KnowledgeBase QVS Download in JSON Format

For API version information, refer to the API Version History section.

V2.0 | V3.0

V2.0

GET POST/api/2.0/fo/knowledge_base/qvs/?action=list

Download Qualys Vulnerability Score (QVS) information from the Vulnerability KnowledgeBase for one or more CVE IDs based on certain criteria. The API output is in JSON format.

The Qualys Vulnerability Score (QVS) is a Qualys-assigned score to a vulnerability based on multiple factors associated with the CVE, such as CVSS, EPSS and external threat indicators like active exploitation, exploit code maturity and much more.

Input ParametersInput Parameters

Parameter

Required/Optional

Data Type

Description

action=list

Required

String 

You must specify the list action.

Specify the list action to retrieve all CVEs published or last modified within the past 90 days from the current date.

details={Basic|All}

Required

Boolean 

Specify details=Basic to show the base QVS in the output. Specify details=All to show the base QVS and contributing factors in the output.

Specify the details parameter to retrieve all CVEs published or last modified within the past 90 days from the current date.

cve={value}

Required

Integer 

Filter the JSON output to only show vulnerabilities associated with the CVE IDs that you specify. The associated vulnerabilities are shown only when the requested CVE is published.

qvs_last_modified _before={date}

Optional

Integer  

Show only CVE IDs with a QVS score that was last modified before a certain date and time. Valid date format is: YYYY-MM-DD[THH:MM:SSZ] format (UTC/GMT), like “2021-12-01” or “2021-1201T23:12:00Z”.

qvs_last_modified _after={date}

Optional

Integer  

Show only CVE IDs with a QVS score that was last modified after a certain date and time. Valid date format is: YYYY-MM-DD[THH:MM:SSZ] format (UTC/GMT), like “2021-12-01” or “2021-12-01T23:12:00Z”.

qvs_min={value}

Optional

Integer  

Show only CVEs with a QVS value greater than or equal to the QVS min value specified. (QVS Prime will not be considered.) When qvs_min and qvs_max are specified in the same request, the qvs_min value must be less than the qvs_max value.

qvs_max={value}

Optional

Integer  

Show only CVEs with a QVS value less than or equal to the QVS max value specified. (QVS Prime will not be considered.) When qvs_min and qvs_max are specified in the same request, the qvs_min value must be less than the qvs_max value.

nvd_published_be fore={date}

Optional

Integer  

Show only CVE IDs with a QVS score that was published before a certain date and time. Valid date format is: YYYY-MM-DD[THH:MM:SSZ] format (UTC/GMT), like “2021-12-01” or “2021-12-01T23:12:00Z”.

nvd_published_aft er={date}

Optional

Integer  

Show only CVE IDs with a QVS score that was published after a certain date and time. Valid date format is: YYYY-MM-DD[THH:MM:SSZ] format (UTC/GMT), like “2021-12-01” or “2021-12-01T23:12:00Z”.

Sample KnowledgeBase QVS DownloadSample KnowledgeBase QVS Download

API Request

curl --location 
'<qualys_base_url>/api/2.0/fo/knowledge_base/qvs/?action=list&cve=CVE-2021-36764%2CCVE-2021-36765%2CCVE-2021-36798%2CCVE-2017-0199&details=All'\
--header 'X-Requested-With: curl demo 2' \
--header 'Authorization: Bearer <JWT Token>'

