For API version information, refer to the API Version History section.
Download Qualys Vulnerability Score (QVS) information from the Vulnerability KnowledgeBase for one or more CVE IDs based on certain criteria. The API output is in JSON format.
The Qualys Vulnerability Score (QVS) is a Qualys-assigned score to a vulnerability based on multiple factors associated with the CVE, such as CVSS, EPSS and external threat indicators like active exploitation, exploit code maturity and much more.
|
Parameter |
Required/Optional |
Data Type |
Description |
|---|---|---|---|
|
action=list |
Required |
String |
You must specify the list action. Specify the list action to retrieve all CVEs published or last modified within the past 90 days from the current date. |
|
details={Basic|All} |
Required |
Boolean |
Specify details=Basic to show the base QVS in the output. Specify details=All to show the base QVS and contributing factors in the output. Specify the details parameter to retrieve all CVEs published or last modified within the past 90 days from the current date. |
|
cve={value} |
Required |
Integer |
Filter the JSON output to only show vulnerabilities associated with the CVE IDs that you specify. The associated vulnerabilities are shown only when the requested CVE is published. |
|
qvs_last_modified _before={date} |
Optional |
Integer |
Show only CVE IDs with a QVS score that was last modified before a certain date and time. Valid date format is: YYYY-MM-DD[THH:MM:SSZ] format (UTC/GMT), like “2021-12-01” or “2021-1201T23:12:00Z”. |
|
qvs_last_modified _after={date} |
Optional |
Integer |
Show only CVE IDs with a QVS score that was last modified after a certain date and time. Valid date format is: YYYY-MM-DD[THH:MM:SSZ] format (UTC/GMT), like “2021-12-01” or “2021-12-01T23:12:00Z”. |
|
qvs_min={value} |
Optional |
Integer |
Show only CVEs with a QVS value greater than or equal to the QVS min value specified. (QVS Prime will not be considered.) When qvs_min and qvs_max are specified in the same request, the qvs_min value must be less than the qvs_max value. |
|
qvs_max={value} |
Optional |
Integer |
Show only CVEs with a QVS value less than or equal to the QVS max value specified. (QVS Prime will not be considered.) When qvs_min and qvs_max are specified in the same request, the qvs_min value must be less than the qvs_max value. |
|
nvd_published_be fore={date} |
Optional |
Integer |
Show only CVE IDs with a QVS score that was published before a certain date and time. Valid date format is: YYYY-MM-DD[THH:MM:SSZ] format (UTC/GMT), like “2021-12-01” or “2021-12-01T23:12:00Z”. |
|
nvd_published_aft er={date} |
Optional |
Integer |
Show only CVE IDs with a QVS score that was published after a certain date and time. Valid date format is: YYYY-MM-DD[THH:MM:SSZ] format (UTC/GMT), like “2021-12-01” or “2021-12-01T23:12:00Z”. |
API Request
curl --location
'<qualys_base_url>/api/2.0/fo/knowledge_base/qvs/?action=list&cve=CVE-2021-36764%2CCVE-2021-36765%2CCVE-2021-36798%2CCVE-2017-0199&details=All'\
--header 'X-Requested-With: curl demo 2' \
--header 'Authorization: Bearer <JWT Token>'
Output
{
{
"CVE-2021-36764": {
"base": {
"id": "CVE-2021-36764",
"idType": "CVE",
"qvs": "35",
"qvsLastChangedDate": 1664755200,
"nvdPublishedDate": 1628086500
},
"contributingFactors": {
"cvss": "7.5",
"cvssVersion": "v3.x",
"cvssString": "AV:N\/AC:L\/PR:N\/UI:N\/S:U\/C:N\/I:N\/A:H",
"epss": [
"0.00089"
]
}
},
"CVE-2021-36765": {
"base": {
