For API version information, refer to the API Version History section.
Download Qualys Vulnerability Score (QVS) information from the Vulnerability KnowledgeBase for one or more CVE IDs based on certain criteria. The API output is in JSON format.
The Qualys Vulnerability Score (QVS) is a Qualys-assigned score to a vulnerability based on multiple factors associated with the CVE, such as CVSS, EPSS and external threat indicators like active exploitation, exploit code maturity and much more.
Parameter |
Required/Optional |
Data Type |
Description |
---|---|---|---|
action=list |
Required |
String |
You must specify the list action. |
details={Basic|All} |
Required |
Boolean |
Specify details=Basic to show the base QVS in the output. Specify details=All to show the base QVS and contributing factors in the output. |
cve={value} |
Required |
Integer |
Filter the JSON output to only show vulnerabilities associated with the CVE IDs that you specify. The associated vulnerabilities are shown only when the requested CVE is published. |
qvs_last_modified _before={date} |
Optional |
Integer |
Show only CVE IDs with a QVS score that was last modified before a certain date and time. Valid date format is: YYYY-MM-DD[THH:MM:SSZ] format (UTC/GMT), like “2021-12-01” or “2021-1201T23:12:00Z”. |
qvs_last_modified _after={date} |
Optional |
Integer |
Show only CVE IDs with a QVS score that was last modified after a certain date and time. Valid date format is: YYYY-MM-DD[THH:MM:SSZ] format (UTC/GMT), like “2021-12-01” or “2021-12-01T23:12:00Z”. |
qvs_min={value} |
Optional |
Integer |
Show only CVEs with a QVS value greater than or equal to the QVS min value specified. (QVS Prime will not be considered.) When qvs_min and qvs_max are specified in the same request, the qvs_min value must be less than the qvs_max value. |
qvs_max={value} |
Optional |
Integer |
Show only CVEs with a QVS value less than or equal to the QVS max value specified. (QVS Prime will not be considered.) When qvs_min and qvs_max are specified in the same request, the qvs_min value must be less than the qvs_max value. |
nvd_published_be fore={date} |
Optional |
Integer |
Show only CVE IDs with a QVS score that was published before a certain date and time. Valid date format is: YYYY-MM-DD[THH:MM:SSZ] format (UTC/GMT), like “2021-12-01” or “2021-12-01T23:12:00Z”. |
nvd_published_aft er={date} |
Optional |
Integer |
Show only CVE IDs with a QVS score that was published after a certain date and time. Valid date format is: YYYY-MM-DD[THH:MM:SSZ] format (UTC/GMT), like “2021-12-01” or “2021-12-01T23:12:00Z”. |
API Request
curl --location
'<qualys_base_url>/api/2.0/fo/knowledge_base/qvs/?action=list&cve=CVE-2021-36764%2CCVE-2021-36765%2CCVE-2021-36798&details=All'\
--header 'X-Requested-With: curl demo 2' \
--header 'Authorization: encoded username:password string'
Output
{
"CVE-2021-36764": {
"base": {
"id": "CVE-2021-36764",
"idType": "CVE",
"qvs": "35",
"qvsLastChangedDate": 1664755200,
"nvdPublishedDate": 1628086500
},
"contributingFactors": {
"cvss": "7.5",
"cvssVersion": "v3.x",
"cvssString": "AV:N\/AC:L\/PR:N\/UI:N\/S:U\/C:N\/I:N\/A:H",
"epss": [
"0.00089"
]
}
},
"CVE-2021-36765": {
"base": {
"id": "CVE-2021-36765",
"idType": "CVE",
"qvs": "35",
"qvsLastChangedDate": 1664755200,
"nvdPublishedDate": 1628086500
},
"contributingFactors": {
"cvss": "7.5",
"cvssVersion": "v3.x",
"cvssString": "AV:N\/AC:L\/PR:N\/UI:N\/S:U\/C:H\/I:N\/A:N",
"epss": [
"0.00152"
]
}
},
"CVE-2021-36798": {
"base": {
"id": "CVE-2021-36798",
"idType": "CVE",
"qvs": "41",
"qvsLastChangedDate": 1704844800,
"nvdPublishedDate": 1628514900
},
"contributingFactors": {
"cvss": "7.5",
"cvssVersion": "v3.x",
"cvssString": "AV:N\/AC:L\/PR:N\/UI:N\/S:U\/C:N\/I:N\/A:H",
"exploitMaturity": [
"poc"
],
"epss": [
"0.00246"
]
}
}
}
Download Qualys Vulnerability Score (QVS) information from the Vulnerability KnowledgeBase for one or more CVE IDs based on certain criteria. The API output is in JSON format.