Output

{
{
    "CVE-2021-36764": {
        "base": {
            "id": "CVE-2021-36764",
            "idType": "CVE",
            "qvs": "35",
            "qvsLastChangedDate": 1664755200,
            "nvdPublishedDate": 1628086500
        },
        "contributingFactors": {
            "cvss": "7.5",
            "cvssVersion": "v3.x",
            "cvssString": "AV:N\/AC:L\/PR:N\/UI:N\/S:U\/C:N\/I:N\/A:H",
            "epss": [
                "0.00089"
            ]
        }
    },
    "CVE-2021-36765": {
        "base": {
            "id": "CVE-2021-36765",
            "idType": "CVE",
            "qvs": "35",
            "qvsLastChangedDate": 1664755200,
            "nvdPublishedDate": 1628086500
        },
        "contributingFactors": {
            "cvss": "7.5",
            "cvssVersion": "v3.x",
            "cvssString": "AV:N\/AC:L\/PR:N\/UI:N\/S:U\/C:H\/I:N\/A:N",
            "epss": [
                "0.00152"
            ]
        }
    },
    "CVE-2021-36798": {
        "base": {
            "id": "CVE-2021-36798",
            "idType": "CVE",
            "qvs": "41",
            "qvsLastChangedDate": 1704844800,
            "nvdPublishedDate": 1628514900
        },
        "contributingFactors": {
            "cvss": "7.5",
            "cvssVersion": "v3.x",
            "cvssString": "AV:N\/AC:L\/PR:N\/UI:N\/S:U\/C:N\/I:N\/A:H",
            "exploitMaturity": [
                "poc"
            ],
            "epss": [
                "0.00246"
            ]
        }
    }
}
{
"CVE-2017-0199": {
        "base": {
            "id": "CVE-2017-0199",
            "idType": "CVE",
            "qvs": "100",
            "qvsLastChangedDate": 1664755200,
            "nvdPublishedDate": 1492009141
        },
        "contributingFactors": {
            "cvss": "9.3",
            "cvssVersion": "v2",
            "cvssString": "AV:N\/AC:M\/Au:N\/C:C\/I:C\/A:C",
            "threatActors": [
                "Stardust Chollima,Cobalt Spider,APT43,Mythic Leopard,SectorJ,APT41,Whisper Spider,SideWinder,Silence,APT34,Kimsuky,Primitive Bear,TA459,Mustang Panda,Cobalt,Gorgon Group,Gothic Panda,Codoso,LABYRINTH CHOLLIMA,Pioneer Kitten,TA558,Dropping Elephant,Subaat,Quilted Tiger,Saaiwc Group,OilRig,Ocean Buffalo,APT19,China Attribution,Helix Kitten,Slayer Kitten,Lazarus Group,Velvet Chollima,BlackTech,Leviathan,SectorA,Dark Pink,CopyKittens,Razor Tiger,Gamaredon,PARASITE,Shadow Crane,Stone Panda,Labyrinth Chollima,Molerats,Kryptonite Panda,FIN7,DarkHotel,North Korea Attribution,Unattributed,Ricochet Chollima,Circuit Panda,RedAlpha,Carbon Spider,Wicked Panda,CHRYSENE,MuddyWater,Luckycat,GreyEnergy,Static Kitten,APT37"
            ],
            "exploitMaturity": [
                "poc,weaponized"
            ],
            "trending": [
                "10302025,11052025,11032025,10152025,10142025,11022025,11082025,11072025,11102025,10292025,10132025,11012025,10282025,10312025"
            ],
            "malwareName": [
                "Leonem,SLoad,Relsloadr,Donoff,Blinky,MalLink,Nemucod,Oneeva,Meterpreter,Emotet,Petya,Pterodo,Powsheldow,IcedID,Amphitryon,Snakekeylogger,Kepavll,Cerber,Cryxos,LokiBot,Powdow,Downlaoder,Valyria,Alien,Bladabhindi,Privateloader,Pidief,Aentdwn,Pantera,Farheyt,Relslodr,DdexLoader,AgentTesla,RTFObfustream,MacroLess,Badur,Razy,Snojan,DdeExec,FormBook,Stelega,TurtleLoader,Generic,WannaCry,EncDoc,Remcos,Negasteal,CobaltStrikeBeacon,Skeeyah,Bitrep,Encrypteddoc,Abnormal,Sonoko,Ymacco,Dotmer,Loki,Powload,Heuristic,RemoteTemplateInj,MesdettyLaunch,GenScript,BlackKingdom,Rasftuby,LockerGoga,Stratos,Madefref,PhishingAdb,Bluteal,Androm,Multiverze,Disco,Znyonm,Upatre,Phonzy,Rozena,Tiggre,Casur,Occamy,Zpevdo,Johnnie,NanoCore,SDrop,Pederr,BadTemplate,Ako,Symmi,Toncteseg,Zenpak,Gluptel,Vigorf,DllHijack,Primarypass,Ofckit,CVE-2017-0199,Risepro,Olemalrtf,Psyme,SpamDocCrypted,Unattributed,Pyfatget,Malgent,Groooboor,Gozi,Wacatac"
            ],
            "malwareHash": [
                "7f2a499891a72b9f3b0923be0f9db490463639166b41a15fe3bf5387df660f1c",
                "d73c616eaef3c683005a799b7420bae06bd5cd094d3923409f1611de67d4b82f",
                "54874f342f9e4d93ccba0208446e6699c489e1f1d99f396c358df63cdfa4535f",
                "e29ebea9db086b874310403868dc233b6c03e4305bebca507dbd53f36170dba8",
                "645434d52d7e12dbae40d46fef28870785e74d0126d9cead76f46d65fc283a7f",
                "34717e10b0f170025c3e380fb0287fe3c1f3347e3071c79c1e39ea94a489e6f7"
            ],
            "rti": [
                "dos,remote"
            ],
            "epss": [
                "0.xxxx"
            ],
            "cisaVuln": [
                "YES"
            ],
            "cisaDueDate": "1651536000000",
            "cisaAddedDate": "1635897600000"
        }
    }

