5d50d9a3-1c9f-3d51-97a0-99ddffdcd675",
"85909320-8fb5-34cf-b880-26a794fcd5a4",
"09ca9f8d-ff18-39fd-a123-a04310681972",
"9613985e-bdbd-3157-b902-3b45f0ce2529",
"0078a4c0-e351-3f35-80f8-00912db355af",
"e06baef7-7048-3dd2-97c2-c0172dec2328",
"0c33b8ad-cedb-352e-80df-cc73d1b47d8f",
"3aac98ad-9b5e-3e23-b347-b6b35747b8c1",
"9bdd1e60-f2d4-3176-ae58-e17ab7606cc7",
"e756063e-26e3-3507-b5f1-6bcc17209b2d",
"24ab104b-fb18-3861-a569-8d377af3d5f5",
"364cf5c3-7892-320f-b739-751b17790992",
"e3e05809-617d-3d48-a5e8-8a3c499e180c",
"d5f16f4d-b792-3cfe-91b5-8cad0c42ae0d",
"b78f73c7-ebeb-371d-8ade-c2e4e89a49a8"
],
"supersedes": [
"51237064-f03d-34e9-8711-340d73b5315c",
"ee3dfbe3-8192-3845-ba3c-6da18e9d0d04",
"680b35e5-37a8-331d-aa50-c27252e253ba",
"918099c5-0d05-3206-977b-6179dcca8058",
"2d8664f5-f5ec-3d85-afaf-9f9258e261e5",
"70e76921-4c50-3822-9c9e-25351fde3601",
"c6e73f83-e73e-3f01-9a97-1de3111437b4",
"ced6e0e8-910b-390b-91de-1dc78f71fa51",
"5c307ece-ec15-3387-86b3-9bf3758babca",
"896c6047-700e-3fe3-8a84-032e8b7059be",
"03d06861-435c-3f79-8ab1-16c9d96d5f02",
"ebc193d0-73f7-3b3b-83df-5178fbb2488e",
"1e830ef1-5db8-31f2-8a44-824ce58da57e",
"51ddf79e-813d-3d4f-98ec-dd5287d1b5ee",
"8e210493-d41e-3b0f-8df6-e2536f81b9f2",
"67008f0a-486c-35ca-990c-5e52ea39f7f1",
"cdb64192-1f32-3552-8d8e-83fd118ad11b",
"20ee87bd-51b6-3783-ac04-39f502267217"
],
"title": "Servicing stack update for Windows 10, version 1903 and 1909: August 11, 2020 (KB4569073)",
"type": "OS",
"vendor": "Microsoft",
"vendorSeverity": "Critical",
"vendorlink": "http://support.microsoft.com/kb/4569073",
"missingCount": 0,
"installedCount": 1,
"downloadMethod": "Automatic",
"advisory": null,
"id": "802b47fe-586e-320d-8275-22503ef65d9d",
"isSecurity": true,
"isSuperseded": true,
"isRollback": false
}
]