The Qualys Vulnerability Score (QVS) is a Qualys-assigned score to a vulnerability based on multiple factors associated with the CVE, such as CVSS, EPSS and external threat indicators like active exploitation, exploit code maturity and much more.
Parameter |
Required/Optional |
Data Type |
Description |
---|---|---|---|
action=list |
Required |
String |
You must specify the list action. |
details={Basic|All} |
Required |
Boolean |
Specify details=Basic, to show the base QVS in the output. Specify details=All, to show the base QVS and contributing factors in the output. |
cve={value} |
Optional |
Integer | Filter the JSON output to only show only the CVEs for which the QVS is recently updated. The associated vulnerabilities are shown only when the requested CVE is published. |
qvs_last_modified _before={date} |
Optional |
Integer | Show only CVE IDs with a QVS score that was modified for the last 15 days before a specific date and time. Valid date format is: YYYY-MM-DD[THH:MM:SSZ] format (UTC/GMT), like “2021-12-01” or “2021- 1201T23:12:00Z”. |
qvs_last_modified _after={date} |
Optional |
Integer | Show only CVE IDs with a QVS score that was modified within the next 15 days after a specific date and time. Valid date format is: YYYY-MM-DD[THH:MM:SSZ] format (UTC/GMT), like “2021-12-01” or “2021-12- 01T23:12:00Z”. |
qvs_min={value} |
Optional |
Integer |
Show only CVEs with a QVS value greater than or equal to the QVS min value specified. (QVS Prime will not be considered.) When qvs_min and qvs_max are specified in the same request, the qvs_min value must be less than the qvs_max value. Note: This shows only the CVEs with a QVS score that was modified for the last 15 days. |
qvs_max={value} |
Optional |
Integer |
Show only CVEs with a QVS value less than or equal to the QVS max value specified. (QVS Prime will not be considered.) When qvs_min and qvs_max are specified in the same request, the qvs_min value must be less than the qvs_max value. Note: This shows only the CVEs with a QVS score that was modified for the last 15 days. |
nvd_published_be fore={date} |
Optional |
Integer | Show only the CVE IDs with modified QVS scores from the past 15 days that were published before a specified date and time. Valid date format is: YYYY-MM-DD[ THH:MM:SSZ] format (UTC/GMT), like “2021-12-01” or “2021-12- 01T23:12:00Z”. |
nvd_published_aft er={date} |
Optional |
Integer | Show only the CVE IDs where the QVS scores have been updated and published within the next 15 days, starting from a specified date and time. Valid date format is: YYYY-MM-DD[THH:MM:SSZ] format (UTC/GMT), like “2021-12-01” or “2021-12-01T23:12:00Z”. |
API Request
curl --location
'<qualys_base_url>/api/3.0/fo/knowledge_base/qvs/?action=list&cve=CVE-2021-36764%2CCVE-2021-36765%2CCVE-2021-36798&details=All'\
--header 'X-Requested-With: curl demo 2' \
--header 'Authorization: encoded username:password string'
JSON Output
{
"CVE-2021-36764": {
"base": {
"id": "CVE-2021-36764",
"idType": "CVE",
"qvs": "35",
"qvsLastChangedDate": 1664755200,
"nvdPublishedDate": 1628086500
},
"contributingFactors": {
"cvss": "7.5",
"cvssVersion": "v3.x",