}

V3.0

GET POST/api/3.0/fo/knowledge_base/qvs/?action=list

Download Qualys Vulnerability Score (QVS) information from the Vulnerability KnowledgeBase for one or more CVE IDs based on certain criteria. The API output is in JSON format.

The Qualys Vulnerability Score (QVS) is a Qualys-assigned score to a vulnerability based on multiple factors associated with the CVE, such as CVSS, EPSS and external threat indicators like active exploitation, exploit code maturity and much more. 

Input ParametersInput Parameters

Parameter

Required/Optional

Data Type

Description

action=list

Required

String 

You must specify the list action.

Specify the list action to retrieve all CVEs published or last modified within the past 90 days from the current date.

details={Basic|All}

Required

Boolean 

Specify details=Basic to show the base QVS in the output. Specify details=All to show the base QVS and contributing factors in the output.

Specify the details parameter to retrieve all CVEs published or last modified within the past 90 days from the current date.

cve={value}

Required

Integer 

Filter the JSON output to only show vulnerabilities associated with the CVE IDs that you specify. The associated vulnerabilities are shown only when the requested CVE is published.

qvs_last_modified _before={date}

Optional

Integer  

Show only CVE IDs with a QVS score that was last modified before a certain date and time. Valid date format is: YYYY-MM-DD[THH:MM:SSZ] format (UTC/GMT), like “2021-12-01” or “2021-1201T23:12:00Z”.

qvs_last_modified _after={date}

Optional

Integer  

Show only CVE IDs with a QVS score that was last modified after a certain date and time. Valid date format is: YYYY-MM-DD[THH:MM:SSZ] format (UTC/GMT), like “2021-12-01” or “2021-12-01T23:12:00Z”.

qvs_min={value}

Optional

Integer  

Show only CVEs with a QVS value greater than or equal to the QVS min value specified. (QVS Prime will not be considered.) When qvs_min and qvs_max are specified in the same request, the qvs_min value must be less than the qvs_max value.

qvs_max={value}

Optional

Integer  

Show only CVEs with a QVS value less than or equal to the QVS max value specified. (QVS Prime will not be considered.) When qvs_min and qvs_max are specified in the same request, the qvs_min value must be less than the qvs_max value.

nvd_published_be fore={date}

Optional

Integer  

Show only CVE IDs with a QVS score that was published before a certain date and time. Valid date format is: YYYY-MM-DD[THH:MM:SSZ] format (UTC/GMT), like “2021-12-01” or “2021-12-01T23:12:00Z”.

nvd_published_aft er={date}

Optional

Integer  

Show only CVE IDs with a QVS score that was published after a certain date and time. Valid date format is: YYYY-MM-DD[THH:MM:SSZ] format (UTC/GMT), like “2021-12-01” or “2021-12-01T23:12:00Z”.