"id": "CVE-2021-36765",
"idType": "CVE",
"qvs": "35",
"qvsLastChangedDate": 1664755200,
"nvdPublishedDate": 1628086500
},
"contributingFactors": {
"cvss": "7.5",
"cvssVersion": "v3.x",
"cvssString": "AV:N\/AC:L\/PR:N\/UI:N\/S:U\/C:H\/I:N\/A:N",
"epss": [
"0.00152"
]
}
},
"CVE-2021-36798": {
"base": {
"id": "CVE-2021-36798",
"idType": "CVE",
"qvs": "41",
"qvsLastChangedDate": 1704844800,
"nvdPublishedDate": 1628514900
},
"contributingFactors": {
"cvss": "7.5",
"cvssVersion": "v3.x",
"cvssString": "AV:N\/AC:L\/PR:N\/UI:N\/S:U\/C:N\/I:N\/A:H",
"exploitMaturity": [
"poc"
],
"epss": [
"0.00246"
]
}
}
}
{
"CVE-2017-0199": {
"base": {
"id": "CVE-2017-0199",
"idType": "CVE",
"qvs": "100",
"qvsLastChangedDate": 1664755200,
"nvdPublishedDate": 1492009141
},
"contributingFactors": {
"cvss": "9.3",
"cvssVersion": "v2",
"cvssString": "AV:N\/AC:M\/Au:N\/C:C\/I:C\/A:C",
"threatActors": [
"Stardust Chollima,Cobalt Spider,APT43,Mythic Leopard,SectorJ,APT41,Whisper Spider,SideWinder,Silence,APT34,Kimsuky,Primitive Bear,TA459,Mustang Panda,Cobalt,Gorgon Group,Gothic Panda,Codoso,LABYRINTH CHOLLIMA,Pioneer Kitten,TA558,Dropping Elephant,Subaat,Quilted Tiger,Saaiwc Group,OilRig,Ocean Buffalo,APT19,China Attribution,Helix Kitten,Slayer Kitten,Lazarus Group,Velvet Chollima,BlackTech,Leviathan,SectorA,Dark Pink,CopyKittens,Razor Tiger,Gamaredon,PARASITE,Shadow Crane,Stone Panda,Labyrinth Chollima,Molerats,Kryptonite Panda,FIN7,DarkHotel,North Korea Attribution,Unattributed,Ricochet Chollima,Circuit Panda,RedAlpha,Carbon Spider,Wicked Panda,CHRYSENE,MuddyWater,Luckycat,GreyEnergy,Static Kitten,APT37"
],
"exploitMaturity": [
"poc,weaponized"
],
"trending": [
"10302025,11052025,11032025,10152025,10142025,11022025,11082025,11072025,11102025,10292025,10132025,11012025,10282025,10312025"
],
"malwareName": [
"Leonem,SLoad,Relsloadr,Donoff,Blinky,MalLink,Nemucod,Oneeva,Meterpreter,Emotet,Petya,Pterodo,Powsheldow,IcedID,Amphitryon,Snakekeylogger,Kepavll,Cerber,Cryxos,LokiBot,Powdow,Downlaoder,Valyria,Alien,Bladabhindi,Privateloader,Pidief,Aentdwn,Pantera,Farheyt,Relslodr,DdexLoader,AgentTesla,RTFObfustream,MacroLess,Badur,Razy,Snojan,DdeExec,FormBook,Stelega,TurtleLoader,Generic,WannaCry,EncDoc,Remcos,Negasteal,CobaltStrikeBeacon,Skeeyah,Bitrep,Encrypteddoc,Abnormal,Sonoko,Ymacco,Dotmer,Loki,Powload,Heuristic,RemoteTemplateInj,MesdettyLaunch,GenScript,BlackKingdom,Rasftuby,LockerGoga,Stratos,Madefref,PhishingAdb,Bluteal,Androm,Multiverze,Disco,Znyonm,Upatre,Phonzy,Rozena,Tiggre,Casur,Occamy,Zpevdo,Johnnie,NanoCore,SDrop,Pederr,BadTemplate,Ako,Symmi,Toncteseg,Zenpak,Gluptel,Vigorf,DllHijack,Primarypass,Ofckit,CVE-2017-0199,Risepro,Olemalrtf,Psyme,SpamDocCrypted,Unattributed,Pyfatget,Malgent,Groooboor,Gozi,Wacatac"
],
"malwareHash": [
"7f2a499891a72b9f3b0923be0f9db490463639166b41a15fe3bf5387df660f1c",
"d73c616eaef3c683005a799b7420bae06bd5cd094d3923409f1611de67d4b82f",
"54874f342f9e4d93ccba0208446e6699c489e1f1d99f396c358df63cdfa4535f",
"e29ebea9db086b874310403868dc233b6c03e4305bebca507dbd53f36170dba8",
"645434d52d7e12dbae40d46fef28870785e74d0126d9cead76f46d65fc283a7f",
"34717e10b0f170025c3e380fb0287fe3c1f3347e3071c79c1e39ea94a489e6f7"
],
"rti": [
"dos,remote"
],
"epss": [
"0.xxxx"
],
"cisaVuln": [
"YES"
],
"cisaDueDate": "1651536000000",
"cisaAddedDate": "1635897600000"
}
}
}
}
Download Qualys Vulnerability Score (QVS) information from the Vulnerability KnowledgeBase for one or more CVE IDs based on certain criteria. The API output is in JSON format.