"cvssString": "AV:N\/AC:L\/PR:N\/UI:N\/S:U\/C:N\/I:N\/A:H",
"epss": [
"0.00089"
]
}
},
"CVE-2021-36765": {
"base": {
"id": "CVE-2021-36765",
"idType": "CVE",
"qvs": "35",
"qvsLastChangedDate": 1664755200,
"nvdPublishedDate": 1628086500
},
"contributingFactors": {
"cvss": "7.5",
"cvssVersion": "v3.x",
"cvssString": "AV:N\/AC:L\/PR:N\/UI:N\/S:U\/C:H\/I:N\/A:N",
"epss": [
"0.00152"
]
}
},
"CVE-2021-36798": {
"base": {
"id": "CVE-2021-36798",
"idType": "CVE",
"qvs": "41",
"qvsLastChangedDate": 1704844800,
"nvdPublishedDate": 1628514900
},
"contributingFactors": {
"cvss": "7.5",
"cvssVersion": "v3.x",
"cvssString": "AV:N\/AC:L\/PR:N\/UI:N\/S:U\/C:N\/I:N\/A:H",
"exploitMaturity": [
"poc"
],
"epss": [
"0.00246"
]
}
}
}
API Request
curl --location 'https://<qualys_base_url>/api/3.0/fo/knowledge_base/qvs/?action=list&qvs_last_modified_before=2024-08-15' \
--header 'X-Requested-With: curl' \
--header 'Authorization: Basic username:password string'
JSON Output
{
"CVE-2017-16260": {
"base": {
"id": "CVE-2017-16260",
"idType": "CVE",
"qvs": "72",
"qvsLastChangedDate": 1722988800,
"nvdPublishedDate": 1673475300
}
},
"CVE-2017-16261": {
"base": {
"id": "CVE-2017-16261",
"idType": "CVE",
"qvs": "42",
"qvsLastChangedDate": 1722988800,
"nvdPublishedDate": 1673475300
}
},
"CVE-2017-16262": {
"base": {
"id": "CVE-2017-16262",
"idType": "CVE",
"qvs": "72",
"qvsLastChangedDate": 1722988800,
"nvdPublishedDate": 1673475300
}
},
"CVE-2023-23948": {
"base": {
"id": "CVE-2023-23948",
"idType": "CVE",
"qvs": "37",
"qvsLastChangedDate": 1722902400,
"nvdPublishedDate": 1676308500
}
},
"CVE-2017-16263": {
"base": {
"id": "CVE-2017-16263",
"idType": "CVE",
"qvs": "72",
"qvsLastChangedDate": 1722988800,
"nvdPublishedDate": 1673475300
}
}
API Request
curl --location 'https://<qualys_base_url>/api/3.0/fo/knowledge_base/qvs/?action=list&qvs_last_modified_after=2024-09-05&details=All' \
--header 'X-Requested-With: curl' \
--header 'Authorization: Basic username:password string'
JSON Output
{
"CVE-2024-38858": {
"base": {
"id": "CVE-2024-38858",
"idType": "CVE",
"qvs": "30",
"qvsLastChangedDate": 1725494400,
"nvdPublishedDate": 1725279319
},
"contributingFactors": {
"cvss": "6.1",
"cvssVersion": "v3.x",
"cvssString": "CVSS:3.1\/AV:N\/AC:L\/PR:N\/UI:R\/S:C\/C:L\/I:L\/A:N",
"trending": [
"09032024,09042024,08272024,08282024"
],
"epss": [
"0.00043"
]
}
},
"CVE-2018-19183": {
"base": {
"id": "CVE-2018-19183",
"idType": "CVE",
"qvs": "41",
"qvsLastChangedDate": 1725494400,
"nvdPublishedDate": 1541989740
},
"contributingFactors": {
"cvss": "7.5",
"cvssVersion": "v3.x",
"cvssString": "CVSS:3.1\/AV:N\/AC:L\/PR:N\/UI:N\/S:U\/C:N\/I:N\/A:H",
"exploitMaturity": [
"poc"
],
"epss": [
"0.00416"
]
}
}
API Request
curl --location 'https://<qualys_base_url>/api/3.0/fo/knowledge_base/qvs/?action=list&details=All&qvs_min=95' \
--header 'X-Requested-With: curl' \
--header 'Authorization: Basic username:password string'
JSON Output
{
"CVE-2024-38856": {
"base": {
"id": "CVE-2024-38856",
"idType": "CVE",
"qvs": "95",
"qvsLastChangedDate": 1725956542967,
"nvdPublishedDate": 1722849356
},
"contributingFactors": {
"cvss": "9.8",
"cvssVersion": "v3.x",