Sample - KnowledgeBase QVS DownloadSample - KnowledgeBase QVS Download

API Request

curl --location 
'<qualys_base_url>/api/3.0/fo/knowledge_base/qvs/?action=list&cve=CVE-2021-36764%2CCVE-2021-36765%2CCVE-2021-36798%2CCVE-2017-0199&details=All'\
--header 'X-Requested-With: curl demo 2' \
--header 'Authorization: Bearer <JWT Token>'

Output

{
{
    "CVE-2021-36764": {
        "base": {
            "id": "CVE-2021-36764",
            "idType": "CVE",
            "qvs": "35",
            "qvsLastChangedDate": 1664755200,
            "nvdPublishedDate": 1628086500
        },
        "contributingFactors": {
            "cvss": "7.5",
            "cvssVersion": "v3.x",
            "cvssString": "AV:N\/AC:L\/PR:N\/UI:N\/S:U\/C:N\/I:N\/A:H",
            "epss": [
                "0.00089"
            ]
        }
    },
    "CVE-2021-36765": {
        "base": {
            "id": "CVE-2021-36765",
            "idType": "CVE",
            "qvs": "35",
            "qvsLastChangedDate": 1664755200,
            "nvdPublishedDate": 1628086500
        },
        "contributingFactors": {
            "cvss": "7.5",
            "cvssVersion": "v3.x",
            "cvssString": "AV:N\/AC:L\/PR:N\/UI:N\/S:U\/C:H\/I:N\/A:N",
            "epss": [
                "0.00152"
            ]
        }
    },
    "CVE-2021-36798": {
        "base": {
            "id": "CVE-2021-36798",
            "idType": "CVE",
            "qvs": "41",
            "qvsLastChangedDate": 1704844800,
            "nvdPublishedDate": 1628514900
        },
        "contributingFactors": {
            "cvss": "7.5",
            "cvssVersion": "v3.x",
            "cvssString": "AV:N\/AC:L\/PR:N\/UI:N\/S:U\/C:N\/I:N\/A:H",
            "exploitMaturity": [
                "poc"
            ],
            "epss": [
                "0.00246"
            ]
        }
    }
}
{
"CVE-2017-0199": {
        "base": {
            "id": "CVE-2017-0199",
            "idType": "CVE",
            "qvs": "100",
            "qvsLastChangedDate": 1664755200,
            "nvdPublishedDate": 1492009141
        },
        "contributingFactors": {
            "cvss": "9.3",
            "cvssVersion": "v2",
            "cvssString": "AV:N\/AC:M\/Au:N\/C:C\/I:C\/A:C",
            "threatActors": [
                "Stardust Chollima,Cobalt Spider,APT43,Mythic Leopard,SectorJ,APT41,Whisper Spider,SideWinder,Silence,APT34,Kimsuky,Primitive Bear,TA459,Mustang Panda,Cobalt,Gorgon Group,Gothic Panda,Codoso,LABYRINTH CHOLLIMA,Pioneer Kitten,TA558,Dropping Elephant,Subaat,Quilted Tiger,Saaiwc Group,OilRig,Ocean Buffalo,APT19,China Attribution,Helix Kitten,Slayer Kitten,Lazarus Group,Velvet Chollima,BlackTech,Leviathan,SectorA,Dark Pink,CopyKittens,Razor Tiger,Gamaredon,PARASITE,Shadow Crane,Stone Panda,Labyrinth Chollima,Molerats,Kryptonite Panda,FIN7,DarkHotel,North Korea Attribution,Unattributed,Ricochet Chollima,Circuit Panda,RedAlpha,Carbon Spider,Wicked Panda,CHRYSENE,MuddyWater,Luckycat,GreyEnergy,Static Kitten,APT37"
