Enterprise TruRisk™ Platform Release 10.38.2 API
April 2, 2026
In the API Release Notes, <qualys_base_url> is used as a sample API request to represent the API server URL. To learn more about the API server URL for your environment, refer to the Know Your Qualys API Server URL section.
API versioning is supported across Qualys APIs. To learn more about versioning standards and deprecation timelines, refer to the Updates on API Versioning Standards & Deprecation Timelines blog.
Qualys Vulnerability Management (VM)
KnowledgeBase Enhancement - Support for KnowledgeBase and Search List for Deep Scan QIDs
Deep Scan, available for Qualys Cloud Agent VM scans, improves detection accuracy by inspecting deeper file system locations, increasing coverage for non-standard application paths, and enhancing visibility into modern and custom-built workloads. Cloud Agents can perform both traditional and Deep Scans without impacting agent performance, enabling security teams to close blind spots commonly missed by traditional scans.
This feature is now available with this release. For more information, refer to Enterprise TruRiskTM Platform Release 10.37.2 API.
Issues Addressed
The following reported and notable customer issues are fixed in this release:
| Component/Category | Application |
Description |
| VM - API General | Vulnerability Management | When users attempted to run the CVE detection API using the endpoint /api/3.0/fo/asset/host/vm/cve_detection/, the request did not proceed as expected and returned an error, which caused the API to stop its normal function. Relevant code changes have been made to fix the issue |
| VM - API General | Vulnerability Management | When users launched a host list detection API using the endpoint /api/5.0/fo/asset/host/vm/detection/? to obtain results in CSV format, the Last Processed Datetime column information was displayed in an incorrect column. The CSV file also displayed column mismatches in the output. Relevant code changes have been made to fix the issue. |
| VM - Knowledge Base | Vulnerability Management | When the users executed the KnowledgeBase API endpoint, /api/4.0/fo/knowledge_base/vuln/ with nocache parameter set to 1, the API request returned an empty response. Relevant code changes have been made to fix the issue. |