The Qualys Vulnerability Score (QVS) is a Qualys-assigned score to a vulnerability based on multiple factors associated with the CVE, such as CVSS, EPSS and external threat indicators like active exploitation, exploit code maturity and much more.
|
Parameter |
Required/Optional |
Data Type |
Description |
|---|---|---|---|
|
action=list |
Required |
String |
You must specify the list action. Specify the list action to retrieve all CVEs published or last modified within the past 90 days from the current date. |
|
details={Basic|All} |
Required |
Boolean |
Specify details=Basic to show the base QVS in the output. Specify details=All to show the base QVS and contributing factors in the output. Specify the details parameter to retrieve all CVEs published or last modified within the past 90 days from the current date. |
|
cve={value} |
Required |
Integer |
Filter the JSON output to only show vulnerabilities associated with the CVE IDs that you specify. The associated vulnerabilities are shown only when the requested CVE is published. |
|
qvs_last_modified _before={date} |
Optional |
Integer |
Show only CVE IDs with a QVS score that was last modified before a certain date and time. Valid date format is: YYYY-MM-DD[THH:MM:SSZ] format (UTC/GMT), like “2021-12-01” or “2021-1201T23:12:00Z”. |
|
qvs_last_modified _after={date} |
Optional |
Integer |
Show only CVE IDs with a QVS score that was last modified after a certain date and time. Valid date format is: YYYY-MM-DD[THH:MM:SSZ] format (UTC/GMT), like “2021-12-01” or “2021-12-01T23:12:00Z”. |
|
qvs_min={value} |
Optional |
Integer |
Show only CVEs with a QVS value greater than or equal to the QVS min value specified. (QVS Prime will not be considered.) When qvs_min and qvs_max are specified in the same request, the qvs_min value must be less than the qvs_max value. |
|
qvs_max={value} |
Optional |
Integer |
Show only CVEs with a QVS value less than or equal to the QVS max value specified. (QVS Prime will not be considered.) When qvs_min and qvs_max are specified in the same request, the qvs_min value must be less than the qvs_max value. |
|
nvd_published_be fore={date} |
Optional |
Integer |
Show only CVE IDs with a QVS score that was published before a certain date and time. Valid date format is: YYYY-MM-DD[THH:MM:SSZ] format (UTC/GMT), like “2021-12-01” or “2021-12-01T23:12:00Z”. |
|
nvd_published_aft er={date} |
Optional |
Integer |
Show only CVE IDs with a QVS score that was published after a certain date and time. Valid date format is: YYYY-MM-DD[THH:MM:SSZ] format (UTC/GMT), like “2021-12-01” or “2021-12-01T23:12:00Z”. |
API Request
curl --location '<qualys_base_url>/api/3.0/fo/knowledge_base/qvs/?action=list&cve=CVE-2021-36764%2CCVE-2021-36765%2CCVE-2021-36798%2CCVE-2017-0199&details=All'\ --header 'X-Requested-With: curl demo 2' \ --header 'Authorization:Bearer <JWT Token>'
Output
{
{
"CVE-2021-36764": {
"base": {
"id": "CVE-2021-36764",
"idType": "CVE",
"qvs": "35",
"qvsLastChangedDate": 1664755200,