            ],
            "exploitMaturity": [
                "poc,weaponized"
            ],
            "trending": [
                "10302025,11052025,11032025,10152025,10142025,11022025,11082025,11072025,11102025,10292025,10132025,11012025,10282025,10312025"
            ],
            "malwareName": [
                "Leonem,SLoad,Relsloadr,Donoff,Blinky,MalLink,Nemucod,Oneeva,Meterpreter,Emotet,Petya,Pterodo,Powsheldow,IcedID,Amphitryon,Snakekeylogger,Kepavll,Cerber,Cryxos,LokiBot,Powdow,Downlaoder,Valyria,Alien,Bladabhindi,Privateloader,Pidief,Aentdwn,Pantera,Farheyt,Relslodr,DdexLoader,AgentTesla,RTFObfustream,MacroLess,Badur,Razy,Snojan,DdeExec,FormBook,Stelega,TurtleLoader,Generic,WannaCry,EncDoc,Remcos,Negasteal,CobaltStrikeBeacon,Skeeyah,Bitrep,Encrypteddoc,Abnormal,Sonoko,Ymacco,Dotmer,Loki,Powload,Heuristic,RemoteTemplateInj,MesdettyLaunch,GenScript,BlackKingdom,Rasftuby,LockerGoga,Stratos,Madefref,PhishingAdb,Bluteal,Androm,Multiverze,Disco,Znyonm,Upatre,Phonzy,Rozena,Tiggre,Casur,Occamy,Zpevdo,Johnnie,NanoCore,SDrop,Pederr,BadTemplate,Ako,Symmi,Toncteseg,Zenpak,Gluptel,Vigorf,DllHijack,Primarypass,Ofckit,CVE-2017-0199,Risepro,Olemalrtf,Psyme,SpamDocCrypted,Unattributed,Pyfatget,Malgent,Groooboor,Gozi,Wacatac"
            ],
            "malwareHash": [
                "7f2a499891a72b9f3b0923be0f9db490463639166b41a15fe3bf5387df660f1c",
                "d73c616eaef3c683005a799b7420bae06bd5cd094d3923409f1611de67d4b82f",
                "54874f342f9e4d93ccba0208446e6699c489e1f1d99f396c358df63cdfa4535f",
                "e29ebea9db086b874310403868dc233b6c03e4305bebca507dbd53f36170dba8",
                "645434d52d7e12dbae40d46fef28870785e74d0126d9cead76f46d65fc283a7f",
                "34717e10b0f170025c3e380fb0287fe3c1f3347e3071c79c1e39ea94a489e6f7"
            ],
            "rti": [
                "dos,remote"
            ],
            "epss": [
                "0.xxxx"
            ],
            "cisaVuln": [
                "YES"
            ],
            "cisaDueDate": "1651536000000",
            "cisaAddedDate": "1635897600000"
        }
    }

}

Sample - QVS last modified before a given dateSample - QVS last modified before a given date

API Request

curl --location 'https://<qualys_base_url>/api/3.0/fo/knowledge_base/qvs/?action=list&qvs_last_modified_before=2024-08-15' \
--header 'X-Requested-With: curl' \
--header 'Authorization: Basic username:password string'

