Patch Metadata

Provides metadata information for patches.

Base URL

        https://<consoleFQDN:port>/st/console/api/v1.0/patch/patchmetadata

Supported Request

Method URL Input Return

GET

https://<consoleFQDN:port>/st/console/api/v1.0/patch/patchmetadata

URL Parameters

PatchMetadata

Input Model

Example with Sample Response

Find the first two patches

GET Request

https://<consoleFQDN:port>/st/console/api/v1.0/patch/patchmetadata?count=2

Sample Response

Copy
{
    "count": 2,
    "links": {
        "next": {
            "href": "https://device-name.example.com:3121/st/console/api/v1.0/patch/patchmetadata?count=2&start=000000bb-0000-0000-0000-000000000000&orderBy=PatchId&sortOrder=Asc"
        }
    },
    "value": [
        {
            "affectedProducts": [
                "00000014-0000-0000-0000-000000000000"
            ],
            "bulletinId": "MS00-068",
            "bulletinReleaseDate": "2000-09-26T00:00:00",
            "bulletinTitle": "OCX Attachment Vulnerability",
            "familyId": 169,
            "familyName": "Windows Media Player",
            "fileSize": 267792,
            "isCustom": false,
            "kb": "Q274303",
            "links": {
                "self": {
                    "href": "https://device-name.example.com:3121/st/console/api/v1.0/patch/patchmetadata/00000093-0000-0000-0000-000000000000"
                }
            },
            "name": "WMSU28412.EXE",
            "patchId": "00000093-0000-0000-0000-000000000000",
            "patchType": "SecurityPatch",
            "releaseDate": "2000-09-26T00:00:00Z",
            "replacedBy": "",
            "summary": "OCX controls are containers that can hold multiple ActiveX controls. A particular OCX control, associated with Windows Media Player, could be used in a denial of service attack against RTF-enabled e-mail clients such as Microsoft Outlook and Outlook Express. If the affected control were programmatically embedded into an RTF mail and then sent to another user, the user?s mail client would fail when he closed the mail.",
            "vendorId": 1,
            "vendorName": "Microsoft",
            "vendorSeverity": "None"
        },
        {
            "affectedProducts": [
                "00000014-0000-0000-0000-000000000000"
            ],
            "bulletinId": "MS00-090",
            "bulletinReleaseDate": "2000-11-22T00:00:00",
            "bulletinTitle": ".ASX Buffer Overrun and .WMS Script Execution Vulnerabilities",
            "familyId": 169,
            "familyName": "Windows Media Player",
            "fileSize": 1582536,
            "isCustom": false,
            "kb": "Q280419",
            "links": {
                "self": {
                    "href": "https://device-name.example.com:3121/st/console/api/v1.0/patch/patchmetadata/000000ba-0000-0000-0000-000000000000"
                }
            },
            "name": "wmsu34419.EXE",
            "patchId": "000000ba-0000-0000-0000-000000000000",
            "patchType": "SecurityPatch",
            "replacedBy": "MS01-029",
            "summary": "Microsoft has released a patch that eliminates two security vulnerabilities in Microsoft Windows Media Player. These vulnerabilities could potentially enable a malicious user to cause a program of his choice to run on another user's computer.",
            "vendorId": 1,
            "vendorName": "Microsoft",
            "vendorSeverity": "None"
        }
    ]
}

Other Request Examples

Output Model