All Applicable Vulnerabilities


This API provides a comprehensive list of all vulnerabilities.

 

  • Functionality
  • Fetch the list of vulnerabilities.
  • HTTP Method 
  • GET
  • API URI
  • /dcapi/threats/vulnerabilities
  • Scope
  • DesktopCentralCloud.VulnerabilityMgmt.READ
  • Filters
  • vulnerabilityname={String}:

    Filters vulnerabilities that contain the provided vulnerability name.

    vulnerabilityid={Numeric}:

    Filters vulnerabilities based on the vulnerability ID provided.

    solution={String}:

    Filters vulnerabilities based on the provided solution.

    reboot_required={String}:

    Filters vulnerabilities based on the reboot option provided.

    cveids={String}:

    Filters vulnerabilities based on the CVE ID provided.

    cvss_3_0_score={float}:

    Filters vulnerabilities based on the CVSS 3.0 score provided.

    patch_availability={String}:

    Filters vulnerabilities based on the patch availability provided.

    severity={String}:

    Filters vulnerabilities based on the severity provided.

    publishedtime={Numeric}:

    Filters vulnerabilities based on the published time provided.

    cvss_2_0_score={float}:

    Filters vulnerabilities based on the CVSS 2.0 score provided.

    os_platform={String}:

    Filters vulnerabilities based on the platform provided.

    supportedtime={Numeric}:

    Filters vulnerabilities based on the supported time provided.

    exploit_status={String}:

    Filters vulnerabilities based on the exploit status provided.

    updatedtime={Numeric}:

    Filters vulnerabilities based on the approved time.

    patchid={Numeric}:

    Filters vulnerabilities based on the patch ID provided.
  • Display preferences
  • page={Numeric}:

    Displays the content of the provided page number.

    pageLimit={Numeric}:

    Displays the provided number of vulnerability details per page.

Response Data

 {
        "metadata": {
        "pageLimit": 30,
        "totalRecords": "2",
        "totalPages": 1,
        "links": {
        "next": null,
        "prev": null
        },
        "page": 1
        },
        "response_code": 200,
        "message_type": "vulnerabilities",
        "message_response": {
        "vulnerabilities": [
        {
        "severity": "Important",
        "publishedtime": "1557810000000",
        "cvss_2_0_score": 5,
        "os_platform": "Windows",
        "supportedtime": "1557810000000",
        "exploit_status": "not available",
        "updatedtime": "1557858929000",
        "affected_systems": 1,
        "patchid": "37634",
        "vulnerabilityid": "24480",
        "vulnerabilityname": "KB4499405 2019-05 Cumulative
       Update for .NET Framework 3.5 and 4.8 for Windows Server
       2019 for x64 (KB4495618)",
       "solution": "Windows10.0-kb5031990-x64-ndp48-
       2019.msu",
        "reboot_required": "may require",
        "cveids": "CVE-2019-0981,CVE-2019-0820,CVE-2019-
       0980,CVE-2019-0864",
        "cvss_3_0_score": 7.5,
        "patch_availability": "available"
        },
        {
        "severity": "Critical",
        "publishedtime": "1562524200000",
        "cvss_2_0_score": 7.5,
        "os_platform": "Windows",
        "supportedtime": "1562700356687",
        "exploit_status": "not available",
        "updatedtime": "1562707959273",
        "affected_systems": 1,
        "patchid": "37634",
        "vulnerabilityid": "25109",
        "vulnerabilityname": ".NET Framework Remote Code
       Execution Vulnerability for .NET Framework 3.5, 4.8 on
       Windows Server 2019 for x64 (KB4506990)",
        "solution": "Windows10.0-kb5031990-x64-ndp48-
       2019.msu",
        "reboot_required": "may require",
        "cveids": "CVE-2019-1113,CVE-2019-1006,CVE-2019-
       1083",
        "cvss_3_0_score": 9.8,
        "patch_availability": "available"
        }
        ]
        },
        "status": "success"
        }