JSON Output

{
"CVE-2017-16260": {
"base": {
"id": "CVE-2017-16260",
"idType": "CVE",
"qvs": "72",
"qvsLastChangedDate": 1722988800,
"nvdPublishedDate": 1673475300
}
},
"CVE-2017-16261": {
"base": {
"id": "CVE-2017-16261",
"idType": "CVE",
"qvs": "42",
"qvsLastChangedDate": 1722988800,
"nvdPublishedDate": 1673475300
}
},
"CVE-2017-16262": {
"base": {
"id": "CVE-2017-16262",
"idType": "CVE",
"qvs": "72",
"qvsLastChangedDate": 1722988800,
"nvdPublishedDate": 1673475300
}
},
"CVE-2023-23948": {
"base": {
"id": "CVE-2023-23948",
"idType": "CVE",
"qvs": "37",
"qvsLastChangedDate": 1722902400,
"nvdPublishedDate": 1676308500
}
},
"CVE-2017-16263": {
"base": {
"id": "CVE-2017-16263",
"idType": "CVE",
"qvs": "72",
"qvsLastChangedDate": 1722988800,
"nvdPublishedDate": 1673475300
}
}

Sample - QVS last modified after a given dateSample - QVS last modified after a given date

API Request

curl --location 'https://<qualys_base_url>/api/3.0/fo/knowledge_base/qvs/?action=list&qvs_last_modified_after=2024-09-05&details=All' \
--header 'X-Requested-With: curl' \
--header 'Authorization: Basic username:password string'

JSON Output

{
"CVE-2024-38858": {
"base": {
"id": "CVE-2024-38858",
"idType": "CVE",
"qvs": "30",
"qvsLastChangedDate": 1725494400,
"nvdPublishedDate": 1725279319
},
"contributingFactors": {
"cvss": "6.1",
"cvssVersion": "v3.x",
"cvssString": "CVSS:3.1\/AV:N\/AC:L\/PR:N\/UI:R\/S:C\/C:L\/I:L\/A:N",
"trending": [
"09032024,09042024,08272024,08282024"
],
"epss": [
"0.00043"
]
}
},
"CVE-2018-19183": {
"base": {
"id": "CVE-2018-19183",
"idType": "CVE",
"qvs": "41",
"qvsLastChangedDate": 1725494400,
"nvdPublishedDate": 1541989740
},
"contributingFactors": {
"cvss": "7.5",
"cvssVersion": "v3.x",
"cvssString": "CVSS:3.1\/AV:N\/AC:L\/PR:N\/UI:N\/S:U\/C:N\/I:N\/A:H",
"exploitMaturity": [
"poc"
],
"epss": [
"0.00416"
]
}
}

Sample - Display CVEs for QVS minimumSample - Display CVEs for QVS minimum

API Request

curl --location 'https://<qualys_base_url>/api/3.0/fo/knowledge_base/qvs/?action=list&details=All&qvs_min=95' \
--header 'X-Requested-With: curl' \
--header 'Authorization: Basic username:password string' 

JSON Output

 {
"CVE-2024-38856": {
"base": {
"id": "CVE-2024-38856",
"idType": "CVE",
"qvs": "95",
"qvsLastChangedDate": 1725956542967,
"nvdPublishedDate": 1722849356
},
"contributingFactors": {
"cvss": "9.8",
"cvssVersion": "v3.x",
"cvssString": "CVSS:3.1\/AV:N\/AC:L\/PR:N\/UI:N\/S:U\/C:H\/I:H\/A:H",
"threatActors": [
"Unattributed"
],
"exploitMaturity": [
"weaponized,poc"
],
"trending": [
"08182024,08232024,08092024,08062024,08072024,08262024,08132024,08292024,08302024,08152024,08212024,08112024,08202024,08282024,08252024,08242024,08162024,08042024,08122024"
],
"epss": [
"0.93274"
]
}
},
"CVE-2019-18988": {
"base": {
"id": "CVE-2019-18988",
"idType": "CVE",
"qvs": "95",
"qvsLastChangedDate": 1725956542967,
"nvdPublishedDate": 1581092100
},
"contributingFactors": {
"cvss": "7.0",
"cvssVersion": "v3.x",
"cvssString": "AV:L\/AC:H\/PR:L\/UI:N\/S:U\/C:H\/I:H\/A:H",
"exploitMaturity": [
"poc,weaponized"
],
"trending": [
"07052024"
],
"epss": [
"0.00358"
]
}
}

