All Applicable Vulnerabilities
This API provides a comprehensive list of all vulnerabilities.
- Functionality
- Fetch the list of vulnerabilities.
- HTTP Method
- GET
- API URI
- /dcapi/threats/vulnerabilities
- Scope
- DesktopCentralCloud.VulnerabilityMgmt.READ
- Filters
- vulnerabilityname={String}:
Filters vulnerabilities that contain the provided vulnerability name.
vulnerabilityid={Numeric}:
Filters vulnerabilities based on the vulnerability ID provided.
solution={String}:
Filters vulnerabilities based on the provided solution.
reboot_required={String}:
Filters vulnerabilities based on the reboot option provided.
cveids={String}:
Filters vulnerabilities based on the CVE ID provided.
cvss_3_0_score={float}:
Filters vulnerabilities based on the CVSS 3.0 score provided.
patch_availability={String}:
Filters vulnerabilities based on the patch availability provided.
severity={String}:
Filters vulnerabilities based on the severity provided.
publishedtime={Numeric}:
Filters vulnerabilities based on the published time provided.
cvss_2_0_score={float}:
Filters vulnerabilities based on the CVSS 2.0 score provided.
os_platform={String}:
Filters vulnerabilities based on the platform provided.
supportedtime={Numeric}:
Filters vulnerabilities based on the supported time provided.
exploit_status={String}:
Filters vulnerabilities based on the exploit status provided.
updatedtime={Numeric}:
Filters vulnerabilities based on the approved time.
patchid={Numeric}:
Filters vulnerabilities based on the patch ID provided.
- Display preferences
- page={Numeric}:
Displays the content of the provided page number.
pageLimit={Numeric}:
Displays the provided number of vulnerability details per page.
Response Data
{
"metadata": {
"pageLimit": 30,
"totalRecords": "2",
"totalPages": 1,
"links": {
"next": null,
"prev": null
},
"page": 1
},
"response_code": 200,
"message_type": "vulnerabilities",
"message_response": {
"vulnerabilities": [
{
"severity": "Important",
"publishedtime": "1557810000000",
"cvss_2_0_score": 5,
"os_platform": "Windows",
"supportedtime": "1557810000000",
"exploit_status": "not available",
"updatedtime": "1557858929000",
"affected_systems": 1,
"patchid": "37634",
"vulnerabilityid": "24480",
"vulnerabilityname": "KB4499405 2019-05 Cumulative
Update for .NET Framework 3.5 and 4.8 for Windows Server
2019 for x64 (KB4495618)",
"solution": "Windows10.0-kb5031990-x64-ndp48-
2019.msu",
"reboot_required": "may require",
"cveids": "CVE-2019-0981,CVE-2019-0820,CVE-2019-
0980,CVE-2019-0864",
"cvss_3_0_score": 7.5,
"patch_availability": "available"
},
{
"severity": "Critical",
"publishedtime": "1562524200000",
"cvss_2_0_score": 7.5,
"os_platform": "Windows",
"supportedtime": "1562700356687",
"exploit_status": "not available",
"updatedtime": "1562707959273",
"affected_systems": 1,
"patchid": "37634",
"vulnerabilityid": "25109",
"vulnerabilityname": ".NET Framework Remote Code
Execution Vulnerability for .NET Framework 3.5, 4.8 on
Windows Server 2019 for x64 (KB4506990)",
"solution": "Windows10.0-kb5031990-x64-ndp48-
2019.msu",
"reboot_required": "may require",
"cveids": "CVE-2019-1113,CVE-2019-1006,CVE-2019-
1083",
"cvss_3_0_score": 9.8,
"patch_availability": "available"
}
]
},
"status": "success"
}