"nvdPublishedDate": 1628086500
},
"contributingFactors": {
"cvss": "7.5",
"cvssVersion": "v3.x",
"cvssString": "AV:N\/AC:L\/PR:N\/UI:N\/S:U\/C:N\/I:N\/A:H",
"epss": [
"0.00089"
]
}
},
"CVE-2021-36765": {
"base": {
"id": "CVE-2021-36765",
"idType": "CVE",
"qvs": "35",
"qvsLastChangedDate": 1664755200,
"nvdPublishedDate": 1628086500
},
"contributingFactors": {
"cvss": "7.5",
"cvssVersion": "v3.x",
"cvssString": "AV:N\/AC:L\/PR:N\/UI:N\/S:U\/C:H\/I:N\/A:N",
"epss": [
"0.00152"
]
}
},
"CVE-2021-36798": {
"base": {
"id": "CVE-2021-36798",
"idType": "CVE",
"qvs": "41",
"qvsLastChangedDate": 1704844800,
"nvdPublishedDate": 1628514900
},
"contributingFactors": {
"cvss": "7.5",
"cvssVersion": "v3.x",
"cvssString": "AV:N\/AC:L\/PR:N\/UI:N\/S:U\/C:N\/I:N\/A:H",
"exploitMaturity": [
"poc"
],
"epss": [
"0.00246"
]
}
}
}
{
"CVE-2017-0199": {
"base": {
"id": "CVE-2017-0199",
"idType": "CVE",
"qvs": "100",
"qvsLastChangedDate": 1664755200,
"nvdPublishedDate": 1492009141
},
"contributingFactors": {
"cvss": "9.3",
"cvssVersion": "v2",
"cvssString": "AV:N\/AC:M\/Au:N\/C:C\/I:C\/A:C",
"threatActors": [
"Stardust Chollima,Cobalt Spider,APT43,Mythic Leopard,SectorJ,APT41,Whisper Spider,SideWinder,Silence,APT34,Kimsuky,Primitive Bear,TA459,Mustang Panda,Cobalt,Gorgon Group,Gothic Panda,Codoso,LABYRINTH CHOLLIMA,Pioneer Kitten,TA558,Dropping Elephant,Subaat,Quilted Tiger,Saaiwc Group,OilRig,Ocean Buffalo,APT19,China Attribution,Helix Kitten,Slayer Kitten,Lazarus Group,Velvet Chollima,BlackTech,Leviathan,SectorA,Dark Pink,CopyKittens,Razor Tiger,Gamaredon,PARASITE,Shadow Crane,Stone Panda,Labyrinth Chollima,Molerats,Kryptonite Panda,FIN7,DarkHotel,North Korea Attribution,Unattributed,Ricochet Chollima,Circuit Panda,RedAlpha,Carbon Spider,Wicked Panda,CHRYSENE,MuddyWater,Luckycat,GreyEnergy,Static Kitten,APT37"
],
"exploitMaturity": [
"poc,weaponized"
],
"trending": [
"10302025,11052025,11032025,10152025,10142025,11022025,11082025,11072025,11102025,10292025,10132025,11012025,10282025,10312025"
],
"malwareName": [
"Leonem,SLoad,Relsloadr,Donoff,Blinky,MalLink,Nemucod,Oneeva,Meterpreter,Emotet,Petya,Pterodo,Powsheldow,IcedID,Amphitryon,Snakekeylogger,Kepavll,Cerber,Cryxos,LokiBot,Powdow,Downlaoder,Valyria,Alien,Bladabhindi,Privateloader,Pidief,Aentdwn,Pantera,Farheyt,Relslodr,DdexLoader,AgentTesla,RTFObfustream,MacroLess,Badur,Razy,Snojan,DdeExec,FormBook,Stelega,TurtleLoader,Generic,WannaCry,EncDoc,Remcos,Negasteal,CobaltStrikeBeacon,Skeeyah,Bitrep,Encrypteddoc,Abnormal,Sonoko,Ymacco,Dotmer,Loki,Powload,Heuristic,RemoteTemplateInj,MesdettyLaunch,GenScript,BlackKingdom,Rasftuby,LockerGoga,Stratos,Madefref,PhishingAdb,Bluteal,Androm,Multiverze,Disco,Znyonm,Upatre,Phonzy,Rozena,Tiggre,Casur,Occamy,Zpevdo,Johnnie,NanoCore,SDrop,Pederr,BadTemplate,Ako,Symmi,Toncteseg,Zenpak,Gluptel,Vigorf,DllHijack,Primarypass,Ofckit,CVE-2017-0199,Risepro,Olemalrtf,Psyme,SpamDocCrypted,Unattributed,Pyfatget,Malgent,Groooboor,Gozi,Wacatac"
],
"malwareHash": [
"7f2a499891a72b9f3b0923be0f9db490463639166b41a15fe3bf5387df660f1c",