Sample - Display CVEs for QVS maximumSample - Display CVEs for QVS maximum

API Request

 curl --location 'https://<qualys_base_url>/api/3.0/fo/knowledge_base/qvs/?action=list&details=All&qvs_max=95' \
--header 'X-Requested-With: curl' \
--header 'Authorization: Basic username:password string'

JSON Output

 {
    "CVE-2017-16260": {
        "base": {
            "id": "CVE-2017-16260",
            "idType": "CVE",
            "qvs": "71",
            "qvsLastChangedDate": 1725580800,
            "nvdPublishedDate": 1673475300
        },
        "contributingFactors": {
            "cvss": "9.9",
            "cvssVersion": "v3.x",
            "cvssString": "AV:N\/AC:L\/PR:L\/UI:N\/S:C\/C:H\/I:H\/A:H",
            "exploitMaturity": [
                "poc"
            ],
            "epss": [
                "0.00091"
            ]
        }
    },
    "CVE-2017-16261": {
        "base": {
            "id": "CVE-2017-16261",
            "idType": "CVE",
            "qvs": "41",
            "qvsLastChangedDate": 1725580800,
            "nvdPublishedDate": 1673475300
        },
        "contributingFactors": {
            "cvss": "8.8",
            "cvssVersion": "v3.x",
            "cvssString": "AV:N\/AC:L\/PR:L\/UI:N\/S:U\/C:H\/I:H\/A:H",
            "exploitMaturity": [
                "poc"
            ],
            "epss": [
                "0.00091"
            ]
        }
    }

Sample - Display CVEs with QVS min and QVS maxSample - Display CVEs with QVS min and QVS max

API Request

 curl --location 'https://<qualys_base_url>/api/3.0/fo/knowledge_base/qvs/?action=list&details=All&qvs_min=95&qvs_max=96' \
--header 'X-Requested-With: curl' \
--header 'Authorization: Basic username:password string'

JSON Output

 {
"CVE-2024-38856": {
"base": {
"id": "CVE-2024-38856",
"idType": "CVE",
"qvs": "95",
"qvsLastChangedDate": 1725958333539,
"nvdPublishedDate": 1722849356
},
"contributingFactors": {
"cvss": "9.8",
"cvssVersion": "v3.x",
"cvssString": "CVSS:3.1\/AV:N\/AC:L\/PR:N\/UI:N\/S:U\/C:H\/I:H\/A:H",
"threatActors": [
"Unattributed"
],
"exploitMaturity": [
"weaponized,poc"
],
"trending": [
"08182024,08232024,08092024,08062024,08072024,08262024,08132024,08292024,08302024,08152024,08212024,08112024,08202024,08282024,08252024,08242024,08162024,08042024,08122024"
],
"epss": [
"0.93274"
]
}
},
"CVE-2019-18988": {
"base": {
"id": "CVE-2019-18988",
"idType": "CVE",
"qvs": "95",
"qvsLastChangedDate": 1725958333539,
"nvdPublishedDate": 1581092100
},
"contributingFactors": {
"cvss": "7.0",
"cvssVersion": "v3.x",
"cvssString": "AV:L\/AC:H\/PR:L\/UI:N\/S:U\/C:H\/I:H\/A:H",
"exploitMaturity": [
"poc,weaponized"
],
"trending": [
"07052024"
],
"epss": [
"0.00358"
]
}

API Version History

The following table depicts the information about the different versions of this API along with the status:

API Version EOS EOL
/api/3.0/fo/knowledge_base/qvs/?action=list Active Active
/api/2.0/fo/knowledge_base/qvs/?action=list December 2025 June 2026

 

 

 

 

success Thank you! We're glad to hear that this topic was useful.
success We appreciate your feedback. We'll work to make this topic better for you in the future.