"cvssString": "CVSS:3.1\/AV:N\/AC:L\/PR:N\/UI:N\/S:U\/C:H\/I:H\/A:H",
"threatActors": [
"Unattributed"
],
"exploitMaturity": [
"weaponized,poc"
],
"trending": [
"08182024,08232024,08092024,08062024,08072024,08262024,08132024,08292024,08302024,08152024,08212024,08112024,08202024,08282024,08252024,08242024,08162024,08042024,08122024"
],
"epss": [
"0.93274"
]
}
},
"CVE-2019-18988": {
"base": {
"id": "CVE-2019-18988",
"idType": "CVE",
"qvs": "95",
"qvsLastChangedDate": 1725956542967,
"nvdPublishedDate": 1581092100
},
"contributingFactors": {
"cvss": "7.0",
"cvssVersion": "v3.x",
"cvssString": "AV:L\/AC:H\/PR:L\/UI:N\/S:U\/C:H\/I:H\/A:H",
"exploitMaturity": [
"poc,weaponized"
],
"trending": [
"07052024"
],
"epss": [
"0.00358"
]
}
}
API Request
curl --location 'https://<qualys_base_url>/api/3.0/fo/knowledge_base/qvs/?action=list&details=All&qvs_max=95' \
--header 'X-Requested-With: curl' \
--header 'Authorization: Basic username:password string'
JSON Output
{
"CVE-2017-16260": {
"base": {
"id": "CVE-2017-16260",
"idType": "CVE",
"qvs": "71",
"qvsLastChangedDate": 1725580800,
"nvdPublishedDate": 1673475300
},
"contributingFactors": {
"cvss": "9.9",
"cvssVersion": "v3.x",
"cvssString": "AV:N\/AC:L\/PR:L\/UI:N\/S:C\/C:H\/I:H\/A:H",
"exploitMaturity": [
"poc"
],
"epss": [
"0.00091"
]
}
},
"CVE-2017-16261": {
"base": {
"id": "CVE-2017-16261",
"idType": "CVE",
"qvs": "41",
"qvsLastChangedDate": 1725580800,
"nvdPublishedDate": 1673475300
},
"contributingFactors": {
"cvss": "8.8",
"cvssVersion": "v3.x",
"cvssString": "AV:N\/AC:L\/PR:L\/UI:N\/S:U\/C:H\/I:H\/A:H",
"exploitMaturity": [
"poc"
],
"epss": [
"0.00091"
]
}
}
API Request
curl --location 'https://<qualys_base_url>/api/3.0/fo/knowledge_base/qvs/?action=list&details=All&qvs_min=95&qvs_max=96' \
--header 'X-Requested-With: curl' \
--header 'Authorization: Basic username:password string'
JSON Output
{
"CVE-2024-38856": {
"base": {
"id": "CVE-2024-38856",
"idType": "CVE",
"qvs": "95",
"qvsLastChangedDate": 1725958333539,
"nvdPublishedDate": 1722849356
},
"contributingFactors": {
"cvss": "9.8",
"cvssVersion": "v3.x",
"cvssString": "CVSS:3.1\/AV:N\/AC:L\/PR:N\/UI:N\/S:U\/C:H\/I:H\/A:H",
"threatActors": [
"Unattributed"
],
"exploitMaturity": [
"weaponized,poc"
],
"trending": [
"08182024,08232024,08092024,08062024,08072024,08262024,08132024,08292024,08302024,08152024,08212024,08112024,08202024,08282024,08252024,08242024,08162024,08042024,08122024"
],
"epss": [
"0.93274"
]
}
},
"CVE-2019-18988": {
"base": {
"id": "CVE-2019-18988",
"idType": "CVE",
"qvs": "95",
"qvsLastChangedDate": 1725958333539,
"nvdPublishedDate": 1581092100
},
"contributingFactors": {
"cvss": "7.0",
"cvssVersion": "v3.x",
"cvssString": "AV:L\/AC:H\/PR:L\/UI:N\/S:U\/C:H\/I:H\/A:H",
"exploitMaturity": [
"poc,weaponized"
],
"trending": [
"07052024"
],
"epss": [
"0.00358"
]
}
The following table depicts the information about the different versions of this API along with the status:
API Version | API Status | Release Date |
/api/2.0/fo/knowledge_base/qvs/?action=list | To be deprecated | September 2024 |
/api/3.0/fo/knowledge_base/qvs/?action=list | Active | March 2025 |
Was this topic helpful?