"d73c616eaef3c683005a799b7420bae06bd5cd094d3923409f1611de67d4b82f",
"54874f342f9e4d93ccba0208446e6699c489e1f1d99f396c358df63cdfa4535f",
"e29ebea9db086b874310403868dc233b6c03e4305bebca507dbd53f36170dba8",
"645434d52d7e12dbae40d46fef28870785e74d0126d9cead76f46d65fc283a7f",
"34717e10b0f170025c3e380fb0287fe3c1f3347e3071c79c1e39ea94a489e6f7"
],
"rti": [
"dos,remote"
],
"epss": [
"0.xxxx"
],
"cisaVuln": [
"YES"
],
"cisaDueDate": "1651536000000",
"cisaAddedDate": "1635897600000"
}
}
}
}
API Request
curl --location 'https://<qualys_base_url>/api/3.0/fo/knowledge_base/qvs/?action=list&qvs_last_modified_before=2024-08-15' \
--header 'X-Requested-With: curl' \
--header 'Authorization: Basic username:password string'
JSON Output
{
"CVE-2017-16260": {
"base": {
"id": "CVE-2017-16260",
"idType": "CVE",
"qvs": "72",
"qvsLastChangedDate": 1722988800,
"nvdPublishedDate": 1673475300
}
},
"CVE-2017-16261": {
"base": {
"id": "CVE-2017-16261",
"idType": "CVE",
"qvs": "42",
"qvsLastChangedDate": 1722988800,
"nvdPublishedDate": 1673475300
}
},
"CVE-2017-16262": {
"base": {
"id": "CVE-2017-16262",
"idType": "CVE",
"qvs": "72",
"qvsLastChangedDate": 1722988800,
"nvdPublishedDate": 1673475300
}
},
"CVE-2023-23948": {
"base": {
"id": "CVE-2023-23948",
"idType": "CVE",
"qvs": "37",
"qvsLastChangedDate": 1722902400,
"nvdPublishedDate": 1676308500
}
},
"CVE-2017-16263": {
"base": {
"id": "CVE-2017-16263",
"idType": "CVE",
"qvs": "72",
"qvsLastChangedDate": 1722988800,
"nvdPublishedDate": 1673475300
}
}
API Request
curl --location 'https://<qualys_base_url>/api/3.0/fo/knowledge_base/qvs/?action=list&qvs_last_modified_after=2024-09-05&details=All' \
--header 'X-Requested-With: curl' \
--header 'Authorization: Basic username:password string'
JSON Output
{
"CVE-2024-38858": {
"base": {
"id": "CVE-2024-38858",
"idType": "CVE",
"qvs": "30",
"qvsLastChangedDate": 1725494400,
"nvdPublishedDate": 1725279319
},
"contributingFactors": {
"cvss": "6.1",
"cvssVersion": "v3.x",
"cvssString": "CVSS:3.1\/AV:N\/AC:L\/PR:N\/UI:R\/S:C\/C:L\/I:L\/A:N",
"trending": [
"09032024,09042024,08272024,08282024"
],
"epss": [
"0.00043"
]
}
},
"CVE-2018-19183": {
"base": {
"id": "CVE-2018-19183",
"idType": "CVE",
"qvs": "41",
"qvsLastChangedDate": 1725494400,
"nvdPublishedDate": 1541989740
},
"contributingFactors": {
"cvss": "7.5",
"cvssVersion": "v3.x",
"cvssString": "CVSS:3.1\/AV:N\/AC:L\/PR:N\/UI:N\/S:U\/C:N\/I:N\/A:H",
"exploitMaturity": [
"poc"
],
"epss": [
"0.00416"
]
}
}
API Request
curl --location 'https://<qualys_base_url>/api/3.0/fo/knowledge_base/qvs/?action=list&details=All&qvs_min=95' \
--header 'X-Requested-With: curl' \
--header 'Authorization: Basic username:password string'
JSON Output
{
"CVE-2024-38856": {
"base": {
"id": "CVE-2024-38856",
"idType": "CVE",
"qvs": "95",
"qvsLastChangedDate": 1725956542967,
"nvdPublishedDate": 1722849356
},
"contributingFactors": {
"cvss": "9.8",
"cvssVersion": "v3.x",
"cvssString": "CVSS:3.1\/AV:N\/AC:L\/PR:N\/UI:N\/S:U\/C:H\/I:H\/A:H",
"threatActors": [
"Unattributed"
],
"exploitMaturity": [
"weaponized,poc"
],
"trending": [
"08182024,08232024,08092024,08062024,08072024,08262024,08132024,08292024,08302024,08152024,08212024,08112024,08202024,08282024,08252024,08242024,08162024,08042024,08122024"
],
"epss": [
"0.93274"
]
}
},
"CVE-2019-18988": {
"base": {
"id": "CVE-2019-18988",
"idType": "CVE",
"qvs": "95",
"qvsLastChangedDate": 1725956542967,
"nvdPublishedDate": 1581092100
},
"contributingFactors": {
"cvss": "7.0",
"cvssVersion": "v3.x",
"cvssString": "AV:L\/AC:H\/PR:L\/UI:N\/S:U\/C:H\/I:H\/A:H",
"exploitMaturity": [
"poc,weaponized"
],
"trending": [
"07052024"
],
"epss": [
"0.00358"
]
}
}
API Request
curl --location 'https://<qualys_base_url>/api/3.0/fo/knowledge_base/qvs/?action=list&details=All&qvs_max=95' \
--header 'X-Requested-With: curl' \
--header 'Authorization: Basic username:password string'
JSON Output
{
"CVE-2017-16260": {
"base": {
"id": "CVE-2017-16260",
"idType": "CVE",
"qvs": "71",
"qvsLastChangedDate": 1725580800,
"nvdPublishedDate": 1673475300
},
"contributingFactors": {
"cvss": "9.9",
"cvssVersion": "v3.x",
"cvssString": "AV:N\/AC:L\/PR:L\/UI:N\/S:C\/C:H\/I:H\/A:H",
"exploitMaturity": [
"poc"
],
"epss": [
"0.00091"
]
}
},
"CVE-2017-16261": {
"base": {
"id": "CVE-2017-16261",
"idType": "CVE",
"qvs": "41",
"qvsLastChangedDate": 1725580800,
"nvdPublishedDate": 1673475300
},
"contributingFactors": {
"cvss": "8.8",
"cvssVersion": "v3.x",
"cvssString": "AV:N\/AC:L\/PR:L\/UI:N\/S:U\/C:H\/I:H\/A:H",
"exploitMaturity": [
"poc"
],
"epss": [
"0.00091"
]
}
}
API Request
curl --location 'https://<qualys_base_url>/api/3.0/fo/knowledge_base/qvs/?action=list&details=All&qvs_min=95&qvs_max=96' \
--header 'X-Requested-With: curl' \
--header 'Authorization: Basic username:password string'
JSON Output
{
"CVE-2024-38856": {
"base": {
"id": "CVE-2024-38856",
"idType": "CVE",
"qvs": "95",
"qvsLastChangedDate": 1725958333539,
"nvdPublishedDate": 1722849356
},
"contributingFactors": {
"cvss": "9.8",
"cvssVersion": "v3.x",
"cvssString": "CVSS:3.1\/AV:N\/AC:L\/PR:N\/UI:N\/S:U\/C:H\/I:H\/A:H",
"threatActors": [
"Unattributed"
],
"exploitMaturity": [
"weaponized,poc"
],
"trending": [
"08182024,08232024,08092024,08062024,08072024,08262024,08132024,08292024,08302024,08152024,08212024,08112024,08202024,08282024,08252024,08242024,08162024,08042024,08122024"
],
"epss": [
"0.93274"
]
}
},
"CVE-2019-18988": {
"base": {
"id": "CVE-2019-18988",
"idType": "CVE",
"qvs": "95",
"qvsLastChangedDate": 1725958333539,
"nvdPublishedDate": 1581092100
},
"contributingFactors": {
"cvss": "7.0",
"cvssVersion": "v3.x",
"cvssString": "AV:L\/AC:H\/PR:L\/UI:N\/S:U\/C:H\/I:H\/A:H",
"exploitMaturity": [
"poc,weaponized"
],
"trending": [
"07052024"
],
"epss": [
"0.00358"
]
}
The following table depicts the information about the different versions of this API along with the status:
| API Version | EOS | EOL |
| /api/3.0/fo/knowledge_base/qvs/?action=list | Active | Active |
| /api/2.0/fo/knowledge_base/qvs/?action=list | December 2025 | June 2026 |